Home
Docs
GitHub
Pricing
Blog
Log In

Run Sandworm Audit for your App

Get started
Hold on, we're currently generating a fresh version of this report
Generated on Apr 11, 2024 via pnpm
Package summary
Share
1
issue
1
high severity
meta
1
5
licenses
25
MIT
4
ISC
3
BSD-3-Clause
2
other licenses
Apache-2.0
1
(MIT OR CC0-1.0)
1
Package created
22 Jul 2015
Version published
18 Sep 2023
Maintainers
1
Total deps
34
Direct deps
2
License
Apache-2.0

Issues

1

1 high severity issue

high
via: snyk@1.1221.0
Collapse
Expand

Licenses

MIT License

Permissive
OSI Approved
This is a human-readable summary of (and not a substitute for) the license. Disclaimer.
Can
commercial-use
modify
distribute
sublicense
private-use
Cannot
hold-liable
Must
include-copyright
include-license
25 Packages, Including:
@sentry-internal/tracing@7.109.0
@sentry/core@7.109.0
@sentry/node@7.109.0
@sentry/types@7.109.0
@sentry/utils@7.109.0
boolean@3.2.0
define-data-property@1.1.4
define-properties@1.2.1
detect-node@2.1.0
es-define-property@1.0.0
es-errors@1.3.0
es6-error@4.1.1
escape-string-regexp@4.0.0
function-bind@1.1.2
get-intrinsic@1.2.4
globalthis@1.0.3
gopd@1.0.1
has-property-descriptors@1.0.2
has-proto@1.0.3
has-symbols@1.0.3
hasown@2.0.2
matcher@3.0.0
object-keys@1.1.1
semver-compare@1.0.0
serialize-error@7.0.1

ISC License

Permissive
OSI Approved
This is a human-readable summary of (and not a substitute for) the license. Disclaimer.
Can
commercial-use
modify
distribute
Cannot
hold-liable
Must
include-copyright
include-license
4 Packages, Including:
json-stringify-safe@5.0.1
lru-cache@6.0.0
semver@7.6.0
yallist@4.0.0

BSD 3-Clause "New" or "Revised" License

Permissive
OSI Approved
This is a human-readable summary of (and not a substitute for) the license. Disclaimer.
Can
commercial-use
modify
distribute
place-warranty
Cannot
use-trademark
hold-liable
Must
include-copyright
include-license
3 Packages, Including:
global-agent@3.0.0
roarr@2.15.4
sprintf-js@1.1.3

Apache License 2.0

Permissive
OSI Approved
This is a human-readable summary of (and not a substitute for) the license. Disclaimer.
Can
commercial-use
modify
distribute
sublicense
private-use
use-patent-claims
place-warranty
Cannot
hold-liable
use-trademark
Must
include-copyright
include-license
state-changes
include-notice
1 Packages, Including:
snyk@1.1221.0

(MIT OR CC0-1.0)

Public Domain
1 Packages, Including:
type-fest@0.13.1
Disclaimer

This deed highlights only some of the key features and terms of the actual license. It is not a license and has no legal value. You should carefully review all of the terms and conditions of the actual license before using the licensed material.

Sandworm is not a law firm and does not provide legal services. Distributing, displaying, or linking to this deed or the license that it summarizes does not create a lawyer-client or any other relationship.

Direct Dependencies

2
All Dependencies CSV
β“˜ This is a list of snyk 's direct dependencies. Data on all dependencies, including transitive ones, is available via CSV download.
NameVersionSizeLicenseTypeVulnerabilities
@sentry/node7.109.01 BMIT
prod
global-agent3.0.029.83 kBBSD-3-Clause
prod

Visualizations

Frequently Asked Questions

What does snyk do?

Snyk is a cloud-native, developer-oriented tool designed to scan and monitor your projects for security vulnerabilities. It covers multiple areas of application security including open source security management, code vulnerabilities, container vulnerability management, and infrastructure as code security. Whether you work with Java, .NET, JavaScript, Python, Golang, PHP, C/C++, Ruby, Scala or other languages, Snyk has got you covered. Besides supporting various languages, Snyk CLI also extends its support to Docker scanning and Infrastructure as Code files scanning. It gives you the power to find and automatically fix open source vulnerabilities, find and fix vulnerabilities in your real-time application code, handle vulnerabilities in container images and Kubernetes applications, and identify and fix insecure configurations in Terraform and Kubernetes code.

How do you use snyk?

To use Snyk, the first step is to install the Snyk CLI. The CLI offers the functionality of Snyk in your development workflow and it can be run locally or in your CI/CD pipeline. You can install it through multiple channels like npm or Yarn, standalone executables, Homebrew, Scoop, or Docker. After installing Snyk CLI, you need to connect it with Snyk.io APIs by running the command snyk auth. Depending on your project's language, you might need to set up your language environment using the Language Support documentation. Snyk CLI can scan your project by running snyk test in a folder with a supported project. It can also monitor your project periodically and alert you for new vulnerabilities through the snyk monitor command. Using Snyk in your CI/CD by adding integrations makes it even more powerful as it continuously scans and monitors your projects for vulnerabilities.

Where are the snyk docs?

The Snyk docs can be accessed from the comprehensive Snyk CLI help which can be viewed by running snyk --help. Further support and answers for specific questions can be obtained from the Language Support documentation or by contacting Snyk's support. For deeper insights on how Snyk CLI is implemented, you can check out the design decisions. You can also dive into other projects and tools covered in this repository like @snyk/fix and @snyk/protect. For any security issues or concerns, please see SECURITY.md file in this repository. When you use Snyk's API, whether through the 'snyk' npm package or otherwise, you are subjected to their Terms & Conditions.