+2
-2
| "use strict";Object.defineProperty(exports, "__esModule", {value: true}); function _interopRequireDefault(obj) { return obj && obj.__esModule ? obj : { default: obj }; }/* eslint-disable no-console */ | ||
| var _commander = require('commander'); var _commander2 = _interopRequireDefault(_commander); | ||
| var _glob = require('glob'); | ||
| var _tinyglobby = require('tinyglobby'); | ||
| var _fs = require('mz/fs'); | ||
@@ -216,3 +216,3 @@ var _path = require('path'); | ||
| for (const pattern of include) { | ||
| const globFiles = await _glob.glob.call(void 0, _path.join.call(void 0, absProject, pattern)); | ||
| const globFiles = await _tinyglobby.glob.call(void 0, _path.join.call(void 0, absProject, pattern), {expandDirectories: false}); | ||
| for (const file of globFiles) { | ||
@@ -219,0 +219,0 @@ if (!file.endsWith(".ts") && !file.endsWith(".js")) { |
+2
-2
| /* eslint-disable no-console */ | ||
| import commander from "commander"; | ||
| import {glob} from "glob"; | ||
| import {glob} from "tinyglobby"; | ||
| import {exists, mkdir, readdir, readFile, stat, writeFile} from "mz/fs"; | ||
@@ -216,3 +216,3 @@ import {dirname, join, relative} from "path"; | ||
| for (const pattern of include) { | ||
| const globFiles = await glob(join(absProject, pattern)); | ||
| const globFiles = await glob(join(absProject, pattern), {expandDirectories: false}); | ||
| for (const file of globFiles) { | ||
@@ -219,0 +219,0 @@ if (!file.endsWith(".ts") && !file.endsWith(".js")) { |
@@ -32,3 +32,3 @@ import CJSImportProcessor from "./CJSImportProcessor"; | ||
| /* istanbul ignore next */ | ||
| return "3.35.0"; | ||
| return "3.35.1"; | ||
| } | ||
@@ -35,0 +35,0 @@ |
+1
-1
@@ -32,3 +32,3 @@ "use strict";Object.defineProperty(exports, "__esModule", {value: true}); function _interopRequireDefault(obj) { return obj && obj.__esModule ? obj : { default: obj }; }var _CJSImportProcessor = require('./CJSImportProcessor'); var _CJSImportProcessor2 = _interopRequireDefault(_CJSImportProcessor); | ||
| /* istanbul ignore next */ | ||
| return "3.35.0"; | ||
| return "3.35.1"; | ||
| } exports.getVersion = getVersion; | ||
@@ -35,0 +35,0 @@ |
+3
-3
| { | ||
| "name": "sucrase", | ||
| "version": "3.35.0", | ||
| "version": "3.35.1", | ||
| "description": "Super-fast alternative to Babel for when you can target modern JS runtimes", | ||
@@ -68,3 +68,3 @@ "author": "Alan Pierce <alangpierce@gmail.com>", | ||
| "prettier": "^2.8.8", | ||
| "sucrase": "^3.34.0", | ||
| "sucrase": "^3.35.0", | ||
| "test262-harness": "^10.0.0", | ||
@@ -77,6 +77,6 @@ "ts-interface-builder": "^0.3.3", | ||
| "commander": "^4.0.0", | ||
| "glob": "^10.3.10", | ||
| "lines-and-columns": "^1.1.6", | ||
| "mz": "^2.7.0", | ||
| "pirates": "^4.0.1", | ||
| "tinyglobby": "^0.2.11", | ||
| "ts-interface-checker": "^0.1.9" | ||
@@ -83,0 +83,0 @@ }, |
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
1137073
0.01%+ Added
+ Added
+ Added
+ Added
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed