+5
-0
@@ -0,1 +1,6 @@ | ||
| ## 1.2.2 | ||
| * [Handle non-Error objects thrown in JS (#154)](https://github.com/extremeheat/JSPyBridge/commit/5b3aecd787fb2bb531079b61f8492a92f633eaff) (thanks @extremeheat) | ||
| * [docs: fix typo (#146)](https://github.com/extremeheat/JSPyBridge/commit/bd17b0de48baa761284dfef469641ba46d5357bc) (thanks @simoneb) | ||
| * [pythonia: update typescript types (#142)](https://github.com/extremeheat/JSPyBridge/commit/d17217070ea0ff5baa0c96a06549006dce82df20) (thanks @Pickleboyonline) | ||
| ## 1.2.1 | ||
@@ -2,0 +7,0 @@ * [Fix ES5 class handling, allow disabling timeouts (#137)](https://github.com/extremeheat/JSPyBridge/commit/a2d7369d861b6be9472ce2b72b3a92e78a06cda4) (thanks @extremeheat) |
+1
-1
@@ -5,3 +5,3 @@ { | ||
| "description": "Bridge to call and interop Python APIs from Node.js", | ||
| "version": "1.2.1", | ||
| "version": "1.2.2", | ||
| "main": "./src/pythonia/index.js", | ||
@@ -8,0 +8,0 @@ "types": "./src/pythonia/index.d.ts", |
@@ -1,6 +0,5 @@ | ||
| export function python(fileName: string): Promise<any> | ||
| // Template function to evaulate Python code | ||
| export function py(tokens: any[], ...replacements: any[]): any | ||
| export interface Py { | ||
| // Template function to evaulate Python code | ||
| (tokens: any[], ...replacements: any[]): any | ||
| interface py { | ||
| // Template function to exec() Python code | ||
@@ -30,3 +29,3 @@ exec(tokens: any[], ...replacements: any[]): Promise<any> | ||
| */ | ||
| enumerate(item: python): Promise<any> | ||
| enumerate(item: Python): Promise<any> | ||
@@ -42,6 +41,7 @@ /** | ||
| */ | ||
| with(statement: python, callback: (handle: any) => Promise<void>): Promise<void> | ||
| with(statement: Python, callback: (handle: any) => Promise<void>): Promise<void> | ||
| } | ||
| interface python { | ||
| export interface Python { | ||
| (fileName: string): Promise<any> | ||
| /** | ||
@@ -71,2 +71,6 @@ * This toggles "Fast Mode", where the bridge skips string serialization. With this enabled, when using console.log | ||
| export const python: Python; | ||
| export const py: Py; | ||
| export class PyClass { | ||
@@ -81,3 +85,3 @@ /** | ||
| */ | ||
| constructor(superclass: python, superArguments: [], superKeywordArguments: {}) | ||
| constructor(superclass: Python, superArguments: [], superKeywordArguments: {}) | ||
@@ -84,0 +88,0 @@ /** |
@@ -95,3 +95,3 @@ /** | ||
| } catch (e) { | ||
| return this.ipc.send({ r, key: 'error', error: e.stack }) | ||
| return this.ipc.send({ r, key: 'error', error: e.stack || JSON.stringify(e) }) | ||
| } | ||
@@ -117,3 +117,3 @@ this.ipc.send({ r, key: '', val: true }) | ||
| } catch (e) { | ||
| return this.ipc.send({ r, key: 'error', error: e.stack }) | ||
| return this.ipc.send({ r, key: 'error', error: e.stack || JSON.stringify(e) }) | ||
| } | ||
@@ -196,3 +196,3 @@ const type = getType(v) | ||
| } catch (e) { | ||
| return this.ipc.send({ r, key: 'error', error: e.stack }) | ||
| return this.ipc.send({ r, key: 'error', error: e.stack || JSON.stringify(e) }) | ||
| } | ||
@@ -199,0 +199,0 @@ } |
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 4 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 4 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
528147
0.11%14165
0.01%