Gathering detailed insights and metrics for @duplotech/confusing-browser-globals
Gathering detailed insights and metrics for @duplotech/confusing-browser-globals
npm install @duplotech/confusing-browser-globals
Typescript
Module System
Node Version
NPM Version
67.5
Supply Chain
77.1
Quality
75.4
Maintenance
100
Vulnerability
100
License
JavaScript (98.1%)
Shell (1.33%)
TypeScript (0.22%)
CSS (0.15%)
HTML (0.12%)
AppleScript (0.09%)
Total Downloads
2,192
Last Day
1
Last Week
2
Last Month
31
Last Year
232
2 Stars
2,506 Commits
1 Watching
8 Branches
1 Contributors
Minified
Minified + Gzipped
Latest Version
1.0.15
Package Id
@duplotech/confusing-browser-globals@1.0.15
Unpacked Size
3.84 kB
Size
2.04 kB
File Count
4
NPM Version
lerna/3.19.0/node@v12.13.1+x64 (darwin)
Node Version
12.13.1
Cumulative downloads
Total Downloads
Last day
0%
1
Compared to previous day
Last week
-86.7%
2
Compared to previous week
Last month
106.7%
31
Compared to previous month
Last year
-27.7%
232
Compared to previous year
1
A curated list of browser globals that commonly cause confusion and are not recommended to use without an explicit window.
qualifier.
Some global variables in browser are likely to be used by people without the intent of using them as globals, such as status
, name
, event
, etc.
For example:
1handleClick() { // missing `event` argument
2 this.setState({
3 text: event.target.value // uses the `event` global: oops!
4 });
5}
This package exports a list of globals that are often used by mistake. You can feed this list to a static analysis tool like ESLint to prevent their usage without an explicit window.
qualifier.
1npm install --save confusing-browser-globals
If you use Create React App, you don't need to configure anything, as this rule is already included in the default eslint-config-react-app
preset.
If you maintain your own ESLint configuration, you can do this:
1var restrictedGlobals = require('confusing-browser-globals'); 2 3module.exports = { 4 rules: { 5 'no-restricted-globals': ['error'].concat(restrictedGlobals), 6 }, 7};
MIT
No vulnerabilities found.
Reason
no dangerous workflow patterns detected
Reason
no binaries found in the repo
Reason
license file detected
Details
Reason
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Reason
Found 0/30 approved changesets -- score normalized to 0
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
no SAST tool detected
Details
Reason
detected GitHub workflow tokens with excessive permissions
Details
Reason
security policy file not detected
Details
Reason
dependency not pinned by hash detected -- score normalized to 0
Details
Reason
project is not fuzzed
Details
Reason
branch protection not enabled on development/release branches
Details
Reason
106 existing vulnerabilities detected
Details
Score
Last Scanned on 2025-01-27
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More