Comparing version 0.1.8 to 0.1.9
{ | ||
"name": "px2rem", | ||
"description": "According to one stylesheet, generate rem version and @1x, @2x and @3x stylesheet", | ||
"version": "0.1.8", | ||
"version": "0.1.9", | ||
"homepage": "https://github.com/songsiqi/px2rem", | ||
@@ -35,3 +35,4 @@ "author": { | ||
"mocha": "^2.1.0", | ||
"cssmin": "~0.4.3" | ||
"cssmin": "~0.4.3", | ||
"browserify": "^9.0.8" | ||
}, | ||
@@ -46,3 +47,4 @@ "directories": { | ||
"test": "mocha", | ||
"test-travis": "node node_modules/.bin/istanbul cover ./node_modules/.bin/_mocha --report lcovonly -- --reporter dot" | ||
"test-travis": "node node_modules/.bin/istanbul cover ./node_modules/.bin/_mocha --report lcovonly -- --reporter dot", | ||
"browserify": "browserify -r ./index.js:px2rem -o ./browser/bundle.js" | ||
}, | ||
@@ -49,0 +51,0 @@ "main": "index.js", |
@@ -5,2 +5,16 @@ # px2rem | ||
[![NPM version][npm-image]][npm-url] | ||
[![Build status][travis-image]][travis-url] | ||
[![Test coverage][coveralls-image]][coveralls-url] | ||
[![Downloads][downloads-image]][downloads-url] | ||
[npm-image]: https://img.shields.io/npm/v/px2rem.svg?style=flat-square | ||
[npm-url]: https://npmjs.org/package/px2rem | ||
[travis-image]: https://img.shields.io/travis/songsiqi/px2rem.svg?style=flat-square | ||
[travis-url]: https://travis-ci.org/songsiqi/px2rem | ||
[coveralls-image]: https://img.shields.io/coveralls/songsiqi/px2rem.svg?style=flat-square | ||
[coveralls-url]: https://coveralls.io/r/songsiqi/px2rem | ||
[downloads-image]: http://img.shields.io/npm/dm/px2rem.svg?style=flat-square | ||
[downloads-url]: https://npmjs.org/package/px2rem | ||
This node module contains: | ||
@@ -138,2 +152,6 @@ | ||
### 0.1.9 | ||
* Add browserify support. | ||
### 0.1.8 | ||
@@ -140,0 +158,0 @@ |
Major refactor
Supply chain riskPackage has recently undergone a major refactor. It may be unstable or indicate significant internal changes. Use caution when updating to versions that include significant changes.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
261627
18
6222
164
5
6
2