eslint-plugin-node-security 4.0.0 โ 4.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +4 -0
- package/README.md +199 -27
- package/package.json +1 -1
package/CHANGELOG.md
CHANGED
package/README.md
CHANGED
|
@@ -1,50 +1,222 @@
|
|
|
1
|
-
|
|
1
|
+
<p align="center">
|
|
2
|
+
<a href="https://eslint.interlace.tools" target="blank"><img src="https://eslint.interlace.tools/eslint-interlace-logo-light.svg" alt="ESLint Interlace Logo" width="120" /></a>
|
|
3
|
+
</p>
|
|
2
4
|
|
|
3
|
-
|
|
5
|
+
<p align="center">
|
|
6
|
+
Security-focused ESLint plugin for Node.js built-in modules (fs, child_process, vm, crypto, Buffer).
|
|
7
|
+
</p>
|
|
4
8
|
|
|
5
|
-
|
|
9
|
+
<p align="center">
|
|
10
|
+
<a href="https://www.npmjs.com/package/eslint-plugin-node-security" target="_blank"><img src="https://img.shields.io/npm/v/eslint-plugin-node-security.svg" alt="NPM Version" /></a>
|
|
11
|
+
<a href="https://www.npmjs.com/package/eslint-plugin-node-security" target="_blank"><img src="https://img.shields.io/npm/dm/eslint-plugin-node-security.svg" alt="NPM Downloads" /></a>
|
|
12
|
+
<a href="https://opensource.org/licenses/MIT" target="_blank"><img src="https://img.shields.io/badge/License-MIT-yellow.svg" alt="Package License" /></a>
|
|
13
|
+
<a href="https://app.codecov.io/gh/ofri-peretz/eslint/components?components%5B0%5D=node-security" target="_blank"><img src="https://codecov.io/gh/ofri-peretz/eslint/graph/badge.svg?component=node-security" alt="Codecov" /></a>
|
|
14
|
+
<a href="https://github.com/ofri-peretz/eslint" target="_blank"><img src="https://img.shields.io/badge/Since-Dec_2025-blue?logo=rocket&logoColor=white" alt="Since Dec 2025" /></a>
|
|
15
|
+
</p>
|
|
6
16
|
|
|
7
|
-
##
|
|
17
|
+
## Description
|
|
8
18
|
|
|
9
|
-
|
|
10
|
-
- **OWASP Coverage**: Implements rules for OWASP Top 10 and OWASP Mobile Top 10.
|
|
11
|
-
- **Node.js Core Security**: Specific focus on built-in modules which are most susceptible to critical vulnerabilities.
|
|
12
|
-
- **Strict Interface**: Verified with high-fidelity unit tests.
|
|
19
|
+
This plugin provides comprehensive security rules for Node.js core modules, detecting command injection, path traversal, code execution vulnerabilities, and cryptographic weaknesses. It focuses on the modules most susceptible to critical vulnerabilities: `fs`, `child_process`, `vm`, `crypto`, and `Buffer`. By integrating these checks, you proactively identify and mitigate security risks in your Node.js applications.
|
|
13
20
|
|
|
14
|
-
##
|
|
21
|
+
## Philosophy
|
|
22
|
+
|
|
23
|
+
**Interlace** fosters **strength through integration**. Instead of stacking isolated rules, we **interlace** security directly into your workflow to create a resilient fabric of code. We believe tools should **guide rather than gatekeep**, providing educational feedback that strengthens the developer with every interaction.
|
|
24
|
+
|
|
25
|
+
## Getting Started
|
|
26
|
+
|
|
27
|
+
- To check out the [guide](https://eslint.interlace.tools/docs/node-security), visit [eslint.interlace.tools](https://eslint.interlace.tools). ๐
|
|
28
|
+
- ่ฆๆฅ็ไธญๆ [ๆๅ](https://eslint.interlace.tools/docs/node-security), ่ฏท่ฎฟ้ฎ [eslint.interlace.tools](https://eslint.interlace.tools). ๐
|
|
29
|
+
- [๊ฐ์ด๋](https://eslint.interlace.tools/docs/node-security) ๋ฌธ์๋ [eslint.interlace.tools](https://eslint.interlace.tools)์์ ํ์ธํ์ค ์ ์์ต๋๋ค. ๐
|
|
30
|
+
- [ใฌใคใ](https://eslint.interlace.tools/docs/node-security)ใฏ [eslint.interlace.tools](https://eslint.interlace.tools)ใงใ็ขบ่ชใใ ใใใ ๐
|
|
31
|
+
- Para ver la [guรญa](https://eslint.interlace.tools/docs/node-security), visita [eslint.interlace.tools](https://eslint.interlace.tools). ๐
|
|
32
|
+
- ููุงุทูุงุน ุนูู [ุงูุฏููู](https://eslint.interlace.tools/docs/node-security)ุ ูู
ุจุฒูุงุฑุฉ [eslint.interlace.tools](https://eslint.interlace.tools). ๐
|
|
15
33
|
|
|
16
34
|
```bash
|
|
17
|
-
npm
|
|
35
|
+
npm install eslint-plugin-node-security --save-dev
|
|
18
36
|
```
|
|
19
37
|
|
|
20
|
-
##
|
|
38
|
+
## ๐ก What You Get
|
|
39
|
+
|
|
40
|
+
- **31 security rules** covering Node.js core module vulnerabilities
|
|
41
|
+
- **Command Injection Detection** for `child_process.exec`, `spawn`, and `execFile`
|
|
42
|
+
- **Path Traversal Prevention** for `fs` module operations
|
|
43
|
+
- **TOCTOU Race Condition Detection** for file system operations
|
|
44
|
+
- **Cryptographic Security** for weak algorithms and key management
|
|
45
|
+
- **LLM-optimized messages** with CWE references and fix guidance
|
|
46
|
+
|
|
47
|
+
## โ๏ธ Configuration Presets
|
|
48
|
+
|
|
49
|
+
| Preset | Description |
|
|
50
|
+
| :------------ | :---------------------------------------------------- |
|
|
51
|
+
| `recommended` | Balanced security for most Node.js projects |
|
|
52
|
+
| `strict` | Maximum security enforcement (all rules as errors) |
|
|
53
|
+
| `fs-security` | Focus on file system vulnerabilities (CWE-22, CWE-73) |
|
|
54
|
+
| `crypto` | Cryptographic security rules only |
|
|
55
|
+
|
|
56
|
+
---
|
|
57
|
+
|
|
58
|
+
## ๐ข Enterprise Integration Example
|
|
59
|
+
|
|
60
|
+
```bash
|
|
61
|
+
# Install once at the repo root
|
|
62
|
+
npm add -D eslint-plugin-node-security
|
|
21
63
|
|
|
22
|
-
|
|
64
|
+
# eslint.config.js (org-standard)
|
|
23
65
|
import nodeSecurity from 'eslint-plugin-node-security';
|
|
24
66
|
|
|
25
67
|
export default [
|
|
68
|
+
// Baseline for all Node.js services
|
|
26
69
|
nodeSecurity.configs.recommended,
|
|
70
|
+
|
|
71
|
+
// Strict enforcement for security-critical services
|
|
72
|
+
{
|
|
73
|
+
files: ['services/auth/**', 'services/payments/**'],
|
|
74
|
+
...nodeSecurity.configs.strict,
|
|
75
|
+
},
|
|
76
|
+
|
|
77
|
+
// File handling services need extra fs protection
|
|
27
78
|
{
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
},
|
|
79
|
+
files: ['services/file-upload/**', 'services/export/**'],
|
|
80
|
+
...nodeSecurity.configs['fs-security'],
|
|
31
81
|
},
|
|
32
82
|
];
|
|
33
83
|
```
|
|
34
84
|
|
|
85
|
+
---
|
|
86
|
+
|
|
87
|
+
## AI-Optimized Messages
|
|
88
|
+
|
|
89
|
+
This plugin is optimized for ESLint's [Model Context Protocol (MCP)](https://eslint.org/docs/latest/use/mcp), enabling AI assistants like **Cursor**, **GitHub Copilot**, and **Claude** to:
|
|
90
|
+
|
|
91
|
+
- Understand the exact vulnerability type via CWE references
|
|
92
|
+
- Apply the correct fix using structured guidance
|
|
93
|
+
- Provide educational context to developers
|
|
94
|
+
|
|
95
|
+
```bash
|
|
96
|
+
src/utils/exec.ts
|
|
97
|
+
15:5 error ๐ CWE-78 OWASP:A03-Injection CVSS:9.8 | Command Injection detected | CRITICAL [SOC2,PCI-DSS]
|
|
98
|
+
Fix: Use execFile() with args array: execFile('ls', ['-la', dir]) | https://owasp.org/...
|
|
99
|
+
```
|
|
100
|
+
|
|
101
|
+
```json
|
|
102
|
+
// .cursor/mcp.json
|
|
103
|
+
{
|
|
104
|
+
"mcpServers": {
|
|
105
|
+
"eslint": {
|
|
106
|
+
"command": "npx",
|
|
107
|
+
"args": ["@eslint/mcp@latest"]
|
|
108
|
+
}
|
|
109
|
+
}
|
|
110
|
+
}
|
|
111
|
+
```
|
|
112
|
+
|
|
113
|
+
By providing this structured context (CWE, OWASP, Fix), we enable AI tools to **reason** about the security flaw rather than hallucinating. This allows Copilot/Cursor to suggest the _exact_ correct fix immediately.
|
|
114
|
+
|
|
115
|
+
---
|
|
116
|
+
|
|
117
|
+
## ๐ Privacy
|
|
118
|
+
|
|
119
|
+
This plugin runs **100% locally**. No data ever leaves your machine.
|
|
120
|
+
|
|
121
|
+
---
|
|
122
|
+
|
|
35
123
|
## Rules
|
|
36
124
|
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
|
40
|
-
|
|
|
41
|
-
|
|
|
42
|
-
|
|
|
43
|
-
|
|
|
44
|
-
|
|
|
45
|
-
|
|
|
46
|
-
|
|
125
|
+
**Legend**
|
|
126
|
+
|
|
127
|
+
| Icon | Description |
|
|
128
|
+
| :--: | :----------------------------------------------------------------- |
|
|
129
|
+
| ๐ผ | **Recommended**: Included in the recommended preset. |
|
|
130
|
+
| โ ๏ธ | **Warns**: Set to warn in recommended preset. |
|
|
131
|
+
| ๐ง | **Auto-fixable**: Automatically fixable by the `--fix` CLI option. |
|
|
132
|
+
| ๐ก | **Suggestions**: Providing code suggestions in IDE. |
|
|
133
|
+
| ๐ซ | **Deprecated**: This rule is deprecated. |
|
|
134
|
+
|
|
135
|
+
### Command Execution & Code Injection
|
|
136
|
+
|
|
137
|
+
| Rule | CWE | CVSS | Description | ๐ผ | โ ๏ธ | ๐ง | ๐ก |
|
|
138
|
+
| :------------------------------------------------------------------------------------------------------- | :-----: | :--: | :-------------------------------------- | :-: | :-: | :-: | :-: |
|
|
139
|
+
| [detect-child-process](https://eslint.interlace.tools/docs/node-security/rules/detect-child-process) | CWE-78 | 9.8 | Detect dangerous child_process calls | ๐ผ | | | ๐ก |
|
|
140
|
+
| [detect-eval-with-expression](https://eslint.interlace.tools/docs/node-security/rules/detect-eval-with-expression) | CWE-95 | 9.8 | Detect eval() with dynamic expressions | ๐ผ | | | |
|
|
141
|
+
| [no-unsafe-dynamic-require](https://eslint.interlace.tools/docs/node-security/rules/no-unsafe-dynamic-require) | CWE-706 | 7.5 | Prevent arbitrary module loading | ๐ผ | | | ๐ก |
|
|
142
|
+
| [no-dynamic-require](https://eslint.interlace.tools/docs/node-security/rules/no-dynamic-require) | CWE-706 | 7.5 | Detect dynamic require() calls | | โ ๏ธ | | |
|
|
143
|
+
|
|
144
|
+
### File System Security
|
|
145
|
+
|
|
146
|
+
| Rule | CWE | CVSS | Description | ๐ผ | โ ๏ธ | ๐ง | ๐ก |
|
|
147
|
+
| :------------------------------------------------------------------------------------------------------- | :-----: | :--: | :-------------------------------------- | :-: | :-: | :-: | :-: |
|
|
148
|
+
| [detect-non-literal-fs-filename](https://eslint.interlace.tools/docs/node-security/rules/detect-non-literal-fs-filename) | CWE-22 | 7.5 | Detect user-controlled file paths | ๐ผ | | | ๐ก |
|
|
149
|
+
| [no-arbitrary-file-access](https://eslint.interlace.tools/docs/node-security/rules/no-arbitrary-file-access) | CWE-22 | 7.5 | Prevent arbitrary file read/write | ๐ผ | | | |
|
|
150
|
+
| [no-zip-slip](https://eslint.interlace.tools/docs/node-security/rules/no-zip-slip) | CWE-22 | 8.1 | Prevent Zip Slip directory traversal | ๐ผ | | | |
|
|
151
|
+
| [no-toctou-vulnerability](https://eslint.interlace.tools/docs/node-security/rules/no-toctou-vulnerability) | CWE-367 | 7.0 | Detect race conditions in file ops | ๐ผ | | | ๐ก |
|
|
152
|
+
| [no-data-in-temp-storage](https://eslint.interlace.tools/docs/node-security/rules/no-data-in-temp-storage) | CWE-312 | 7.5 | Prevent sensitive data in temp files | | โ ๏ธ | | |
|
|
153
|
+
| [require-secure-deletion](https://eslint.interlace.tools/docs/node-security/rules/require-secure-deletion) | CWE-459 | 7.5 | Require secure file deletion | | | | |
|
|
154
|
+
| [require-storage-encryption](https://eslint.interlace.tools/docs/node-security/rules/require-storage-encryption) | CWE-311 | 7.5 | Require encryption for stored data | | | | |
|
|
155
|
+
|
|
156
|
+
### Buffer & Memory Safety
|
|
157
|
+
|
|
158
|
+
| Rule | CWE | CVSS | Description | ๐ผ | โ ๏ธ | ๐ง | ๐ก |
|
|
159
|
+
| :------------------------------------------------------------------------------------------------------- | :-----: | :--: | :-------------------------------------- | :-: | :-: | :-: | :-: |
|
|
160
|
+
| [no-buffer-overread](https://eslint.interlace.tools/docs/node-security/rules/no-buffer-overread) | CWE-126 | 7.5 | Detect buffer access beyond bounds | ๐ผ | | | |
|
|
161
|
+
|
|
162
|
+
### Cryptographic Security
|
|
163
|
+
|
|
164
|
+
| Rule | CWE | CVSS | Description | ๐ผ | โ ๏ธ | ๐ง | ๐ก |
|
|
165
|
+
| :------------------------------------------------------------------------------------------------------- | :-----: | :--: | :-------------------------------------- | :-: | :-: | :-: | :-: |
|
|
166
|
+
| [no-weak-hash-algorithm](https://eslint.interlace.tools/docs/node-security/rules/no-weak-hash-algorithm) | CWE-327 | 7.5 | Detect weak hash algorithms (MD5, SHA1) | ๐ผ | | | ๐ก |
|
|
167
|
+
| [no-weak-cipher-algorithm](https://eslint.interlace.tools/docs/node-security/rules/no-weak-cipher-algorithm) | CWE-327 | 7.5 | Detect weak cipher algorithms (DES, RC4)| ๐ผ | | | ๐ก |
|
|
168
|
+
| [no-deprecated-cipher-method](https://eslint.interlace.tools/docs/node-security/rules/no-deprecated-cipher-method) | CWE-327 | 5.0 | Detect deprecated cipher methods | ๐ผ | | | ๐ก |
|
|
169
|
+
| [no-static-iv](https://eslint.interlace.tools/docs/node-security/rules/no-static-iv) | CWE-329 | 7.5 | Detect static initialization vectors | ๐ผ | | | ๐ก |
|
|
170
|
+
| [no-ecb-mode](https://eslint.interlace.tools/docs/node-security/rules/no-ecb-mode) | CWE-327 | 7.5 | Detect insecure ECB cipher mode | ๐ผ | | | ๐ก |
|
|
171
|
+
| [no-insecure-key-derivation](https://eslint.interlace.tools/docs/node-security/rules/no-insecure-key-derivation) | CWE-916 | 7.5 | Detect weak key derivation functions | ๐ผ | | | ๐ก |
|
|
172
|
+
| [no-insecure-rsa-padding](https://eslint.interlace.tools/docs/node-security/rules/no-insecure-rsa-padding) | CWE-327 | 7.4 | Detect insecure RSA padding | ๐ผ | | | ๐ก |
|
|
173
|
+
| [no-sha1-hash](https://eslint.interlace.tools/docs/node-security/rules/no-sha1-hash) | CWE-327 | 7.5 | Detect SHA1 usage in security contexts | ๐ผ | | | ๐ก |
|
|
174
|
+
| [no-timing-unsafe-compare](https://eslint.interlace.tools/docs/node-security/rules/no-timing-unsafe-compare) | CWE-208 | 5.9 | Detect timing-unsafe comparisons | ๐ผ | โ ๏ธ | | ๐ก |
|
|
175
|
+
| [no-self-signed-certs](https://eslint.interlace.tools/docs/node-security/rules/no-self-signed-certs) | CWE-295 | 7.5 | Detect self-signed certificate usage | ๐ผ | | | ๐ก |
|
|
176
|
+
| [no-cryptojs](https://eslint.interlace.tools/docs/node-security/rules/no-cryptojs) | CWE-327 | 5.0 | Discourage crypto-js in favor of native | ๐ผ | โ ๏ธ | | ๐ก |
|
|
177
|
+
| [no-cryptojs-weak-random](https://eslint.interlace.tools/docs/node-security/rules/no-cryptojs-weak-random) | CWE-338 | 5.3 | Detect weak random from crypto-js | ๐ผ | | | ๐ก |
|
|
178
|
+
| [prefer-native-crypto](https://eslint.interlace.tools/docs/node-security/rules/prefer-native-crypto) | CWE-327 | 5.0 | Prefer Node.js native crypto | ๐ผ | โ ๏ธ | | ๐ก |
|
|
179
|
+
| [require-secure-credential-storage](https://eslint.interlace.tools/docs/node-security/rules/require-secure-credential-storage) | CWE-522 | 7.5 | Require secure credential storage | | | | |
|
|
180
|
+
|
|
181
|
+
### Dependency & Supply Chain Security
|
|
182
|
+
|
|
183
|
+
| Rule | CWE | CVSS | Description | ๐ผ | โ ๏ธ | ๐ง | ๐ก |
|
|
184
|
+
| :------------------------------------------------------------------------------------------------------- | :-----: | :--: | :-------------------------------------- | :-: | :-: | :-: | :-: |
|
|
185
|
+
| [detect-suspicious-dependencies](https://eslint.interlace.tools/docs/node-security/rules/detect-suspicious-dependencies) | CWE-829 | 8.2 | Detect typosquatting packages | ๐ผ | | | |
|
|
186
|
+
| [no-dynamic-dependency-loading](https://eslint.interlace.tools/docs/node-security/rules/no-dynamic-dependency-loading) | CWE-829 | 7.5 | Prevent runtime dependency loading | | โ ๏ธ | | |
|
|
187
|
+
| [require-dependency-integrity](https://eslint.interlace.tools/docs/node-security/rules/require-dependency-integrity) | CWE-494 | 7.5 | Require integrity checks for deps | | | | |
|
|
188
|
+
| [lock-file](https://eslint.interlace.tools/docs/node-security/rules/lock-file) | CWE-829 | 7.5 | Ensure package lock file exists | ๐ผ | | | |
|
|
189
|
+
|
|
190
|
+
### Data Protection
|
|
191
|
+
|
|
192
|
+
| Rule | CWE | CVSS | Description | ๐ผ | โ ๏ธ | ๐ง | ๐ก |
|
|
193
|
+
| :------------------------------------------------------------------------------------------------------- | :-----: | :--: | :-------------------------------------- | :-: | :-: | :-: | :-: |
|
|
194
|
+
| [no-pii-in-logs](https://eslint.interlace.tools/docs/node-security/rules/no-pii-in-logs) | CWE-532 | 7.5 | Prevent PII in log statements | | โ ๏ธ | | |
|
|
195
|
+
|
|
196
|
+
---
|
|
197
|
+
|
|
198
|
+
## ๐ Related ESLint Plugins
|
|
199
|
+
|
|
200
|
+
Part of the **Interlace ESLint Ecosystem** โ AI-native security plugins with LLM-optimized error messages:
|
|
201
|
+
|
|
202
|
+
| Plugin | Downloads | Description |
|
|
203
|
+
| :--------------------------------------------------------------------------------------------------- | :------------------------------------------------------------------------------------------------------------------------------------------------------------------: | :------------------------------------------ |
|
|
204
|
+
| [`eslint-plugin-secure-coding`](https://www.npmjs.com/package/eslint-plugin-secure-coding) | [](https://www.npmjs.com/package/eslint-plugin-secure-coding) | General security rules & OWASP guidelines. |
|
|
205
|
+
| [`eslint-plugin-pg`](https://www.npmjs.com/package/eslint-plugin-pg) | [](https://www.npmjs.com/package/eslint-plugin-pg) | PostgreSQL security & best practices. |
|
|
206
|
+
| [`eslint-plugin-crypto`](https://www.npmjs.com/package/eslint-plugin-crypto) | [](https://www.npmjs.com/package/eslint-plugin-crypto) | NodeJS Cryptography security rules. |
|
|
207
|
+
| [`eslint-plugin-jwt`](https://www.npmjs.com/package/eslint-plugin-jwt) | [](https://www.npmjs.com/package/eslint-plugin-jwt) | JWT security & best practices. |
|
|
208
|
+
| [`eslint-plugin-browser-security`](https://www.npmjs.com/package/eslint-plugin-browser-security) | [](https://www.npmjs.com/package/eslint-plugin-browser-security) | Browser-specific security & XSS prevention. |
|
|
209
|
+
| [`eslint-plugin-express-security`](https://www.npmjs.com/package/eslint-plugin-express-security) | [](https://www.npmjs.com/package/eslint-plugin-express-security) | Express.js security hardening rules. |
|
|
210
|
+
| [`eslint-plugin-lambda-security`](https://www.npmjs.com/package/eslint-plugin-lambda-security) | [](https://www.npmjs.com/package/eslint-plugin-lambda-security) | AWS Lambda security best practices. |
|
|
211
|
+
| [`eslint-plugin-nestjs-security`](https://www.npmjs.com/package/eslint-plugin-nestjs-security) | [](https://www.npmjs.com/package/eslint-plugin-nestjs-security) | NestJS security rules & patterns. |
|
|
212
|
+
| [`eslint-plugin-mongodb-security`](https://www.npmjs.com/package/eslint-plugin-mongodb-security) | [](https://www.npmjs.com/package/eslint-plugin-mongodb-security) | MongoDB security best practices. |
|
|
213
|
+
| [`eslint-plugin-vercel-ai-security`](https://www.npmjs.com/package/eslint-plugin-vercel-ai-security) | [](https://www.npmjs.com/package/eslint-plugin-vercel-ai-security) | Vercel AI SDK security hardening. |
|
|
214
|
+
| [`eslint-plugin-import-next`](https://www.npmjs.com/package/eslint-plugin-import-next) | [](https://www.npmjs.com/package/eslint-plugin-import-next) | Next-gen import sorting & architecture. |
|
|
215
|
+
|
|
216
|
+
## ๐ License
|
|
47
217
|
|
|
48
|
-
|
|
218
|
+
MIT ยฉ [Ofri Peretz](https://github.com/ofri-peretz)
|
|
49
219
|
|
|
50
|
-
|
|
220
|
+
<p align="center">
|
|
221
|
+
<a href="https://eslint.interlace.tools/docs/node-security"><img src="https://eslint.interlace.tools/images/og-secure-coding.png" alt="ESLint Interlace Plugin" width="300" /></a>
|
|
222
|
+
</p>
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "eslint-plugin-node-security",
|
|
3
|
-
"version": "4.0.
|
|
3
|
+
"version": "4.0.1",
|
|
4
4
|
"description": "Security-focused ESLint plugin for Node.js built-in modules (fs, child_process, vm, path, Buffer). Detects command injection, path traversal, code execution vulnerabilities with AI-parseable error messages.",
|
|
5
5
|
"type": "commonjs",
|
|
6
6
|
"main": "./src/index.js",
|