2025-12-10 13:38:16 +09:00
|
|
|
#!/usr/bin/env sh
|
|
|
|
|
. "$(dirname -- "$0")/_/husky.sh"
|
|
|
|
|
|
|
|
|
|
# Run type checking
|
|
|
|
|
pnpm type-check
|
|
|
|
|
|
2025-12-10 13:38:33 +09:00
|
|
|
# Linting disabled during active development phase
|
|
|
|
|
# TODO: Re-enable before production release
|
|
|
|
|
# pnpm lint
|
2025-12-10 13:38:16 +09:00
|
|
|
|
|
|
|
|
# Quick security check (only fail on high/critical vulnerabilities)
|
|
|
|
|
echo "🔒 Running security audit..."
|
|
|
|
|
if ! pnpm audit --audit-level=high > /dev/null 2>&1; then
|
|
|
|
|
echo ""
|
|
|
|
|
echo "⚠️ High or critical security vulnerabilities detected!"
|
|
|
|
|
echo "Run 'pnpm audit' to see details and 'pnpm update' to fix."
|
|
|
|
|
echo ""
|
|
|
|
|
# Uncomment the line below to block commits with vulnerabilities:
|
|
|
|
|
# exit 1
|
|
|
|
|
fi
|
|
|
|
|
|