veryfront
Advanced tools
+1
-1
| export default { | ||
| "name": "veryfront", | ||
| "version": "0.1.60", | ||
| "version": "0.1.61", | ||
| "license": "Apache-2.0", | ||
@@ -5,0 +5,0 @@ "nodeModulesDir": "auto", |
@@ -274,2 +274,6 @@ import * as dntShim from "../../_dnt.shims.js"; | ||
| } | ||
| agentLogger.error("Chat handler error", { | ||
| error: error instanceof Error ? error.message : String(error), | ||
| stack: error instanceof Error ? error.stack : undefined, | ||
| }); | ||
| return dntShim.Response.json({ error: "Internal server error" }, { status: 500 }); | ||
@@ -276,0 +280,0 @@ } |
+1
-1
| { | ||
| "name": "veryfront", | ||
| "version": "0.1.60", | ||
| "version": "0.1.61", | ||
| "description": "The simplest way to build AI-powered apps", | ||
@@ -5,0 +5,0 @@ "keywords": [ |
+1
-1
| export default { | ||
| "name": "veryfront", | ||
| "version": "0.1.60", | ||
| "version": "0.1.61", | ||
| "license": "Apache-2.0", | ||
@@ -5,0 +5,0 @@ "nodeModulesDir": "auto", |
@@ -428,2 +428,7 @@ import * as dntShim from "../../_dnt.shims.js"; | ||
| agentLogger.error("Chat handler error", { | ||
| error: error instanceof Error ? error.message : String(error), | ||
| stack: error instanceof Error ? error.stack : undefined, | ||
| }); | ||
| return dntShim.Response.json( | ||
@@ -430,0 +435,0 @@ { error: "Internal server error" }, |
Network access
Supply chain riskThis module accesses the network.
Found 2 instances in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 2 instances in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 5 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 2 instances in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 2 instances in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 5 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
16722063
0349337
0