spawn-async
Advanced tools
+8
-3
| { | ||
| "name": "spawn-async", | ||
| "version": "0.0.1", | ||
| "version": "0.0.2", | ||
| "description": "spawn child processes asynchronously", | ||
@@ -8,5 +8,10 @@ "main": "lib/spawn-async.js", | ||
| "type": "git", | ||
| "url": "git://github.com/davepacheco/node-spawn-async.git" | ||
| "url": "https://github.com/davepacheco/node-spawn-async.git" | ||
| }, | ||
| "keywords": [ "spawn", "async", "fork", "exec" ], | ||
| "keywords": [ | ||
| "spawn", | ||
| "async", | ||
| "fork", | ||
| "exec" | ||
| ], | ||
| "license": "MIT", | ||
@@ -13,0 +18,0 @@ "readmeFilename": "README.md", |
+9
-4
@@ -24,2 +24,3 @@ # spawn-async: spawn child processes asynchronously | ||
| console.log(stdout); | ||
| worker.destroy(); | ||
| } | ||
@@ -73,7 +74,11 @@ }); | ||
| `destroy()`: forcefully kills the worker process and causes pending `aspawn` | ||
| commands to fail. The behavior with respect to the corresponding child | ||
| processes is undefined, so you should only call this when you know there are no | ||
| outstanding commands, when you don't care about leaving orphaned child processes | ||
| around, or your system will automatically clean up such child processes. | ||
| commands to fail. The behavior with respect to the child processes that you've | ||
| already launched is undefined, so you should only call this when you know there | ||
| are no outstanding commands, when you don't care about leaving orphaned child | ||
| processes around, or your system will automatically clean up such child | ||
| processes. | ||
| The worker process sticks around (leaving your Node program running) until you | ||
| call `destroy()`. | ||
| ### Events | ||
@@ -80,0 +85,0 @@ |
Sorry, the diff of this file is not supported yet
New author
Supply chain riskA new npm collaborator published a version of the package for the first time. New collaborators are usually benign additions to a project, but do indicate a change to the security surface area of a package.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 3 instances in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 3 instances in 1 package
32846
0.44%127
4.1%10
-9.09%3
50%