← Home

@pnpm/link-bins

Link bins to node_modules/.bin

17
Versions
MIT
License
No
Install Scripts
Verified
Provenance

Supply chain provenance

Status for the latest visible version.

SLSA provenance attestation npm registry signatures No source commit

Maintainers

pnpmuserzkochan

Keywords

pnpmpnpm10bin

Accepted risks

Findings the reviewer chose to accept rather than block on.

SourceRuleReasonAccepted byWhen
dependencies unvetted-peer-dep:@pnpm/logger AI (dependencies): @pnpm/logger is a first-party pnpm ecosystem package; peer dep is expected and stable across versions. ai
dependencies unvetted-dep:@zkochan/cmd-shim AI (dependencies): @zkochan/cmd-shim is a well-known Windows cmd shim utility authored by pnpm's lead maintainer; its use here is expected and legitimate. ai
dependencies unvetted-dep:@pnpm/package-bins AI (dependencies): Core pnpm monorepo package; its inclusion in @pnpm/link-bins is expected and consistent across all versions. ai
dependencies unvetted-dep:@pnpm/manifest-utils AI (dependencies): Core pnpm monorepo package; its inclusion in @pnpm/link-bins is expected and consistent across all versions. ai
dependencies unvetted-dep:@pnpm/read-project-manifest AI (dependencies): Core pnpm monorepo package; its inclusion in @pnpm/link-bins is expected and consistent across all versions. ai

Versions (showing 17 of 17)

Version Deps Published
1000.3.8 17 / 11
1000.3.7 17 / 11
1000.3.5 17 / 11
1000.3.4 17 / 11
1000.3.3 17 / 11
1000.3.2 17 / 11
1000.3.1 17 / 11
1000.3.0 17 / 11
1000.2.6 17 / 11
1000.2.5 17 / 11
1000.2.3 17 / 11
1000.2.2 17 / 11
1000.2.1 17 / 11
1000.2.0 18 / 10
1000.1.0 18 / 10
1000.0.13 17 / 10
1000.0.12 17 / 10

v1000.3.8

1 finding
INFO Has SLSA provenance attestation provenance

Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.

v1000.3.7

1 finding
INFO Has SLSA provenance attestation provenance

Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.

v1000.3.5

1 finding
INFO Has SLSA provenance attestation provenance

Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.

v1000.3.4

1 finding
INFO Has SLSA provenance attestation provenance

Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.

v1000.3.3

1 finding
INFO Has SLSA provenance attestation provenance

Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.

v1000.3.2

1 finding
INFO Has SLSA provenance attestation provenance

Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.

v1000.3.1

1 finding
INFO Has SLSA provenance attestation provenance

Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.

v1000.3.0

1 finding
INFO Has SLSA provenance attestation provenance

Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.

v1000.2.6

1 finding
LOW No provenance attestation provenance

Package was published without Sigstore provenance. Consider requesting the maintainer enable provenance via CI/CD.

v1000.2.5

1 finding
LOW No provenance attestation provenance

Package was published without Sigstore provenance. Consider requesting the maintainer enable provenance via CI/CD.

v1000.2.3

1 finding
LOW No provenance attestation provenance

Package was published without Sigstore provenance. Consider requesting the maintainer enable provenance via CI/CD.

v1000.2.2

1 finding
LOW No provenance attestation provenance

Package was published without Sigstore provenance. Consider requesting the maintainer enable provenance via CI/CD.

v1000.2.1

1 finding
LOW No provenance attestation provenance

Package was published without Sigstore provenance. Consider requesting the maintainer enable provenance via CI/CD.

v1000.2.0

1 finding
LOW No provenance attestation provenance

Package was published without Sigstore provenance. Consider requesting the maintainer enable provenance via CI/CD.

v1000.1.0

1 finding
LOW No provenance attestation provenance

Package was published without Sigstore provenance. Only ~12% of npm packages have provenance, so this is common but not ideal.

v1000.0.13

1 finding
LOW No provenance attestation provenance

Package was published without Sigstore provenance. Only ~12% of npm packages have provenance, so this is common but not ideal.

v1000.0.12

1 finding
LOW No provenance attestation provenance

Package was published without Sigstore provenance. Only ~12% of npm packages have provenance, so this is common but not ideal.