Comparing version 0.3.5 to 0.4.0
@@ -1,4 +0,3 @@ | ||
#!/usr/bin/env node | ||
'use strict'; | ||
'use strict'; | ||
// Don't require these until we've hooked certain builtins | ||
@@ -445,3 +444,3 @@ var ChildProcess, | ||
// the module that it is the 'main' module. | ||
var newArgv = parseArgs(process.argv) | ||
var newArgv = parseArgs(process.argv); | ||
var Module = require('module'); | ||
@@ -448,0 +447,0 @@ process.argv = newArgv; |
{ | ||
"name": "wtfnode", | ||
"version": "0.3.5", | ||
"version": "0.4.0", | ||
"description": "Utility to help find out why Node isn't exiting", | ||
@@ -15,5 +15,5 @@ "repository": { | ||
"bin": { | ||
"wtfnode": "index.js" | ||
"wtfnode": "proxy.js" | ||
}, | ||
"license": "ISC" | ||
} |
@@ -43,2 +43,4 @@ # What? | ||
Version 0.4.0: When a module has bound SIGINT, Node will no longer be able to exit when in an infinite loop. `wtfnode` now instead launches the target by way of a watchdog proxy; you may now Ctrl+C twice to force termination. No information will be available, since no other code can be run while an infinite loop is executing, but this should at least make life a little easier. | ||
# Module usage | ||
@@ -45,0 +47,0 @@ |
Sorry, the diff of this file is not supported yet
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
26474
9
517
64
3
15