Installations
npm install jscpd-html-reporter
Developer Guide
Typescript
No
Module System
CommonJS
Node Version
10.11.0
NPM Version
6.4.1
Score
56.7
Supply Chain
73.8
Quality
72.4
Maintenance
25
Vulnerability
97.6
License
Releases
Unable to fetch releases
Contributors
Unable to fetch Contributors
Languages
JavaScript (63.05%)
HTML (36.95%)
Love this project? Help keep it running — sponsor us today! 🚀
Developer
SpitfireSatya
Download Statistics
Total Downloads
66,665
Last Day
1
Last Week
14
Last Month
93
Last Year
3,107
GitHub Statistics
MIT License
2 Stars
7 Commits
2 Forks
2 Watchers
1 Branches
1 Contributors
Updated on Jun 22, 2019
Bundle Size
1.26 MB
Minified
399.77 kB
Minified + Gzipped
Package Meta Information
Latest Version
2.0.1
Package Id
jscpd-html-reporter@2.0.1
Unpacked Size
146.31 kB
Size
92.31 kB
File Count
12
NPM Version
6.4.1
Node Version
10.11.0
Total Downloads
Cumulative downloads
Total Downloads
66,665
Last Day
-66.7%
1
Compared to previous day
Last Week
-22.2%
14
Compared to previous week
Last Month
-6.1%
93
Compared to previous month
Last Year
-11.8%
3,107
Compared to previous year
Daily Downloads
Weekly Downloads
Monthly Downloads
Yearly Downloads
Dependencies
2
jscpd-html-reporter
An npm module which uses jscpd and git blame to generate a pretty html report for code duplicity
Installation
Install jscpd-html-reporter locally and add it to the dev dependancies
1npm install jscpd-html-reporter --save-dev
Usage
Simple require the module in your script/gulp task and invoke it with the desired config
1const jscpdHtmlReporter = require('jscpd-html-reporter'); 2 3jscpdHtmlReporter({/*config*/}, callback); 4
and you're done!!
Config
The jscpd-html-reporter takes the following config object and the default values are as below
1config: { 2 outDir: 'reports/code-duplicity', // Output directory for report. Relative to project root. 3 outFileName: 'jscpd-report.html', // Name of final html file generated. 4 files: '**/*.{js,jsx,ts,tsx}', // Glob specifying files to check for duplicity. 5 exclude: [], // Globs which should be excluded from the report. 6 minLines: 5, // Minimum lines to qualify as duplicate. 7 minTokens: 70, // Minimum tokens to qualify as duplicate. 8 blame: false // Set to true to add information of author with each duplicate line (for Git). 9}
Sample Report

No vulnerabilities found.
Reason
no binaries found in the repo
Reason
license file detected
Details
- Info: project has a license file: LICENSE:0
- Info: FSF or OSI recognized license: MIT License: LICENSE:0
Reason
no SAST tool detected
Details
- Warn: no pull requests merged into dev branch
Reason
Found 0/7 approved changesets -- score normalized to 0
Reason
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
security policy file not detected
Details
- Warn: no security policy file detected
- Warn: no security file to analyze
- Warn: no security file to analyze
- Warn: no security file to analyze
Reason
project is not fuzzed
Details
- Warn: no fuzzer integrations found
Reason
branch protection not enabled on development/release branches
Details
- Warn: branch protection not enabled for branch 'master'
Reason
24 existing vulnerabilities detected
Details
- Warn: Project is vulnerable to: GHSA-7vm7-j8p7-h346
- Warn: Project is vulnerable to: GHSA-8cxp-cjm8-fj36
- Warn: Project is vulnerable to: GHSA-6f9p-g466-f8v8
- Warn: Project is vulnerable to: GHSA-4gw3-8f77-f72c
- Warn: Project is vulnerable to: GHSA-q42p-pg8m-cqh6
- Warn: Project is vulnerable to: GHSA-w457-6q6x-cgp9
- Warn: Project is vulnerable to: GHSA-62gr-4qp9-h98f
- Warn: Project is vulnerable to: GHSA-f52g-6jhx-586p
- Warn: Project is vulnerable to: GHSA-2cf5-4w76-r9qv
- Warn: Project is vulnerable to: GHSA-3cqr-58rm-57f8
- Warn: Project is vulnerable to: GHSA-g9r4-xpmj-mj65
- Warn: Project is vulnerable to: GHSA-q2c6-c6pm-g3gh
- Warn: Project is vulnerable to: GHSA-765h-qjxv-5f44
- Warn: Project is vulnerable to: GHSA-f2jv-r9rf-7988
- Warn: Project is vulnerable to: GHSA-2pr6-76vf-7546
- Warn: Project is vulnerable to: GHSA-8j8c-7jfh-h6hx
- Warn: Project is vulnerable to: GHSA-f8q6-p94x-37v3
- Warn: Project is vulnerable to: GHSA-vh95-rmgr-6w4m
- Warn: Project is vulnerable to: GHSA-xvch-5gv4-984h
- Warn: Project is vulnerable to: GHSA-hj48-42vr-x3v9
- Warn: Project is vulnerable to: GHSA-4rq4-32rv-6wp6
- Warn: Project is vulnerable to: GHSA-64g7-mvw6-v9qj
- Warn: Project is vulnerable to: GHSA-cf4h-3jhx-xvhq
- Warn: Project is vulnerable to: GHSA-776f-qx25-q3cc
Score
1.7
/10
Last Scanned on 2025-02-10
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More