Installations
npm install @kronos-integration/service-uti
Developer Guide
Typescript
No
Module System
ESM
Min. Node Version
>=22.11.0
Node Version
22.11.0
NPM Version
10.9.0
Score
65.2
Supply Chain
72.4
Quality
83.7
Maintenance
100
Vulnerability
100
License
Releases
Contributors
Languages
JavaScript (100%)
Developer
Kronos-Integration
Download Statistics
Total Downloads
35,803
Last Day
2
Last Week
34
Last Month
95
Last Year
2,996
GitHub Statistics
2,870 Commits
3 Watching
1 Branches
3 Contributors
Package Meta Information
Latest Version
2.0.184
Package Id
@kronos-integration/service-uti@2.0.184
Unpacked Size
5.55 kB
Size
2.50 kB
File Count
5
NPM Version
10.9.0
Node Version
22.11.0
Publised On
09 Nov 2024
Total Downloads
Cumulative downloads
Total Downloads
35,803
Last day
0%
2
Compared to previous day
Last week
41.7%
34
Compared to previous week
Last month
-47.2%
95
Compared to previous month
Last year
-68.7%
2,996
Compared to previous year
Daily Downloads
Weekly Downloads
Monthly Downloads
Yearly Downloads
Dev Dependencies
4
No vulnerabilities found.
Reason
no binaries found in the repo
Reason
30 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10
Reason
no dangerous workflow patterns detected
Reason
license file detected
Details
- Info: project has a license file: LICENSE:0
- Info: FSF or OSI recognized license: BSD Zero Clause License: LICENSE:0
Reason
packaging workflow detected
Details
- Info: Project packages its releases by way of GitHub Actions.: .github/workflows/ci.yml:41
Reason
1 existing vulnerabilities detected
Details
- Warn: Project is vulnerable to: GHSA-g3ch-rx76-35fx
Reason
SAST tool detected but not run on all commits
Details
- Info: SAST configuration detected: CodeQL
- Warn: 19 commits out of 30 are checked with a SAST tool
Reason
dependency not pinned by hash detected -- score normalized to 3
Details
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/auto_approve.yml:7: update your workflow using https://app.stepsecurity.io/secureworkflow/Kronos-Integration/service-uti/auto_approve.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yml:22: update your workflow using https://app.stepsecurity.io/secureworkflow/Kronos-Integration/service-uti/ci.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yml:24: update your workflow using https://app.stepsecurity.io/secureworkflow/Kronos-Integration/service-uti/ci.yml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/ci.yml:34: update your workflow using https://app.stepsecurity.io/secureworkflow/Kronos-Integration/service-uti/ci.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yml:52: update your workflow using https://app.stepsecurity.io/secureworkflow/Kronos-Integration/service-uti/ci.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yml:54: update your workflow using https://app.stepsecurity.io/secureworkflow/Kronos-Integration/service-uti/ci.yml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/ci.yml:73: update your workflow using https://app.stepsecurity.io/secureworkflow/Kronos-Integration/service-uti/ci.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql_analysis.yml:15: update your workflow using https://app.stepsecurity.io/secureworkflow/Kronos-Integration/service-uti/codeql_analysis.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql_analysis.yml:20: update your workflow using https://app.stepsecurity.io/secureworkflow/Kronos-Integration/service-uti/codeql_analysis.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql_analysis.yml:24: update your workflow using https://app.stepsecurity.io/secureworkflow/Kronos-Integration/service-uti/codeql_analysis.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql_analysis.yml:31: update your workflow using https://app.stepsecurity.io/secureworkflow/Kronos-Integration/service-uti/codeql_analysis.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/pr_labeler.yml:10: update your workflow using https://app.stepsecurity.io/secureworkflow/Kronos-Integration/service-uti/pr_labeler.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/update_package_lock.yml:19: update your workflow using https://app.stepsecurity.io/secureworkflow/Kronos-Integration/service-uti/update_package_lock.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/update_package_lock.yml:21: update your workflow using https://app.stepsecurity.io/secureworkflow/Kronos-Integration/service-uti/update_package_lock.yml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/update_package_lock.yml:33: update your workflow using https://app.stepsecurity.io/secureworkflow/Kronos-Integration/service-uti/update_package_lock.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/update_readme_api.yml:13: update your workflow using https://app.stepsecurity.io/secureworkflow/Kronos-Integration/service-uti/update_readme_api.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/update_readme_api.yml:15: update your workflow using https://app.stepsecurity.io/secureworkflow/Kronos-Integration/service-uti/update_readme_api.yml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/update_readme_api.yml:22: update your workflow using https://app.stepsecurity.io/secureworkflow/Kronos-Integration/service-uti/update_readme_api.yml/master?enable=pin
- Warn: npmCommand not pinned by hash: .github/workflows/update_package_lock.yml:30
- Info: 0 out of 13 GitHub-owned GitHubAction dependencies pinned
- Info: 0 out of 5 third-party GitHubAction dependencies pinned
- Info: 4 out of 5 npmCommand dependencies pinned
Reason
Found 0/9 approved changesets -- score normalized to 0
Reason
detected GitHub workflow tokens with excessive permissions
Details
- Info: jobLevel 'contents' permission set to 'read': .github/workflows/pr_labeler.yml:6
- Warn: no topLevel permission defined: .github/workflows/auto_approve.yml:1
- Info: topLevel 'contents' permission set to 'read': .github/workflows/ci.yml:12
- Warn: no topLevel permission defined: .github/workflows/codeql_analysis.yml:1
- Warn: no topLevel permission defined: .github/workflows/pr_labeler.yml:1
- Warn: no topLevel permission defined: .github/workflows/update_package_lock.yml:1
- Warn: no topLevel permission defined: .github/workflows/update_readme_api.yml:1
- Info: no jobLevel write permissions found
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
project is not fuzzed
Details
- Warn: no fuzzer integrations found
Reason
security policy file not detected
Details
- Warn: no security policy file detected
- Warn: no security file to analyze
- Warn: no security file to analyze
- Warn: no security file to analyze
Reason
branch protection not enabled on development/release branches
Details
- Warn: branch protection not enabled for branch 'master'
Score
5.3
/10
Last Scanned on 2024-12-23
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More