-
Notifications
You must be signed in to change notification settings - Fork 35
Permalink
Choose a base ref
{{ refName }}
default
Choose a head ref
{{ refName }}
default
Comparing changes
Choose two branches to see what’s changed or to start a new pull request.
If you need to, you can also or
learn more about diff comparisons.
Open a pull request
Create a new pull request by comparing changes across two branches. If you need to, you can also .
Learn more about diff comparisons here.
base repository: node-modules/compressing
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 13d0415
Could not load branches
Nothing to show
Loading
Could not load tags
Nothing to show
{{ refName }}
default
Loading
...
head repository: node-modules/compressing
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 1c1b725
Could not load branches
Nothing to show
Loading
Could not load tags
Nothing to show
{{ refName }}
default
Loading
- 7 commits
- 8 files changed
- 2 contributors
Commits on Aug 9, 2025
-
Configuration menu - View commit details
-
Copy full SHA for 6f936e0 - Browse repository at this point
Copy the full SHA 6f936e0View commit details -
Configuration menu - View commit details
-
Copy full SHA for 41a5eae - Browse repository at this point
Copy the full SHA 41a5eaeView commit details -
Configuration menu - View commit details
-
Copy full SHA for f2344e7 - Browse repository at this point
Copy the full SHA f2344e7View commit details
Commits on Jan 27, 2026
-
Configuration menu - View commit details
-
Copy full SHA for 2368a03 - Browse repository at this point
Copy the full SHA 2368a03View commit details -
Configuration menu - View commit details
-
Copy full SHA for 01acc46 - Browse repository at this point
Copy the full SHA 01acc46View commit details
Commits on Jan 28, 2026
-
fix: prevent arbitrary file write via symlink extraction (#133)
Add path traversal and symlink escape protection to prevent malicious TAR/TGZ archives from writing files outside the extraction directory. - Add isPathWithinParent() validation function - Validate all entry paths stay within destination directory - Validate symlink targets don't escape extraction directory - Skip malicious entries with warning messages GHSA-cc8f-xg8v-72m3 pick from ce1c013
Configuration menu - View commit details
-
Copy full SHA for 8d16c19 - Browse repository at this point
Copy the full SHA 8d16c19View commit details -
[skip ci] ## <small>1.10.4 (2026-01-28)</small> * fix: prevent arbitrary file write via symlink extraction (#133) ([8d16c19](8d16c19)), closes [#133](#133) * chore: add permissions to auto release ([01acc46](01acc46)) * chore: add warnning message ([2368a03](2368a03)) * chore: start 1.x branch ([6f936e0](6f936e0)) * chore: support auto merge queue ([f2344e7](f2344e7)) * chore: typo fix on branch ([41a5eae](41a5eae))
Configuration menu - View commit details
-
Copy full SHA for 1c1b725 - Browse repository at this point
Copy the full SHA 1c1b725View commit details
Loading
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff 13d0415...1c1b725