Comparing version 0.6.2 to 0.6.3
@@ -6,2 +6,23 @@ # Change Log | ||
<a name="0.6.3"></a> | ||
## [0.6.3](https://github.com/stryker-mutator/stryker/compare/stryker@0.6.2...stryker@0.6.3) (2017-06-08) | ||
### Bug Fixes | ||
* **intializer:** Remove install of `stryker` itself (#317) ([8b8dd30](https://github.com/stryker-mutator/stryker/commit/8b8dd30)), closes [#316](https://github.com/stryker-mutator/stryker/issues/316) | ||
* **MethodChainMutatorSpec:** Fix test name, so it matches the name of the mutator. (#313) ([5e53982](https://github.com/stryker-mutator/stryker/commit/5e53982)), closes [#313](https://github.com/stryker-mutator/stryker/issues/313) | ||
<a name="0.6.3"></a> | ||
## 0.6.3 (2017-06-02) | ||
### Features | ||
* **Mutators:** Add Boolean substitution mutators (#294) ([a137a97](https://github.com/stryker-mutator/stryker/commit/a137a97)) | ||
* **report-score-result:** Report score result as tree (#309) ([965c575](https://github.com/stryker-mutator/stryker/commit/965c575)) | ||
<a name="0.6.0"></a> | ||
@@ -8,0 +29,0 @@ # 0.6.0 (2017-04-21) |
{ | ||
"name": "stryker", | ||
"version": "0.6.2", | ||
"version": "0.6.3", | ||
"description": "The extendable JavaScript mutation testing framework", | ||
@@ -75,7 +75,7 @@ "main": "src/Stryker.js", | ||
"@types/inquirer": "0.0.33", | ||
"stryker-api": "^0.5.1" | ||
"stryker-api": "^0.5.2" | ||
}, | ||
"peerDependencies": { | ||
"stryker-api": "^0.5.1" | ||
"stryker-api": "^0.5.2" | ||
} | ||
} |
Major refactor
Supply chain riskPackage has recently undergone a major refactor. It may be unstable or indicate significant internal changes. Use caution when updating to versions that include significant changes.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 2 instances in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
0
1
44839
8
67