Closed venura9 closed 3 years ago
@venura9, thank you for opening this issue. We will triage it within the next few business days.
Hi @venura9, thanks, we'll take care of it.
@venura9, thank you for reporting the bug.
By adding this issue to the Backlog project, we have prioritized it for development. You can monitor its status in the project's board.
I have to close this issue because it is nearly impossible to bring the number of security audit warnings to zero. There is always a "dependency of a dependency of a dependency" that has some reported issues. However, this doesn't always mean that your users are vulnerable. For example, the current audit brings up an issue in meow
library which is a dependency of saas-loader
which used for the styles compilation in build time:
node_modules/trim-newlines
meow 3.4.0 - 5.0.0
Depends on vulnerable versions of trim-newlines
node_modules/meow
node-sass >=3.5.0-beta.1
Depends on vulnerable versions of meow
node_modules/node-sass
sass-loader 5.0.0 - 6.0.7 || >=8.0.0
Depends on vulnerable versions of node-sass
node_modules/sass-loader
Since it's build time, there is no threat for end-users of the portal, because meow
is not executed in the runtime at all.
Of course, we still keep an eye on audit reports and fix whatever can be fixed right away. Besides that, we have automated tools in place that check our services/portals for vulnerabilities, and we have a bounty-hunting program. All these measures help us identify and mitigate actual security issues.
Hope that makes sense.
Bug description
npm audit
throws 6 vulnerabilities (1 moderate, 5 high) (Effectively 3)Reproduction steps
npm install
and/ornpm audit
Expected behavior
Report Should ideally have no entries.
Is your portal managed or self-hosted?
Self-hosted
Release tag or commit SHA (if using self-hosted version)
2.8.0
API Management service name
N/A
Environment
N/A
Additional context
N/A