Let your JS API users either give you a callback or receive a promise
Installations
npm install call-me-maybe
Developer
limulus
Developer Guide
Module System
CommonJS
Min. Node Version
Typescript Support
No
Node Version
18.12.0
NPM Version
8.19.2
Statistics
39 Stars
25 Commits
4 Forks
3 Watching
3 Branches
2 Contributors
Updated on 29 Apr 2024
Languages
JavaScript (98.4%)
Shell (1.6%)
Total Downloads
Cumulative downloads
Total Downloads
2,101,237,057
Last day
-22.9%
1,152,037
Compared to previous day
Last week
-6.1%
7,551,821
Compared to previous week
Last month
7.2%
32,965,318
Compared to previous month
Last year
-15.3%
355,655,129
Compared to previous year
Daily Downloads
Weekly Downloads
Monthly Downloads
Yearly Downloads
call-me-maybe
Let your JS API users either give you a callback or receive a promise.
Usage
1var maybe = require("call-me-maybe") 2 3module.exports = function asyncFunc (cb) { 4 return maybe(cb, new Promise(function(resolve, reject) { 5 // ... 6 })) 7}
API
maybe(cb, promise)
If the callback cb
is truthy, returns undefined
and will call cb
when promise
is settled. The parameters passed to cb
are standard error-first:
- If
promise
is fulfilled, then it is called with the result of the promise:cb(null, result)
- If
promise
is rejected, then it is called with the rejection error:cb(err)
If cb
is falsey, then promise
is returned.
No vulnerabilities found.
Reason
no dangerous workflow patterns detected
Reason
no binaries found in the repo
Reason
license file detected
Details
- Info: project has a license file: LICENSE:0
- Info: FSF or OSI recognized license: MIT License: LICENSE:0
Reason
dependency not pinned by hash detected -- score normalized to 3
Details
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/continuous-release.yaml:43: update your workflow using https://app.stepsecurity.io/secureworkflow/limulus/call-me-maybe/continuous-release.yaml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/continuous-release.yaml:44: update your workflow using https://app.stepsecurity.io/secureworkflow/limulus/call-me-maybe/continuous-release.yaml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/continuous-release.yaml:13: update your workflow using https://app.stepsecurity.io/secureworkflow/limulus/call-me-maybe/continuous-release.yaml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/continuous-release.yaml:14: update your workflow using https://app.stepsecurity.io/secureworkflow/limulus/call-me-maybe/continuous-release.yaml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/continuous-release.yaml:25: update your workflow using https://app.stepsecurity.io/secureworkflow/limulus/call-me-maybe/continuous-release.yaml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/continuous-release.yaml:26: update your workflow using https://app.stepsecurity.io/secureworkflow/limulus/call-me-maybe/continuous-release.yaml/master?enable=pin
- Info: 0 out of 6 GitHub-owned GitHubAction dependencies pinned
- Info: 3 out of 3 npmCommand dependencies pinned
Reason
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Reason
Found 1/24 approved changesets -- score normalized to 0
Reason
detected GitHub workflow tokens with excessive permissions
Details
- Warn: no topLevel permission defined: .github/workflows/continuous-release.yaml:1
- Info: no jobLevel write permissions found
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
security policy file not detected
Details
- Warn: no security policy file detected
- Warn: no security file to analyze
- Warn: no security file to analyze
- Warn: no security file to analyze
Reason
project is not fuzzed
Details
- Warn: no fuzzer integrations found
Reason
branch protection not enabled on development/release branches
Details
- Warn: branch protection not enabled for branch 'master'
- Warn: branch protection not enabled for branch 'next'
- Warn: branch protection not enabled for branch 'beta'
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
- Warn: 0 commits out of 2 are checked with a SAST tool
Reason
32 existing vulnerabilities detected
Details
- Warn: Project is vulnerable to: GHSA-qwcr-r2fm-qrc7
- Warn: Project is vulnerable to: GHSA-grv7-fg5c-xmjg
- Warn: Project is vulnerable to: GHSA-x9w5-v3q2-3rhw
- Warn: Project is vulnerable to: GHSA-pxg6-pf52-xh8x
- Warn: Project is vulnerable to: GHSA-3xgq-45jj-v275
- Warn: Project is vulnerable to: GHSA-9vvw-cc9w-f27h
- Warn: Project is vulnerable to: GHSA-gxpj-cx7g-858c
- Warn: Project is vulnerable to: GHSA-h6ch-v84p-w6p9
- Warn: Project is vulnerable to: GHSA-434g-2637-qmqr
- Warn: Project is vulnerable to: GHSA-49q7-c7j4-3p7m
- Warn: Project is vulnerable to: GHSA-977x-g7h5-7qgw
- Warn: Project is vulnerable to: GHSA-f7q4-pwc6-w24p
- Warn: Project is vulnerable to: GHSA-fc9h-whq2-v747
- Warn: Project is vulnerable to: GHSA-r7qp-cfhv-p84w
- Warn: Project is vulnerable to: GHSA-q9mw-68c2-j6m5
- Warn: Project is vulnerable to: GHSA-jchw-25xp-jwwc
- Warn: Project is vulnerable to: GHSA-cxjh-pqwp-8mfp
- Warn: Project is vulnerable to: GHSA-qh2h-chj9-jffq
- Warn: Project is vulnerable to: GHSA-rc47-6667-2j5j
- Warn: Project is vulnerable to: GHSA-78xj-cgh5-2h22
- Warn: Project is vulnerable to: GHSA-2p57-rm9w-gvfp
- Warn: Project is vulnerable to: GHSA-952p-6rrq-rcjv
- Warn: Project is vulnerable to: GHSA-hxm2-r34f-qmc5
- Warn: Project is vulnerable to: GHSA-f8q6-p94x-37v3
- Warn: Project is vulnerable to: GHSA-vh95-rmgr-6w4m / GHSA-xvch-5gv4-984h
- Warn: Project is vulnerable to: GHSA-w9mr-4mfr-499f
- Warn: Project is vulnerable to: GHSA-c2qf-rxjj-qqgw
- Warn: Project is vulnerable to: GHSA-25hc-qcg6-38wj
- Warn: Project is vulnerable to: GHSA-cqmj-92xf-r6r9
- Warn: Project is vulnerable to: GHSA-f5x3-32g6-xq36
- Warn: Project is vulnerable to: GHSA-fhg7-m89q-25r3
- Warn: Project is vulnerable to: GHSA-3h5v-q93c-6h6q
Score
2.7
/10
Last Scanned on 2024-11-25
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More