+4
-4
@@ -97,6 +97,6 @@ var __create = Object.create; | ||
| } | ||
| if (stdout !== `workerd ${"2026-02-19"}`) { | ||
| if (stdout !== `workerd ${"2026-02-26"}`) { | ||
| throw new Error( | ||
| `Expected ${JSON.stringify( | ||
| "2026-02-19" | ||
| "2026-02-26" | ||
| )} but got ${JSON.stringify(stdout)}` | ||
@@ -156,3 +156,3 @@ ); | ||
| import_child_process.default.execSync( | ||
| `npm install --loglevel=error --prefer-offline --no-audit --progress=false ${pkg}@${"1.20260219.0"}`, | ||
| `npm install --loglevel=error --prefer-offline --no-audit --progress=false ${pkg}@${"1.20260226.1"}`, | ||
| { cwd: installDir, stdio: "pipe", env } | ||
@@ -202,3 +202,3 @@ ); | ||
| const unscopedPkg = pkg.substring(pkg.indexOf("/") + 1); | ||
| const url = `https://registry.npmjs.org/${pkg}/-/${unscopedPkg}-${"1.20260219.0"}.tgz`; | ||
| const url = `https://registry.npmjs.org/${pkg}/-/${unscopedPkg}-${"1.20260226.1"}.tgz`; | ||
| console.error(`[workerd] Trying to download ${JSON.stringify(url)}`); | ||
@@ -205,0 +205,0 @@ try { |
+3
-3
@@ -139,3 +139,3 @@ #!/usr/bin/env node | ||
| "workerd", | ||
| `pnpapi-${pkg.replace("/", "-")}-${"1.20260219.0"}-${import_path.default.basename(subpath)}` | ||
| `pnpapi-${pkg.replace("/", "-")}-${"1.20260226.1"}-${import_path.default.basename(subpath)}` | ||
| ); | ||
@@ -155,4 +155,4 @@ if (!import_fs.default.existsSync(binTargetPath)) { | ||
| var node_path_default = binPath; | ||
| var compatibilityDate = "2026-02-19"; | ||
| var version = "1.20260219.0"; | ||
| var compatibilityDate = "2026-02-26"; | ||
| var version = "1.20260226.1"; | ||
| // Annotate the CommonJS export names for ESM import in node: | ||
@@ -159,0 +159,0 @@ 0 && (module.exports = { |
+6
-6
| { | ||
| "name": "workerd", | ||
| "version": "1.20260219.0", | ||
| "version": "1.20260226.1", | ||
| "description": "👷 workerd, Cloudflare's JavaScript/Wasm Runtime", | ||
@@ -17,9 +17,9 @@ "repository": "https://github.com/cloudflare/workerd", | ||
| "optionalDependencies": { | ||
| "@cloudflare/workerd-darwin-arm64": "1.20260219.0", | ||
| "@cloudflare/workerd-darwin-64": "1.20260219.0", | ||
| "@cloudflare/workerd-linux-arm64": "1.20260219.0", | ||
| "@cloudflare/workerd-linux-64": "1.20260219.0", | ||
| "@cloudflare/workerd-windows-64": "1.20260219.0" | ||
| "@cloudflare/workerd-darwin-arm64": "1.20260226.1", | ||
| "@cloudflare/workerd-darwin-64": "1.20260226.1", | ||
| "@cloudflare/workerd-linux-arm64": "1.20260226.1", | ||
| "@cloudflare/workerd-linux-64": "1.20260226.1", | ||
| "@cloudflare/workerd-windows-64": "1.20260226.1" | ||
| }, | ||
| "license": "Apache-2.0" | ||
| } |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is not supported yet
Network access
Supply chain riskThis module accesses the network.
Found 2 instances in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 2 instances in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
4667891
0.38%