@jpwilliams/waitgroup
1
Versions
—
License
No
Install Scripts
Missing
Provenance
Supply chain provenance
Status for the latest visible version.
No SLSA provenance
npm registry signatures
gitHead linked
Without SLSA provenance there is no cryptographic link between this tarball and the public source — the axios compromise (March 2026) relied on exactly this gap.
Maintainers
jpwilliams
Keywords
waitgroupwaitgroupasyncpromisesgolangtypestypingstypescript
Accepted risks
Findings the reviewer chose to accept rather than block on.
| Source | Rule | Reason | Accepted by | When |
|---|---|---|---|---|
| email-domain | unclaimed-email:jpwilliams | AI (email-domain): The 'email' is a social handle (@jpwilliams), not a real email address or domain. No actual email domain hijacking risk; this is a benign author field quirk stable across all versions. | ai |
Versions (showing 1 of 1)
| Version | Deps | Published |
|---|---|---|
| 2.1.1 | 0 / 16 |
v2.1.1
2 findings
HIGH
Unclaimed maintainer email domain: jpwilliams
email-domain
Maintainer email '@jpwilliams' uses domain 'jpwilliams' which has no DNS records. An attacker could register this domain to hijack the maintainer identity.
LOW
No provenance attestation
provenance
Package was published without Sigstore provenance. Only ~12% of npm packages have provenance, so this is common but not ideal.