+1
-1
| var proton = require('proton'), | ||
| options = require('proton/options'), | ||
| options = require('proton/lib/options'), | ||
| sys = require('sys'); | ||
@@ -5,0 +5,0 @@ |
+1
-1
@@ -19,3 +19,3 @@ | ||
| } | ||
| return path.replace(/^\.\//, ''); | ||
| return base + '/' + path.replace(/^\.\//, ''); | ||
| } | ||
@@ -22,0 +22,0 @@ |
+2
-2
| var jsgi = require('jsgi/jsgi-node'), | ||
| promise = require('promised-io/promise'), | ||
| var jsgi = require('jsgi'), | ||
| promise = require('promised-io/lib/promise'), | ||
| fs = require('fs'), | ||
@@ -5,0 +5,0 @@ daemon = require("daemon"), |
+1
-1
| { | ||
| "name" : "proton", | ||
| "description" : "Proton is a micro framework targetted at micro frameworks. It provides a common way for micro-frameworks to interoporate with the environment that runs them.", | ||
| "version" : "0.1.3", | ||
| "version" : "0.2.0", | ||
| "engines" : [ "node >=0.2.5" ], | ||
@@ -6,0 +6,0 @@ "author" : "Tom Yandell <tom.deletethis@yandell.me.uk> (http://tomyandell.wordpress.com/)", |
+2
-0
@@ -0,1 +1,3 @@ | ||
| See <a href="http://use.no.de/proton">use.no.de/proton</a>. | ||
| Introduction | ||
@@ -2,0 +4,0 @@ ============ |
Sorry, the diff of this file is not supported yet
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
96377
0.05%110
1.85%