@edge-runtime/vm
2
Versions
—
License
No
Install Scripts
Missing
Provenance
Supply chain provenance
Status for the latest visible version.
No SLSA provenance
npm registry signatures
No source commit
Without SLSA provenance there is no cryptographic link between this tarball and the public source — the axios compromise (March 2026) relied on exactly this gap.
Maintainers
kikobeats
Keywords
contextedgeedge-runtimefunctionsruntimestandardvmweb
Accepted risks
Findings the reviewer chose to accept rather than block on.
| Source | Rule | Reason | Accepted by | When |
|---|---|---|---|---|
| typosquat | typosquat.levenshtein:pg | AI (typosquat): @edge-runtime/vm is a legitimate Vercel monorepo package with 3.1M weekly downloads; Levenshtein match against 'pg' is a false positive with no brand impersonation. | ai | |
| typosquat | typosquat.levenshtein:qs | AI (typosquat): @edge-runtime/vm is a legitimate Vercel monorepo package with 3.1M weekly downloads; Levenshtein match against 'qs' is a false positive with no brand impersonation. | ai |
v5.0.0
1 finding
LOW
No provenance attestation
provenance
Package was published without Sigstore provenance. Only ~12% of npm packages have provenance, so this is common but not ideal.
v3.2.0
1 finding
LOW
No provenance attestation
provenance
Package was published without Sigstore provenance. Only ~12% of npm packages have provenance, so this is common but not ideal.