← Home

@phosphor/virtualdom

8
Versions
License
No
Install Scripts
Missing
Provenance

Supply chain provenance

Status for the latest visible version.

No SLSA provenance npm registry signatures gitHead linked

Without SLSA provenance there is no cryptographic link between this tarball and the public source — the axios compromise (March 2026) relied on exactly this gap.

Maintainers

blink1073phosphor-usersccolbert

Accepted risks

Findings the reviewer chose to accept rather than block on.

SourceRuleReasonAccepted byWhen
provenance publisher-changed AI (provenance): blink1073 (Steven Silvester) was already a listed contributor in package.json; transition from sccolbert is a legitimate project handoff, not a takeover. ai
maintainer-change maintainer-added AI (maintainer-change): blink1073 and phosphor-user are legitimate maintainers for the PhosphorJS project; blink1073 is a long-standing trusted publisher. ai
maintainer-change maintainer-removed AI (maintainer-change): Removal of 'phosphor' account alongside addition of blink1073/phosphor-user reflects a known project reorganization, not a malicious takeover. ai
provenance no-provenance AI (provenance): Package published in 2019, before Sigstore provenance was available on npm. No provenance is expected for this era. ai

Versions (showing 8 of 8)

Version Deps Published
1.2.0 1 / 14
1.1.3 1 / 14
1.1.2 1 / 3
1.1.1 1 / 3
1.1.0 1 / 3
1.0.0 1 / 2
0.1.1 1 / 2
0.1.0 1 / 0

v1.2.0

1 finding
LOW No provenance attestation provenance

Package was published without Sigstore provenance. Only ~12% of npm packages have provenance, so this is common but not ideal.

v1.1.3

2 findings
HIGH Publisher changed: sccolbert → blink1073 (on 2019-06-01) provenance

This version was published by a different npm account than previous versions on 2019-06-01. This could indicate a legitimate maintainer transition or an account compromise.

LOW No provenance attestation provenance

Package was published without Sigstore provenance. Consider requesting the maintainer enable provenance via CI/CD.

v1.1.2

1 finding
LOW No provenance attestation provenance

Package was published without Sigstore provenance. Consider requesting the maintainer enable provenance via CI/CD.

v1.1.1

1 finding
LOW No provenance attestation provenance

Package was published without Sigstore provenance. Only ~12% of npm packages have provenance, so this is common but not ideal.

v1.1.0

1 finding
LOW No provenance attestation provenance

Package was published without Sigstore provenance. Only ~12% of npm packages have provenance, so this is common but not ideal.

v1.0.0

1 finding
LOW No provenance attestation provenance

Package was published without Sigstore provenance. Only ~12% of npm packages have provenance, so this is common but not ideal.

v0.1.1

1 finding
INFO No provenance attestation provenance

[Accepted risk] Package was published without Sigstore provenance. Only ~12% of npm packages have provenance, so this is common but not ideal.

v0.1.0

1 finding
INFO No provenance attestation provenance

[Accepted risk] Package was published without Sigstore provenance. Only ~12% of npm packages have provenance, so this is common but not ideal.