@vercel/node
Supply chain provenance
Status for the latest visible version.
Maintainers
Accepted risks
Findings the reviewer chose to accept rather than block on.
| Source | Rule | Reason | Accepted by | When |
|---|---|---|---|---|
| phantom-deps | phantom-dep:ts-node | AI (phantom-deps): ts-node is a build tool referenced in config; stable false positive for this build-tool package. | ai | |
| dependencies | unvetted-dep:path-to-regexp-updated | AI (dependencies): path-to-regexp-updated is an npm alias for [email protected], a well-known legitimate package. This aliasing pattern is standard in Vercel's monorepo and stable across versions. | ai | |
| npm-metadata | no-description | AI (npm-metadata): Scoped monorepo package from Vercel; missing description is a cosmetic issue, not a malice indicator for this well-established package. | ai | |
| phantom-deps | phantom-dep:typescript | AI (phantom-deps): typescript is a declared dependency used by the Vercel Node.js runtime to compile user code; loaded by convention, not direct import. | ai | |
| phantom-deps | phantom-dep:@types/node | AI (phantom-deps): Type definitions package; framework-scoped, loaded by convention. Expected for a Node.js runtime package. | ai | |
| typosquat | typosquat.levenshtein:zod | AI (typosquat): @vercel/node is an official scoped Vercel package, not a typosquat of 'zod'. Levenshtein comparison across scoped names is a false positive here; stable for all versions. | ai | |
| phantom-deps | phantom-dep:@edge-runtime/vm | AI (phantom-deps): @edge-runtime/vm is a declared dependency used by the edge runtime; phantom-dep detection is a false positive for this package. | ai | |
| phantom-deps | phantom-dep:@edge-runtime/primitives | AI (phantom-deps): @edge-runtime/primitives is a declared dependency used by the edge runtime; phantom-dep detection is a false positive for this package. | ai | |
| phantom-deps | phantom-dep:@vercel/nft | AI (phantom-deps): @vercel/nft is a framework-scoped tool used by the Vercel runtime for file tracing; loaded by convention. | ai | |
| phantom-deps | phantom-dep:tsx | AI (phantom-deps): tsx is a runtime tool used by the Vercel Node.js runtime builder; loaded by convention, not via direct import. Expected for this package. | ai | |
| phantom-deps | phantom-dep:node-fetch | AI (phantom-deps): node-fetch is a declared runtime dependency used by the framework; phantom-dep detection is a false positive for this build-tool package. | ai |
Versions (showing 17 of 17)
| Version | Deps | Published |
|---|---|---|
| 5.7.13 | 22 / 23 | |
| 5.7.11 | 22 / 23 | |
| 5.7.10 | 22 / 23 | |
| 5.7.8 | 22 / 23 | |
| 5.7.7 | 22 / 23 | |
| 5.7.5 | 22 / 23 | |
| 5.7.4 | 22 / 23 | |
| 5.7.3 | 22 / 23 | |
| 5.7.2 | 22 / 23 | |
| 5.7.1 | 22 / 23 | |
| 5.7.0 | 22 / 23 | |
| 5.6.24 | 22 / 23 | |
| 5.6.23 | 22 / 23 | |
| 5.6.22 | 22 / 23 | |
| 5.6.21 | 22 / 23 | |
| 5.6.15 | 22 / 23 | |
| 5.5.3 | 22 / 23 |
v5.7.13
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v5.7.11
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v5.7.10
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v5.7.8
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v5.7.7
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v5.7.5
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v5.7.4
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v5.7.3
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v5.7.2
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v5.7.1
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v5.7.0
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v5.6.24
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v5.6.23
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v5.6.22
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v5.6.21
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v5.6.15
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v5.5.3
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.