nuclide-prebuilt-libs
Advanced tools
Comparing version 0.2.0 to 0.3.0
@@ -22,2 +22,5 @@ 'use strict'; | ||
break; | ||
case '54': | ||
nodeAbi = 'electron-v1.7'; | ||
break; | ||
default: | ||
@@ -24,0 +27,0 @@ nodeAbi = 'node-v' + process.versions.modules; |
{ | ||
"name": "nuclide-prebuilt-libs", | ||
"description": "Nuclide's binary dependencies prebuilt for various platforms", | ||
"version": "0.2.0", | ||
"version": "0.3.0", | ||
"keywords": [], | ||
@@ -6,0 +6,0 @@ "homepage": "https://nuclide.io/", |
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
Major refactor
Supply chain riskPackage has recently undergone a major refactor. It may be unstable or indicate significant internal changes. Use caution when updating to versions that include significant changes.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
Install scripts
Supply chain riskInstall scripts are run when the package is installed. The majority of malware in npm is hidden in install scripts.
Found 1 instance in 1 package
Native code
Supply chain riskContains native code (e.g., compiled binaries or shared libraries). Including native code can obscure malicious behavior.
Found 20 instances in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
0
5
1
28322
18
191