Skip to content

DEVPL-3584 js-webflow-api integration for page-client#293

Open
4vanger wants to merge 6 commits intomasterfrom
ak/DEVPL-3584-page-client
Open

DEVPL-3584 js-webflow-api integration for page-client#293
4vanger wants to merge 6 commits intomasterfrom
ak/DEVPL-3584-page-client

Conversation

@4vanger
Copy link

@4vanger 4vanger commented Nov 20, 2025

Adding createPageClient into JS Data SDK

@4vanger 4vanger requested a review from memo-pineda November 20, 2025 21:34
Copy link

@orca-security-us orca-security-us bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Orca Security Scan Summary

Status Check Issues by priority
Passed Passed Infrastructure as Code high 0   medium 0   low 0   info 0 View in Orca
Passed Passed SAST high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Secrets high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Vulnerabilities high 0   medium 0   low 0   info 0 View in Orca

Copy link

@memo-pineda memo-pineda left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nice

@4vanger 4vanger requested a review from zplata November 20, 2025 23:42
@4vanger 4vanger marked this pull request as ready for review December 16, 2025 18:32
@4vanger 4vanger requested a review from memo-pineda December 16, 2025 19:41
@4vanger 4vanger force-pushed the ak/DEVPL-3584-page-client branch from 3cb9943 to 15bcffa Compare March 6, 2026 18:17
@socket-security
Copy link

socket-security bot commented Mar 6, 2026

Review the following changes in direct dependencies. Learn more about Socket for GitHub.

Diff Package Supply Chain
Security
Vulnerability Quality Maintenance License
Addednpm/​@​webflow/​page-client@​0.0.1671005695100

View full report

@socket-security
Copy link

socket-security bot commented Mar 6, 2026

Caution

Review the following alerts detected in dependencies.

According to your organization's Security Policy, you must resolve all "Block" alerts before proceeding. It is recommended to resolve "Warn" alerts too. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Block High
Obfuscated code: npm @webflow/page-client is 98.0% likely obfuscated

Confidence: 0.98

Location: Package overview

From: ?npm/@webflow/page-client@0.0.7

ℹ Read more on: This package | This alert | What is obfuscated code?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should not obfuscate their code. Consider not using packages with obfuscated code.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@webflow/page-client@0.0.7. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Medium
Low adoption: npm @webflow/page-client

Location: Package overview

From: package.jsonnpm/@webflow/page-client@0.0.1

ℹ Read more on: This package | This alert | What are unpopular packages?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Unpopular packages may have less maintenance and contain other problems.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@webflow/page-client@0.0.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Medium
Low adoption: npm @webflow/page-client

Location: Package overview

From: ?npm/@webflow/page-client@0.0.7

ℹ Read more on: This package | This alert | What are unpopular packages?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Unpopular packages may have less maintenance and contain other problems.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@webflow/page-client@0.0.7. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Medium
Network access: npm engine.io-client in module globalThis["fetch"]

Module: globalThis["fetch"]

Location: Package overview

From: ?npm/@webflow/page-client@0.0.1npm/engine.io-client@6.6.3

ℹ Read more on: This package | This alert | What is network access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should remove all network access that is functionally unnecessary. Consumers should audit network access to ensure legitimate use.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/engine.io-client@6.6.3. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Medium
System shell access: npm xmlhttprequest-ssl in module child_process

Module: child_process

Location: Package overview

From: ?npm/@webflow/page-client@0.0.1npm/xmlhttprequest-ssl@2.1.2

ℹ Read more on: This package | This alert | What is shell access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should avoid accessing the shell which can reduce portability, and make it easier for malicious shell access to be introduced.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/xmlhttprequest-ssl@2.1.2. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Medium
Network access: npm xmlhttprequest-ssl in module http

Module: http

Location: Package overview

From: ?npm/@webflow/page-client@0.0.1npm/xmlhttprequest-ssl@2.1.2

ℹ Read more on: This package | This alert | What is network access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should remove all network access that is functionally unnecessary. Consumers should audit network access to ensure legitimate use.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/xmlhttprequest-ssl@2.1.2. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Medium
Network access: npm xmlhttprequest-ssl in module https

Module: https

Location: Package overview

From: ?npm/@webflow/page-client@0.0.1npm/xmlhttprequest-ssl@2.1.2

ℹ Read more on: This package | This alert | What is network access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should remove all network access that is functionally unnecessary. Consumers should audit network access to ensure legitimate use.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/xmlhttprequest-ssl@2.1.2. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

tim-webflow

This comment was marked as resolved.

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
@tim-webflow
Copy link
Collaborator

Caution

Review the following alerts detected in dependencies.

According to your organization's Security Policy, you must resolve all "Block" alerts before proceeding. It is recommended to resolve "Warn" alerts too. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Block High
Obfuscated code: npm @webflow/page-client is 98.0% likely obfuscated
Confidence: 0.98

Location: Package overview

From: ?npm/@webflow/page-client@0.0.7

ℹ Read more on: This package | This alert | What is obfuscated code?

Next steps: Take a moment to review the security alert above. Review
the linked package source code to understand the potential risk. Ensure the
package is not malicious before proceeding. If you're unsure how to proceed,
reach out to your security team or ask the Socket team for help at
support@socket.dev.

Suggestion: Packages should not obfuscate their code. Consider not using packages with obfuscated code.

_Mark the package as acceptable risk_. To ignore this alert only
in this pull request, reply with the comment
`@SocketSecurity ignore npm/@webflow/page-client@0.0.7`. You can
also ignore all packages with `@SocketSecurity ignore-all`.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the [triage state of this alert](https://socket.dev/dashboard/org/webflow/diff-scan/26de6950-0ed3-4554-ba7c-b46fa87eab20/alert/QcY3bMm8UjvtxSNAr1D_x9XxLnffsgeC8fbZhJrQh6D0).

Warn Medium
Low adoption: npm @webflow/page-client
Location: Package overview

From: package.jsonnpm/@webflow/page-client@0.0.1

ℹ Read more on: This package | This alert | What are unpopular packages?

Next steps: Take a moment to review the security alert above. Review
the linked package source code to understand the potential risk. Ensure the
package is not malicious before proceeding. If you're unsure how to proceed,
reach out to your security team or ask the Socket team for help at
support@socket.dev.

Suggestion: Unpopular packages may have less maintenance and contain other problems.

_Mark the package as acceptable risk_. To ignore this alert only
in this pull request, reply with the comment
`@SocketSecurity ignore npm/@webflow/page-client@0.0.1`. You can
also ignore all packages with `@SocketSecurity ignore-all`.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the [triage state of this alert](https://socket.dev/dashboard/org/webflow/diff-scan/26de6950-0ed3-4554-ba7c-b46fa87eab20/alert/Q7MbjGes0CnO-KCwZ7wKvby_q7pHAFwTsppDiibdjhNY).

Warn Medium
Low adoption: npm @webflow/page-client
Location: Package overview

From: ?npm/@webflow/page-client@0.0.7

ℹ Read more on: This package | This alert | What are unpopular packages?

Next steps: Take a moment to review the security alert above. Review
the linked package source code to understand the potential risk. Ensure the
package is not malicious before proceeding. If you're unsure how to proceed,
reach out to your security team or ask the Socket team for help at
support@socket.dev.

Suggestion: Unpopular packages may have less maintenance and contain other problems.

_Mark the package as acceptable risk_. To ignore this alert only
in this pull request, reply with the comment
`@SocketSecurity ignore npm/@webflow/page-client@0.0.7`. You can
also ignore all packages with `@SocketSecurity ignore-all`.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the [triage state of this alert](https://socket.dev/dashboard/org/webflow/diff-scan/26de6950-0ed3-4554-ba7c-b46fa87eab20/alert/Q7MbjGes0CnO-KCwZ7wKvby_q7pHAFwTsppDiibdjhNY).

Warn Medium
Network access: npm engine.io-client in module globalThis["fetch"]
Module: globalThis["fetch"]

Location: Package overview

From: ?npm/@webflow/page-client@0.0.1npm/engine.io-client@6.6.3

ℹ Read more on: This package | This alert | What is network access?

Next steps: Take a moment to review the security alert above. Review
the linked package source code to understand the potential risk. Ensure the
package is not malicious before proceeding. If you're unsure how to proceed,
reach out to your security team or ask the Socket team for help at
support@socket.dev.

Suggestion: Packages should remove all network access that is functionally unnecessary. Consumers should audit network access to ensure legitimate use.

_Mark the package as acceptable risk_. To ignore this alert only
in this pull request, reply with the comment
`@SocketSecurity ignore npm/engine.io-client@6.6.3`. You can
also ignore all packages with `@SocketSecurity ignore-all`.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the [triage state of this alert](https://socket.dev/dashboard/org/webflow/diff-scan/26de6950-0ed3-4554-ba7c-b46fa87eab20/alert/QiniGib27rZXncWyBEcmfECVRPvEq945HAgHT4NZdOPM).

Warn Medium
System shell access: npm xmlhttprequest-ssl in module child_process
Module: child_process

Location: Package overview

From: ?npm/@webflow/page-client@0.0.1npm/xmlhttprequest-ssl@2.1.2

ℹ Read more on: This package | This alert | What is shell access?

Next steps: Take a moment to review the security alert above. Review
the linked package source code to understand the potential risk. Ensure the
package is not malicious before proceeding. If you're unsure how to proceed,
reach out to your security team or ask the Socket team for help at
support@socket.dev.

Suggestion: Packages should avoid accessing the shell which can reduce portability, and make it easier for malicious shell access to be introduced.

_Mark the package as acceptable risk_. To ignore this alert only
in this pull request, reply with the comment
`@SocketSecurity ignore npm/xmlhttprequest-ssl@2.1.2`. You can
also ignore all packages with `@SocketSecurity ignore-all`.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the [triage state of this alert](https://socket.dev/dashboard/org/webflow/diff-scan/26de6950-0ed3-4554-ba7c-b46fa87eab20/alert/QRDarkqF3hPsDSefst9WTFYWO6He34mlOmQZiC3mc5MA).

Warn Medium
Network access: npm xmlhttprequest-ssl in module http
Module: http

Location: Package overview

From: ?npm/@webflow/page-client@0.0.1npm/xmlhttprequest-ssl@2.1.2

ℹ Read more on: This package | This alert | What is network access?

Next steps: Take a moment to review the security alert above. Review
the linked package source code to understand the potential risk. Ensure the
package is not malicious before proceeding. If you're unsure how to proceed,
reach out to your security team or ask the Socket team for help at
support@socket.dev.

Suggestion: Packages should remove all network access that is functionally unnecessary. Consumers should audit network access to ensure legitimate use.

_Mark the package as acceptable risk_. To ignore this alert only
in this pull request, reply with the comment
`@SocketSecurity ignore npm/xmlhttprequest-ssl@2.1.2`. You can
also ignore all packages with `@SocketSecurity ignore-all`.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the [triage state of this alert](https://socket.dev/dashboard/org/webflow/diff-scan/26de6950-0ed3-4554-ba7c-b46fa87eab20/alert/QTBsIf7oAxk7gTF76uf-HIqIL8-pYG_pccXLHaf1oTiU).

Warn Medium
Network access: npm xmlhttprequest-ssl in module https
Module: https

Location: Package overview

From: ?npm/@webflow/page-client@0.0.1npm/xmlhttprequest-ssl@2.1.2

ℹ Read more on: This package | This alert | What is network access?

Next steps: Take a moment to review the security alert above. Review
the linked package source code to understand the potential risk. Ensure the
package is not malicious before proceeding. If you're unsure how to proceed,
reach out to your security team or ask the Socket team for help at
support@socket.dev.

Suggestion: Packages should remove all network access that is functionally unnecessary. Consumers should audit network access to ensure legitimate use.

_Mark the package as acceptable risk_. To ignore this alert only
in this pull request, reply with the comment
`@SocketSecurity ignore npm/xmlhttprequest-ssl@2.1.2`. You can
also ignore all packages with `@SocketSecurity ignore-all`.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the [triage state of this alert](https://socket.dev/dashboard/org/webflow/diff-scan/26de6950-0ed3-4554-ba7c-b46fa87eab20/alert/QTBsIf7oAxk7gTF76uf-HIqIL8-pYG_pccXLHaf1oTiU).

View full report

@SocketSecurity ignore npm/@webflow/page-client@0.0.7

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants