vg-coder-cli
Advanced tools
+1
-1
| { | ||
| "name": "vg-coder-cli", | ||
| "version": "2.0.79", | ||
| "version": "2.0.80", | ||
| "description": "🚀 CLI tool to analyze projects, concatenate source files, count tokens, and export HTML with syntax highlighting and copy functionality", | ||
@@ -5,0 +5,0 @@ "main": "src/index.js", |
@@ -863,2 +863,33 @@ const express = require('express'); | ||
| // Return launcher SW console log buffer remotely so callers don't have to | ||
| // open chrome://extensions DevTools per profile. Pin via chromeId/ | ||
| // workerLabel like other launcher endpoints; bare call broadcasts to all. | ||
| // Body/query: { chromeId? | workerLabel? | all?, since?, level?, limit?, clear? } | ||
| this.app.get('/api/launcher/logs', async (req, res) => { | ||
| try { | ||
| const q = req.query || {}; | ||
| const opts = launcherOpts({}, q) || { all: true }; | ||
| const result = await taskQueue.requestLauncher('launcher:logs', { | ||
| since: q.since ? Number(q.since) : 0, | ||
| level: q.level || null, | ||
| limit: q.limit ? Number(q.limit) : 200, | ||
| clear: q.clear === 'true' || q.clear === '1', | ||
| }, opts, 5_000); | ||
| res.json(result); | ||
| } catch (e) { res.status(launcherErr(e)).json({ error: e.message }); } | ||
| }); | ||
| this.app.post('/api/launcher/logs', async (req, res) => { | ||
| try { | ||
| const body = req.body || {}; | ||
| const opts = launcherOpts(body) || (body.all ? { all: true } : {}); | ||
| const result = await taskQueue.requestLauncher('launcher:logs', { | ||
| since: body.since ? Number(body.since) : 0, | ||
| level: body.level || null, | ||
| limit: body.limit ? Number(body.limit) : 200, | ||
| clear: !!body.clear, | ||
| }, opts, 5_000); | ||
| res.json(result); | ||
| } catch (e) { res.status(launcherErr(e)).json({ error: e.message }); } | ||
| }); | ||
| // Proxy a chrome.* command through a worker (content-script → SW | ||
@@ -865,0 +896,0 @@ // message bridge). Use when the launcher SW socket is offline but the |
Sorry, the diff of this file is too big to display
AI-detected potential malware
Supply chain riskAI has identified this package as malware. This is a strong signal that the package may be malicious.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 2 instances in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 5 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 2 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
AI-detected potential malware
Supply chain riskAI has identified this package as malware. This is a strong signal that the package may be malicious.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 2 instances in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 5 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 2 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
10894962
0.1%18518
0.16%