brandonnozakimiller


  • Scans your computer for node modules that are potentially vulnerable to supply chain attacks. You still need to review the code of modules that are not vulnerable, but this helps.

    published 0.0.2 2 years ago