Open macide213 opened 2 weeks ago
New and removed dependencies detected. Learn more about Socket for GitHub ↗︎
Package | New capabilities | Transitives | Size | Publisher |
---|---|---|---|---|
npm/extract-text-webpack-plugin@3.0.2 | filesystem | +8 |
822 kB | d3viant0ne |
npm/file-loader@1.1.11 | Transitive: eval, filesystem | +10 |
1.27 MB | michael-ciniawsky |
npm/friendly-errors-webpack-plugin@1.7.0 | environment | +4 |
73.5 kB | timneutkens |
npm/gsap@3.8.0 | None | 0 |
2.54 MB | greensock |
npm/html-webpack-plugin@2.30.1 | filesystem, unsafe Transitive: environment, eval, network, shell | +10 |
1.56 MB | jantimon |
npm/jest-serializer-vue@0.3.0 | None | 0 |
154 kB | eddyerburgh |
npm/jest@22.4.4 | Transitive: environment, eval, filesystem, network, shell, unsafe | +112 |
13.7 MB | mjesun |
🚮 Removed packages: npm/@sendgrid/mail@7.7.0, npm/axios@0.23.0, npm/base64url@3.0.1, npm/bcrypt@5.1.1, npm/body-parser@1.20.3, npm/cbor@8.1.0, npm/compression@1.7.5, npm/cookie-session@1.4.0, npm/cors@2.8.5, npm/dotenv@10.0.0, npm/express-group-routes@1.1.0, npm/express-rate-limit@5.5.1, npm/express@4.21.1, npm/fido2-lib@2.8.3, npm/get-random-values@1.2.2, npm/helmet@4.6.0, npm/lodash.chunk@4.2.0, npm/moment-timezone@0.5.46, npm/moment@2.30.1, npm/mongoose@5.13.22, npm/multer@1.4.4, npm/node-cron@3.0.3, npm/nodemailer-openpgp@2.2.1, npm/nodemailer@6.9.16, npm/openpgp@5.11.2, npm/qrcode@1.5.4, npm/request@2.88.2, npm/socket.io@4.8.1, npm/speakeasy@2.0.0, npm/telnyx@1.27.0, npm/twilio@3.84.1, npm/u2f@0.1.3, npm/validatorjs@3.22.1
🚨 Potential security issues detected. Learn more about Socket for GitHub ↗︎
To accept the risk, merge this PR and you will not be notified again.
Contains a Critical Common Vulnerability and Exposure (CVE).
Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.
Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support [AT] socket [DOT] dev.
If you happen to install a dependency that Socket reports as Known Malware you should immediately remove it and select a different dependency. For other alert types, you may may wish to investigate alternative packages or consider if there are other ways to mitigate the specific risk posed by the dependency.
To ignore an alert, reply with a comment starting with @SocketSecurity ignore
followed by a space separated list of ecosystem/package-name@version
specifiers. e.g. @SocketSecurity ignore npm/foo@1.0.0
or ignore all packages with @SocketSecurity ignore-all
@SocketSecurity ignore npm/json-schema@0.2.3
@SocketSecurity ignore npm/loader-utils@0.2.17
@SocketSecurity ignore npm/eventsource@0.1.6
@SocketSecurity ignore npm/growl@1.9.2
@SocketSecurity ignore npm/https-proxy-agent@1.0.0
@SocketSecurity ignore npm/loader-utils@1.4.0
Merge