Comparing version 0.3.0 to 0.3.1
@@ -5,2 +5,5 @@ 'use strict'; | ||
/** | ||
* When in beta | ||
* | ||
if (!process.env.R42_NOWARNING) { | ||
@@ -20,2 +23,3 @@ console.error(); | ||
} | ||
//*/ | ||
@@ -22,0 +26,0 @@ var _ = require('lodash'); |
{ | ||
"name": "r42", | ||
"version": "0.3.0", | ||
"version": "0.3.1", | ||
"description": "Dependency injection done right.", | ||
@@ -5,0 +5,0 @@ "author": { |
@@ -247,2 +247,6 @@ ## r42 | ||
#### 0.3.1 | ||
* Remove the beta channel warning that was forgotten | ||
#### 0.3.0 | ||
@@ -249,0 +253,0 @@ |
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
18706
340
275
2