Installations
npm install @swissquote/rollup-plugin-eslint
Developer Guide
Typescript
No
Module System
CommonJS
Node Version
16.13.2
NPM Version
8.1.2
Score
48
Supply Chain
86.1
Quality
76.2
Maintenance
100
Vulnerability
97
License
Releases
Contributors
Languages
JavaScript (94.81%)
TypeScript (3.5%)
SCSS (1.29%)
CSS (0.22%)
Shell (0.18%)
Developer
Download Statistics
Total Downloads
16,621
Last Day
6
Last Week
6
Last Month
35
Last Year
1,258
GitHub Statistics
31 Stars
3,091 Commits
13 Forks
4 Watching
11 Branches
16 Contributors
Package Meta Information
Latest Version
1.22.3
Package Id
@swissquote/rollup-plugin-eslint@1.22.3
Unpacked Size
5.07 kB
Size
2.08 kB
File Count
3
NPM Version
8.1.2
Node Version
16.13.2
Publised On
26 Apr 2023
Total Downloads
Cumulative downloads
Total Downloads
16,621
Last day
0%
6
Compared to previous day
Last week
500%
6
Compared to previous week
Last month
84.2%
35
Compared to previous month
Last year
-76.2%
1,258
Compared to previous year
Daily Downloads
Weekly Downloads
Monthly Downloads
Yearly Downloads
Dependencies
2
Dev Dependencies
5
@swissquote/rollup-plugin-eslint
Rollup plugin to verify entry point and all imported files with ESLint.
This plugin is a fork of rollup-plugin-eslint with one difference Linting is done on all files and a single report is printed at the end of the run this allows to lint all files and not fail after the first one.
Install
1yarn add @swissquote/rollup-plugin-eslint --dev
Usage
1import { rollup } from "rollup"; 2import eslint from "@swissquote/rollup-plugin-eslint"; 3 4export default { 5 input: "main.js", 6 plugins: [ 7 eslint({ 8 /* your options */ 9 }) 10 ] 11};
Options
See more options here eslint-config.
You can also use eslint configuration in the form of a .eslintrc.*
file in your project's root. It will be loaded automatically.
fix
Type: boolean
Default: false
If true, will auto fix source code.
throwOnError
Type: boolean
Default: false
If true, will throw an error if any errors were found.
throwOnWarning
Type: boolean
Default: false
If true, will throw an error if any warnings were found.
include
Type: array
or string
Default: []
A single file, or array of files, to include when linting.
exclude
Type: array
or string
or RegExp
Default: /node_modules/
A single file, or array of files, to exclude when linting.
formatter
Type: function
or string
Default: stylish
Custom error formatter or the name of a built-in formatter.
License
MIT © Bogdan Chadkin
No vulnerabilities found.
Reason
no dangerous workflow patterns detected
Reason
30 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10
Reason
no binaries found in the repo
Reason
license file detected
Details
- Info: project has a license file: LICENSE:0
- Info: FSF or OSI recognized license: Apache License 2.0: LICENSE:0
Reason
SAST tool detected but not run on all commits
Details
- Info: SAST configuration detected: CodeQL
- Warn: 26 commits out of 27 are checked with a SAST tool
Reason
2 existing vulnerabilities detected
Details
- Warn: Project is vulnerable to: GHSA-c7qv-q95q-8v27
- Warn: Project is vulnerable to: GHSA-9wv6-86v2-598j
Reason
Found 1/26 approved changesets -- score normalized to 0
Reason
detected GitHub workflow tokens with excessive permissions
Details
- Warn: no topLevel permission defined: .github/workflows/codeql-analysis.yml:1
- Warn: no topLevel permission defined: .github/workflows/documentation.yml:1
- Warn: no topLevel permission defined: .github/workflows/nodejs.yml:1
- Warn: no topLevel permission defined: .github/workflows/sonarcloud.yml:1
- Info: no jobLevel write permissions found
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
security policy file not detected
Details
- Warn: no security policy file detected
- Warn: no security file to analyze
- Warn: no security file to analyze
- Warn: no security file to analyze
Reason
branch protection not enabled on development/release branches
Details
- Warn: branch protection not enabled for branch 'master'
Reason
project is not fuzzed
Details
- Warn: no fuzzer integrations found
Reason
dependency not pinned by hash detected -- score normalized to 0
Details
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:38: update your workflow using https://app.stepsecurity.io/secureworkflow/swissquote/crafty/codeql-analysis.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:42: update your workflow using https://app.stepsecurity.io/secureworkflow/swissquote/crafty/codeql-analysis.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:53: update your workflow using https://app.stepsecurity.io/secureworkflow/swissquote/crafty/codeql-analysis.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:67: update your workflow using https://app.stepsecurity.io/secureworkflow/swissquote/crafty/codeql-analysis.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/documentation.yml:11: update your workflow using https://app.stepsecurity.io/secureworkflow/swissquote/crafty/documentation.yml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/documentation.yml:14: update your workflow using https://app.stepsecurity.io/secureworkflow/swissquote/crafty/documentation.yml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/documentation.yml:19: update your workflow using https://app.stepsecurity.io/secureworkflow/swissquote/crafty/documentation.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/nodejs.yml:23: update your workflow using https://app.stepsecurity.io/secureworkflow/swissquote/crafty/nodejs.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/sonarcloud.yml:13: update your workflow using https://app.stepsecurity.io/secureworkflow/swissquote/crafty/sonarcloud.yml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/sonarcloud.yml:18: update your workflow using https://app.stepsecurity.io/secureworkflow/swissquote/crafty/sonarcloud.yml/master?enable=pin
- Info: 2 out of 9 GitHub-owned GitHubAction dependencies pinned
- Info: 0 out of 3 third-party GitHubAction dependencies pinned
Score
4.8
/10
Last Scanned on 2024-12-16
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More