A safe object traversal method, used for easy configuration grabbing.
latest non vulnerable version
6 years ago
latest version published
4 years ago
Scan for indirect vulnerabilities
No direct vulnerabilities have been found for this package in Snyk’s vulnerability database. This does not include vulnerabilities belonging to this package’s dependencies.Does your project rely on vulnerable package dependencies?
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities (in both your packages & their dependencies) and provides automated fixes for free.