Installations
npm install furi
Score
99.1
Supply Chain
79.8
Quality
76.8
Maintenance
100
Vulnerability
100
License
Releases
Unable to fetch releases
Developer
demurgos
Developer Guide
Module System
ESM
Min. Node Version
>=14.13.1
Typescript Support
No
Node Version
NPM Version
Statistics
3 Stars
30 Commits
3 Watching
8 Branches
1 Contributors
Updated on 24 Jan 2024
Languages
TypeScript (100%)
Total Downloads
Cumulative downloads
Total Downloads
27,255,430
Last day
-38.4%
6,502
Compared to previous day
Last week
2.4%
55,300
Compared to previous week
Last month
7.9%
224,109
Compared to previous month
Last year
-32%
5,116,242
Compared to previous year
Daily Downloads
Weekly Downloads
Monthly Downloads
Yearly Downloads
furi
File URI manipulation library.
This library is intended as a toolbox to handle file://
URIs. It currently
focuses on conversion between file URIs and system dependent paths.
The conversion supports Windows UNC paths, Windows long paths, trailing separators, special characters and non-ASCII characters.
This library has no dependencies and is compatible with browsers.
Installation
1# Yarn 2yarn add furi 3# npm 4npm install --save furi
API documentation
See documentation.
References
- https://tools.ietf.org/html/rfc3986#section-3.3
- https://url.spec.whatwg.org/
- https://github.com/nodejs/node/blob/deaddd212c499c7ff88d20034753b5f3f00d5153/lib/internal/url.js#L1414
- https://github.com/nodejs/node/blob/master/test/parallel/test-url-pathtofileurl.js
- https://docs.microsoft.com/en-us/windows/desktop/FileIO/naming-a-file
License
No vulnerabilities found.
Reason
no binaries found in the repo
Reason
no dangerous workflow patterns detected
Reason
license file detected
Details
- Info: project has a license file: LICENSE.md:0
- Info: FSF or OSI recognized license: MIT License: LICENSE.md:0
Reason
6 existing vulnerabilities detected
Details
- Warn: Project is vulnerable to: GHSA-grv7-fg5c-xmjg
- Warn: Project is vulnerable to: GHSA-3xgq-45jj-v275
- Warn: Project is vulnerable to: GHSA-78xj-cgh5-2h22
- Warn: Project is vulnerable to: GHSA-2p57-rm9w-gvfp
- Warn: Project is vulnerable to: GHSA-952p-6rrq-rcjv
- Warn: Project is vulnerable to: GHSA-f5x3-32g6-xq36
Reason
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Reason
Found 0/27 approved changesets -- score normalized to 0
Reason
detected GitHub workflow tokens with excessive permissions
Details
- Warn: no topLevel permission defined: .github/workflows/check-ts.yml:1
- Info: no jobLevel write permissions found
Reason
dependency not pinned by hash detected -- score normalized to 0
Details
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/check-ts.yml:19: update your workflow using https://app.stepsecurity.io/secureworkflow/demurgos/furi/check-ts.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/check-ts.yml:22: update your workflow using https://app.stepsecurity.io/secureworkflow/demurgos/furi/check-ts.yml/main?enable=pin
- Info: 0 out of 2 GitHub-owned GitHubAction dependencies pinned
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
security policy file not detected
Details
- Warn: no security policy file detected
- Warn: no security file to analyze
- Warn: no security file to analyze
- Warn: no security file to analyze
Reason
project is not fuzzed
Details
- Warn: no fuzzer integrations found
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
- Warn: 0 commits out of 22 are checked with a SAST tool
Score
3.2
/10
Last Scanned on 2024-11-25
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More