@vitest/browser
Supply chain provenance
Status for the latest visible version.
Maintainers
Keywords
Accepted risks
Findings the reviewer chose to accept rather than block on.
| Source | Rule | Reason | Accepted by | When |
|---|---|---|---|---|
| source-diff | obfuscated-file:dist/client/__vitest__/assets/index-CLLxNdKA.js | AI (source-diff): Vite-bundled client output containing minified Vue; expected for this package. | ai | |
| source-diff | obfuscated-file:dist/client/__vitest__/assets/index-Dpc7kNBC.js | AI (source-diff): Bundled client assets including Vue runtime; expected minified output. | ai | |
| source-diff | obfuscated-file:dist/index-CEutxZap.js | AI (source-diff): Standard minified bundle output for browser test runner; stable pattern. | ai | |
| source-diff | obfuscated-file:dist/client/__vitest__/assets/index-DnyN8l5D.js | AI (source-diff): Bundled Vue + Playwright client assets; expected minified output. | ai | |
| source-diff | obfuscated-file:dist/client/__vitest__/assets/index-Di71CKDo.js | AI (source-diff): Bundled Vue.js + client assets; expected minified output for browser package. | ai | |
| source-diff | obfuscated-file:dist/index-hFpxawnd.js | AI (source-diff): Standard rollup-bundled dist output for this package; hash in filename changes each build. | ai | |
| source-diff | obfuscated-file:dist/client/__vitest__/assets/index-l1rdxr0p.js | AI (source-diff): Vite client bundle including Vue; standard minified output for this package. | ai | |
| source-diff | obfuscated-file:dist/client/__vitest__/assets/index-DflzHTY2.js | AI (source-diff): Bundled Vue + client assets; minification is expected for browser-served code. | ai | |
| source-diff | obfuscated-file:dist/index-5Pe7X7sp.js | AI (source-diff): Standard minified bundle output for browser test runner; not obfuscation. | ai | |
| source-diff | obfuscated-file:dist/client/__vitest__/assets/index-C5TM4_dj.js | AI (source-diff): Bundled Vue + browser client code; standard minified output. | ai | |
| source-diff | obfuscated-file:dist/client/__vitest__/assets/index-BUCFJtth.js | AI (source-diff): Vite-bundled Vue runtime; standard minified build output for this package. | ai | |
| source-diff | obfuscated-file:dist/index-D6m36C6U.js | AI (source-diff): Rollup-bundled dist output with hashed filename; standard for this package. | ai | |
| source-diff | obfuscated-file:dist/client/__vitest__/assets/index-DZIaN7GU.js | AI (source-diff): Standard Vite-bundled client assets with minified Vue runtime; expected for this package. | ai | |
| source-diff | obfuscated-file:dist/index-D8jtZoIM.js | AI (source-diff): Bundled/minified dist output with CSS parser; expected build artifact. | ai | |
| source-diff | obfuscated-file:dist/client/__vitest__/assets/index-BPQdrqGZ.js | AI (source-diff): Minified client bundle (Vue 3 runtime etc.) — standard for browser test runner. | ai | |
| publish-pattern | dormant-publish | AI (publish-pattern): Major version jump (v2→v4) explains gap; provenance-attested CI/CD publish. | ai | |
| source-diff | obfuscated-file:dist/client/__vitest__/assets/index-TGTX-jRo.js | AI (source-diff): Standard Vite-bundled client asset with identifiable Vue.js source; expected for this package. | ai | |
| dependencies | unvetted-dep:@blazediff/core | AI (dependencies): Replaces pixelmatch as a pixel-diff utility; consistent with browser testing use case in a high-trust package. | ai |
Versions (showing 25 of 25)
| Version | Deps | Published |
|---|---|---|
| 4.1.5 | 8 / 11 | |
| 4.1.4 | 8 / 11 | |
| 4.1.3 | 8 / 11 | |
| 4.1.2 | 8 / 11 | |
| 4.1.1 | 8 / 11 | |
| 4.1.0 | 8 / 11 | |
| 4.0.18 | 8 / 11 | |
| 4.0.17 | 8 / 11 | |
| 4.0.16 | 8 / 10 | |
| 4.0.15 | 8 / 10 | |
| 4.0.14 | 8 / 10 | |
| 4.0.13 | 8 / 10 | |
| 4.0.12 | 8 / 10 | |
| 4.0.11 | 8 / 10 | |
| 4.0.10 | 8 / 10 | |
| 4.0.9 | 8 / 10 | |
| 4.0.8 | 8 / 10 | |
| 4.0.7 | 8 / 10 | |
| 4.0.6 | 8 / 10 | |
| 4.0.5 | 8 / 10 | |
| 4.0.4 | 8 / 10 | |
| 4.0.3 | 8 / 10 | |
| 4.0.2 | 8 / 10 | |
| 4.0.1 | 8 / 10 | |
| 4.0.0 | 8 / 10 |
v4.1.5
3 findingsNewly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.1.4
3 findingsNewly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.1.3
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.1.2
3 findingsNewly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.1.1
3 findingsNewly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.1.0
3 findingsNewly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.0.18
3 findingsNewly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.0.17
3 findingsNewly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.0.16
2 findingsNewly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.0.15
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.0.14
3 findingsNewly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.0.13
2 findingsNewly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.0.12
2 findingsNewly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.0.11
2 findingsNewly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.0.10
2 findingsNewly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.0.9
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.0.8
3 findingsNewly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Newly added source file contains lines over 3000 chars, suggesting minified or obfuscated code. New obfuscated files are a strong attack indicator.
Published via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.0.7
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.0.6
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.0.5
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.0.4
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.0.3
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.0.2
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.0.1
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.
v4.0.0
1 findingPublished via CI/CD with Sigstore attestation (predicate: https://slsa.dev/provenance/v1). This is the strongest supply chain integrity signal.