stealthy-requirev0.1.0
Copy SHA256
License: Permissive (ISC)
Published: over 8 years ago
The closest you can get to require something with bypassing the require cache
Fail
Risk: Vulnerabilities
3 severe vulnerabilities exploited
SAFE Assessment
Compliance
Licenses
No license compliance issues
Secrets
No sensitive information found
Security
Vulnerabilities
3 severe vulnerabilities exploited
Hardening
No application hardening issues
Threats
Tampering
No evidence of software tampering
Malware
No evidence of malware inclusion
Issues
high
Detected presence of high severity vulnerabilities.
vulnerabilities
high
Detected presence of critical severity vulnerabilities.
vulnerabilities
high
Detected presence of severe vulnerabilities with active exploitation.
vulnerabilities
medium
Detected presence of medium severity vulnerabilities.
vulnerabilities
Behaviors
No behaviors found
Vulnerabilities
Downloads
1.28B
Recorded Downloads Since 2021
Maintenance
1
Maintainer
Dependencies
1
Declared Dependencies
Dependents
366
Dependents
Issues per Version Graph
Scanned 7 days ago