New Research: Supply Chain Attack on Axios Pulls Malicious Dependency from npm.Details
Socket
Book a DemoSign in
Socket

vscode-cpptools

Package Overview
Dependencies
Maintainers
1
Versions
27
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

vscode-cpptools - npm Package Compare versions

Comparing version
6.1.0
to
6.2.0
+70
jobs/cg.yml
name: $(date:yyyyMMdd)$(rev:.r)
trigger:
branches:
include:
- main
schedules:
- cron: 30 5 * * 0
branches:
include:
- main
always: true
resources:
repositories:
- repository: MicroBuildTemplate
type: git
name: 1ESPipelineTemplates/MicroBuildTemplate
ref: refs/tags/release
extends:
template: azure-pipelines/MicroBuild.1ES.Official.yml@MicroBuildTemplate
parameters:
pool:
name: AzurePipelines-EO
image: AzurePipelinesWindows2022compliantGPT
os: windows
sdl:
sourceAnalysisPool:
name: AzurePipelines-EO
image: AzurePipelinesWindows2022compliantGPT
os: windows
policheck:
enabled: true
tsa:
enabled: false
featureFlags:
autoBaseline: false
stages:
- stage: build
jobs:
- job: Phase_1
displayName: Build
timeoutInMinutes: 60
cancelTimeoutInMinutes: 1
templateContext:
outputs:
- output: pipelineArtifact
displayName: 'output'
condition: succeeded()
targetPath: out
artifactName: out
steps:
- checkout: self
- task: UseNode@1
displayName: Use Node 18.x
inputs:
version: 18.x
- task: Npm@1
displayName: 'npm install'
- task: Npm@1
displayName: 'npm run compile'
inputs:
command: custom
customCommand: 'run compile'
<!-- BEGIN MICROSOFT SECURITY.MD V0.0.7 BLOCK -->
## Security
Microsoft takes the security of our software products and services seriously, which includes all source code repositories managed through our GitHub organizations, which include [Microsoft](https://github.com/Microsoft), [Azure](https://github.com/Azure), [DotNet](https://github.com/dotnet), [AspNet](https://github.com/aspnet), [Xamarin](https://github.com/xamarin), and [our GitHub organizations](https://opensource.microsoft.com/).
If you believe you have found a security vulnerability in any Microsoft-owned repository that meets [Microsoft's definition of a security vulnerability](https://aka.ms/opensource/security/definition), please report it to us as described below.
## Reporting Security Issues
**Please do not report security vulnerabilities through public GitHub issues.**
Instead, please report them to the Microsoft Security Response Center (MSRC) at [https://msrc.microsoft.com/create-report](https://aka.ms/opensource/security/create-report).
If you prefer to submit without logging in, send email to [secure@microsoft.com](mailto:secure@microsoft.com). If possible, encrypt your message with our PGP key; please download it from the [Microsoft Security Response Center PGP Key page](https://aka.ms/opensource/security/pgpkey).
You should receive a response within 24 hours. If for some reason you do not, please follow up via email to ensure we received your original message. Additional information can be found at [microsoft.com/msrc](https://aka.ms/opensource/security/msrc).
Please include the requested information listed below (as much as you can provide) to help us better understand the nature and scope of the possible issue:
* Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.)
* Full paths of source file(s) related to the manifestation of the issue
* The location of the affected source code (tag/branch/commit or direct URL)
* Any special configuration required to reproduce the issue
* Step-by-step instructions to reproduce the issue
* Proof-of-concept or exploit code (if possible)
* Impact of the issue, including how an attacker might exploit the issue
This information will help us triage your report more quickly.
If you are reporting for a bug bounty, more complete reports can contribute to a higher bounty award. Please visit our [Microsoft Bug Bounty Program](https://aka.ms/opensource/security/bounty) page for more details about our active programs.
## Preferred Languages
We prefer all communications to be in English.
## Policy
Microsoft follows the principle of [Coordinated Vulnerability Disclosure](https://aka.ms/opensource/security/cvd).
<!-- END MICROSOFT SECURITY.MD BLOCK -->
+2
-1

@@ -45,3 +45,4 @@ import { CppToolsApi, CppToolsExtension, Version } from './api';

IntelliSenseCompiling = 3,
IntelliSenseReady = 4
IntelliSenseReady = 4,
Idle = 5
}

@@ -48,0 +49,0 @@ /**

@@ -28,2 +28,3 @@ /* --------------------------------------------------------------------------------------------

Status[Status["IntelliSenseReady"] = 4] = "IntelliSenseReady";
Status[Status["Idle"] = 5] = "Idle";
})(Status = exports.Status || (exports.Status = {}));

@@ -30,0 +31,0 @@ function isCppToolsTestExtension(extension) {

{
"name": "vscode-cpptools",
"version": "6.1.0",
"version": "6.2.0",
"description": "Public API for vscode-cpptools",

@@ -5,0 +5,0 @@ "typings": "./out/api.d.ts",

@@ -85,1 +85,2 @@ # Public API for the ms-vscode.cpptools VS Code extension

contact [opencode@microsoft.com](mailto:opencode@microsoft.com) with any additional questions or comments.

@@ -56,3 +56,4 @@ /* --------------------------------------------------------------------------------------------

IntelliSenseCompiling = 3,
IntelliSenseReady = 4
IntelliSenseReady = 4,
Idle = 5
}

@@ -59,0 +60,0 @@

@@ -0,0 +0,0 @@ {