← Home

@prisma/client

10
Versions
License
No
Install Scripts
Verified
Provenance

Supply chain provenance

Status for the latest visible version.

SLSA provenance attestation npm registry signatures No source commit

Maintainers

prismabotaqrln

Keywords

ORMPrismaprisma2Prisma Clientclientqueryquery-builderdatabasedbJavaScriptJSTypeScriptTSSQLSQLitepgPostgresPostgreSQLCockroachDBMySQLMariaDBMSSQLSQL ServerSQLServerMongoDB

Accepted risks

Findings the reviewer chose to accept rather than block on.

SourceRuleReasonAccepted byWhen
semgrep semgrep:eval-usage AI (semgrep): eval-usage fires in minified engine-path error-message code; not dynamic eval of user input. Stable false positive for this bundled ORM package. ai
semgrep semgrep:env-spread AI (semgrep): Minified runtime reads env for DB connection config; standard ORM behavior, not secret exfiltration. ai
semgrep semgrep:child-process-spawn AI (semgrep): Postinstall spawns prisma generate; documented install flow for @prisma/client. ai
semgrep semgrep:api-obfuscation-reflect AI (semgrep): Reflect.get in WASM engine bindings generated by wasm-bindgen; not obfuscation. ai
publish-pattern dormant-publish AI (publish-pattern): Prisma publishes across multiple major version branches; gaps on one branch while others are active is normal. ai
install-scripts install-script:postinstall AI (install-scripts): Prisma's documented postinstall runs code generation via `node scripts/postinstall.js`; stable for this package. ai
source-diff large-new-source-files AI (source-diff): Prisma ships bundled runtime and WASM query engine files; large file counts are inherent to the package architecture. ai
semgrep semgrep:base64-decode AI (semgrep): Base64 decoding converts WASM binaries (stored as base64 JS files) back to .wasm during code generation — standard WASM distribution pattern for npm packages. ai
dependencies unvetted-dep:@prisma/client-runtime-utils AI (dependencies): First-party Prisma monorepo package at matching version (7.8.0); not a third-party unvetted dependency. ai
semgrep semgrep:hex-decode AI (semgrep): False positive on minified runtime code; sample shows stack trace parsing regexes, not hex payload decoding. ai
semgrep semgrep:child-process-import AI (semgrep): Prisma's generator legitimately uses child_process to invoke native engine binaries during schema generation. Expected behavior for a database ORM with native binary components. ai
semgrep semgrep:dynamic-require AI (semgrep): Dynamic require in generator-build loads WASM bundles from controlled, known paths as part of Prisma's documented WASM query compiler build pipeline. Not arbitrary module loading. ai

Versions (showing 10 of 10)

Version Deps Published
7.8.0 1 / 100
7.7.0 1 / 100
7.6.0 1 / 100
7.4.2 1 / 100
7.2.0 1 / 98
6.19.3 0 / 98
6.19.2 0 / 98
6.19.1 0 / 98
6.19.0 0 / 98
5.17.0 0 / 95

v7.8.0

1 finding
INFO Has SLSA provenance attestation provenance

Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.

v7.7.0

1 finding
INFO Has SLSA provenance attestation provenance

Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.

v7.6.0

1 finding
INFO Has SLSA provenance attestation provenance

Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.

v7.4.2

41 findings
HIGH New obfuscated file: runtime/query_compiler_fast_bg.cockroachdb.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_fast_bg.cockroachdb.wasm-base64.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_fast_bg.mysql.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_fast_bg.mysql.wasm-base64.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_fast_bg.postgresql.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_fast_bg.postgresql.wasm-base64.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_fast_bg.sqlite.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_fast_bg.sqlite.wasm-base64.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_fast_bg.sqlserver.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_fast_bg.sqlserver.wasm-base64.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_small_bg.cockroachdb.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_small_bg.cockroachdb.wasm-base64.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_small_bg.mysql.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_small_bg.mysql.wasm-base64.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_small_bg.postgresql.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_small_bg.postgresql.wasm-base64.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_small_bg.sqlite.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_small_bg.sqlite.wasm-base64.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_small_bg.sqlserver.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_small_bg.sqlserver.wasm-base64.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_fast_bg.cockroachdb.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_fast_bg.cockroachdb.wasm-base64.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_fast_bg.mysql.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_fast_bg.mysql.wasm-base64.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_fast_bg.postgresql.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_fast_bg.postgresql.wasm-base64.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_fast_bg.sqlite.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_fast_bg.sqlite.wasm-base64.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_fast_bg.sqlserver.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_fast_bg.sqlserver.wasm-base64.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_small_bg.cockroachdb.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_small_bg.cockroachdb.wasm-base64.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_small_bg.mysql.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_small_bg.mysql.wasm-base64.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_small_bg.postgresql.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_small_bg.postgresql.wasm-base64.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_small_bg.sqlite.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_small_bg.sqlite.wasm-base64.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_small_bg.sqlserver.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_compiler_small_bg.sqlserver.wasm-base64.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

INFO Has SLSA provenance attestation provenance

Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.

v7.2.0

1 finding
INFO Has SLSA provenance attestation provenance

Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.

v6.19.3

4 findings
HIGH Package has 'postinstall' script install-scripts

Script: node scripts/postinstall.js

HIGH env-spread: runtime/library.js:114 semgrep

Spreading entire process.env into an object — may capture all secrets 112 | You may have to run ${qe("prisma generate")} for your changes to take effect.`,this.config.clientVersion);return r}}pars 113 | ${a.backtrace}`,{clientVersion:this.config.clientVersion})}}async requestBatch(r,{transaction:t,traceparent:n}){Re("requ > 114 | `);o.push({_tag:"error",value:I})},l=!!e?.startsWith("prisma://"),u=an(e),c=!!r,p=l||u;!c&&t&&p&&n!=="client"&&n!=="wasm 115 | Using the example below you can still execute your query with Prisma, but please note that it is vulnerable to SQL injec 116 |

HIGH env-spread: runtime/library.mjs:121 semgrep

Spreading entire process.env into an object — may capture all secrets 119 | You may have to run ${$e("prisma generate")} for your changes to take effect.`,this.config.clientVersion);return r}}pars 120 | ${a.backtrace}`,{clientVersion:this.config.clientVersion})}}async requestBatch(r,{transaction:t,traceparent:n}){Re("requ > 121 | `);o.push({_tag:"error",value:I})},l=!!e?.startsWith("prisma://"),u=en(e),c=!!r,p=l||u;!c&&t&&p&&n!=="client"&&n!=="wasm 122 | Using the example below you can still execute your query with Prisma, but please note that it is vulnerable to SQL injec 123 |

INFO Has SLSA provenance attestation provenance

Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.

v6.19.2

45 findings
HIGH Package has 'postinstall' script install-scripts

Script: node scripts/postinstall.js

HIGH New obfuscated file: runtime/binary.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/edge-esm.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/edge.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/library.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_engine_bg.cockroachdb.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_engine_bg.cockroachdb.wasm-base64.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_engine_bg.mysql.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_engine_bg.mysql.wasm-base64.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_engine_bg.postgresql.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_engine_bg.postgresql.wasm-base64.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_engine_bg.sqlite.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_engine_bg.sqlite.wasm-base64.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_engine_bg.sqlserver.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_engine_bg.sqlserver.wasm-base64.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/react-native.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/wasm-engine-edge.js source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/binary.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/library.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_engine_bg.cockroachdb.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_engine_bg.cockroachdb.wasm-base64.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_engine_bg.mysql.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_engine_bg.mysql.wasm-base64.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_engine_bg.postgresql.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_engine_bg.postgresql.wasm-base64.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_engine_bg.sqlite.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_engine_bg.sqlite.wasm-base64.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_engine_bg.sqlserver.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/query_engine_bg.sqlserver.wasm-base64.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH New obfuscated file: runtime/wasm-engine-edge.mjs source-diff

Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.

HIGH Long encoded string in modified file: runtime/query_compiler_bg.cockroachdb.wasm-base64.js source-diff

Modified file contains 1 long encoded string(s) (200+ chars). These are commonly used to hide malicious payloads.

HIGH Long encoded string in modified file: runtime/query_compiler_bg.mysql.wasm-base64.js source-diff

Modified file contains 1 long encoded string(s) (200+ chars). These are commonly used to hide malicious payloads.

HIGH Long encoded string in modified file: runtime/query_compiler_bg.postgresql.wasm-base64.js source-diff

Modified file contains 1 long encoded string(s) (200+ chars). These are commonly used to hide malicious payloads.

HIGH Long encoded string in modified file: runtime/query_compiler_bg.sqlite.wasm-base64.js source-diff

Modified file contains 1 long encoded string(s) (200+ chars). These are commonly used to hide malicious payloads.

HIGH Long encoded string in modified file: runtime/query_compiler_bg.sqlserver.wasm-base64.js source-diff

Modified file contains 1 long encoded string(s) (200+ chars). These are commonly used to hide malicious payloads.

HIGH Long encoded string in modified file: runtime/query_compiler_bg.cockroachdb.wasm-base64.mjs source-diff

Modified file contains 1 long encoded string(s) (200+ chars). These are commonly used to hide malicious payloads.

HIGH Long encoded string in modified file: runtime/query_compiler_bg.mysql.wasm-base64.mjs source-diff

Modified file contains 1 long encoded string(s) (200+ chars). These are commonly used to hide malicious payloads.

HIGH Long encoded string in modified file: runtime/query_compiler_bg.postgresql.wasm-base64.mjs source-diff

Modified file contains 1 long encoded string(s) (200+ chars). These are commonly used to hide malicious payloads.

HIGH Long encoded string in modified file: runtime/query_compiler_bg.sqlite.wasm-base64.mjs source-diff

Modified file contains 1 long encoded string(s) (200+ chars). These are commonly used to hide malicious payloads.

HIGH Long encoded string in modified file: runtime/query_compiler_bg.sqlserver.wasm-base64.mjs source-diff

Modified file contains 1 long encoded string(s) (200+ chars). These are commonly used to hide malicious payloads.

HIGH env-spread: runtime/client.js:74 semgrep

Spreading entire process.env into an object — may capture all secrets 72 | ${n.backtrace}`,{clientVersion:this.config.clientVersion})}catch{return t}}#p(t){return t instanceof re?t:typeof t.messa 73 | ${t}`,R(r,!0))}};P(Wr,"RequestError");async function at(e,t,r=n=>n){let{clientVersion:n,...i}=t,o=r(fetch);try{return aw > 74 | `);o.push({_tag:"error",value:I})},l=!!e?.startsWith("prisma://"),c=nn(e),u=!!t,p=l||c;!u&&r&&p&&n!=="client"&&n!=="wasm 75 | Using the example below you can still execute your query with Prisma, but please note that it is vulnerable to SQL injec 76 |

HIGH env-spread: runtime/client.mjs:81 semgrep

Spreading entire process.env into an object — may capture all secrets 79 | ${n.backtrace}`,{clientVersion:this.config.clientVersion})}catch{return t}}#p(t){return t instanceof oe?t:typeof t.messa 80 | ${t}`,R(r,!0))}};P(Hr,"RequestError");async function at(e,t,r=n=>n){let{clientVersion:n,...i}=t,o=r(fetch);try{return aw > 81 | `);o.push({_tag:"error",value:I})},l=!!e?.startsWith("prisma://"),c=Xr(e),u=!!t,p=l||c;!u&&r&&p&&n!=="client"&&n!=="wasm 82 | Using the example below you can still execute your query with Prisma, but please note that it is vulnerable to SQL injec 83 |

HIGH env-spread: runtime/library.js:114 semgrep

Spreading entire process.env into an object — may capture all secrets 112 | You may have to run ${qe("prisma generate")} for your changes to take effect.`,this.config.clientVersion);return r}}pars 113 | ${a.backtrace}`,{clientVersion:this.config.clientVersion})}}async requestBatch(r,{transaction:t,traceparent:n}){Re("requ > 114 | `);o.push({_tag:"error",value:I})},l=!!e?.startsWith("prisma://"),u=an(e),c=!!r,p=l||u;!c&&t&&p&&n!=="client"&&n!=="wasm 115 | Using the example below you can still execute your query with Prisma, but please note that it is vulnerable to SQL injec 116 |

HIGH env-spread: runtime/library.mjs:121 semgrep

Spreading entire process.env into an object — may capture all secrets 119 | You may have to run ${$e("prisma generate")} for your changes to take effect.`,this.config.clientVersion);return r}}pars 120 | ${a.backtrace}`,{clientVersion:this.config.clientVersion})}}async requestBatch(r,{transaction:t,traceparent:n}){Re("requ > 121 | `);o.push({_tag:"error",value:I})},l=!!e?.startsWith("prisma://"),u=en(e),c=!!r,p=l||u;!c&&t&&p&&n!=="client"&&n!=="wasm 122 | Using the example below you can still execute your query with Prisma, but please note that it is vulnerable to SQL injec 123 |

INFO Has SLSA provenance attestation provenance

Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.

v6.19.1

3 findings
HIGH Package has 'postinstall' script install-scripts

Script: node scripts/postinstall.js

HIGH env-spread: runtime/library.mjs:121 semgrep

Spreading entire process.env into an object — may capture all secrets 119 | You may have to run ${$e("prisma generate")} for your changes to take effect.`,this.config.clientVersion);return r}}pars 120 | ${a.backtrace}`,{clientVersion:this.config.clientVersion})}}async requestBatch(r,{transaction:t,traceparent:n}){Re("requ > 121 | `);o.push({_tag:"error",value:I})},l=!!e?.startsWith("prisma://"),u=en(e),c=!!r,p=l||u;!c&&t&&p&&n!=="client"&&n!=="wasm 122 | Using the example below you can still execute your query with Prisma, but please note that it is vulnerable to SQL injec 123 |

INFO Has SLSA provenance attestation provenance

Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.

v6.19.0

2 findings
HIGH Package has 'postinstall' script install-scripts

Script: node scripts/postinstall.js

INFO Has SLSA provenance attestation provenance

Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.

v5.17.0

1 finding
INFO Has SLSA provenance attestation provenance

Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.