Is this project live at all ? When starting it the npm audit finds 52 vulnerabilities (35 moderate, 11 high, 6 critical).
# npm audit report
@webex/webex-core *
Severity: moderate
Depends on vulnerable versions of jsonwebtoken
Depends on vulnerable versions of jsonwebtoken - null
fix available via `npm audit fix`
node_modules/@webex/webex-core
@webex/internal-plugin-calendar >=1.80.143
Depends on vulnerable versions of @webex/internal-plugin-conversation
Depends on vulnerable versions of @webex/internal-plugin-device
Depends on vulnerable versions of @webex/internal-plugin-encryption
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/internal-plugin-calendar
@webex/internal-plugin-conversation >=1.80.77
Depends on vulnerable versions of @webex/internal-plugin-encryption
Depends on vulnerable versions of @webex/internal-plugin-user
Depends on vulnerable versions of @webex/webex-core
Depends on vulnerable versions of node-scr
node_modules/@webex/internal-plugin-conversation
@webex/internal-plugin-device >=1.80.143
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/internal-plugin-device
@webex/internal-plugin-encryption *
Depends on vulnerable versions of @webex/internal-plugin-device
Depends on vulnerable versions of @webex/internal-plugin-mercury
Depends on vulnerable versions of @webex/webex-core
Depends on vulnerable versions of node-jose
Depends on vulnerable versions of node-kms
Depends on vulnerable versions of node-scr
node_modules/@webex/internal-plugin-encryption
@webex/internal-plugin-feature >=1.80.143
Depends on vulnerable versions of @webex/internal-plugin-device
Depends on vulnerable versions of @webex/internal-plugin-mercury
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/internal-plugin-feature
@webex/internal-plugin-lyra >=1.80.143
Depends on vulnerable versions of @webex/internal-plugin-conversation
Depends on vulnerable versions of @webex/internal-plugin-encryption
Depends on vulnerable versions of @webex/internal-plugin-feature
Depends on vulnerable versions of @webex/internal-plugin-mercury
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/internal-plugin-lyra
@webex/internal-plugin-mercury >=1.80.143
Depends on vulnerable versions of @webex/internal-plugin-device
Depends on vulnerable versions of @webex/internal-plugin-feature
Depends on vulnerable versions of @webex/internal-plugin-metrics
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/internal-plugin-mercury
@webex/internal-plugin-metrics >=1.80.143
Depends on vulnerable versions of @webex/internal-plugin-device
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/internal-plugin-metrics
@webex/internal-plugin-presence >=1.80.143
Depends on vulnerable versions of @webex/internal-plugin-device
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/internal-plugin-presence
@webex/internal-plugin-search >=1.80.143
Depends on vulnerable versions of @webex/internal-plugin-conversation
Depends on vulnerable versions of @webex/internal-plugin-encryption
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/internal-plugin-search
@webex/internal-plugin-user >=1.80.143
Depends on vulnerable versions of @webex/internal-plugin-device
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/internal-plugin-user
@webex/plugin-attachment-actions >=1.80.143
Depends on vulnerable versions of @webex/internal-plugin-conversation
Depends on vulnerable versions of @webex/internal-plugin-mercury
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/plugin-attachment-actions
@webex/plugin-authorization-browser >=1.80.143
Depends on vulnerable versions of @webex/internal-plugin-device
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/plugin-authorization-browser
@webex/plugin-authorization >=1.80.143
Depends on vulnerable versions of @webex/plugin-authorization-browser
Depends on vulnerable versions of @webex/plugin-authorization-node
node_modules/@webex/plugin-authorization
@webex/plugin-authorization-node >=1.80.143
Depends on vulnerable versions of @webex/internal-plugin-device
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/plugin-authorization-node
@webex/plugin-device-manager >=1.80.143
Depends on vulnerable versions of @webex/internal-plugin-device
Depends on vulnerable versions of @webex/internal-plugin-lyra
Depends on vulnerable versions of @webex/internal-plugin-search
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/plugin-device-manager
@webex/plugin-logger >=1.80.143
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/plugin-logger
@webex/plugin-meetings >=1.80.143
Depends on vulnerable versions of @webex/internal-plugin-mercury
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/plugin-meetings
@webex/plugin-memberships >=1.80.143
Depends on vulnerable versions of @webex/internal-plugin-conversation
Depends on vulnerable versions of @webex/internal-plugin-mercury
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/plugin-memberships
@webex/plugin-messages >=1.80.143
Depends on vulnerable versions of @webex/internal-plugin-conversation
Depends on vulnerable versions of @webex/internal-plugin-mercury
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/plugin-messages
@webex/plugin-people >=1.80.143
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/plugin-people
@webex/plugin-rooms >=1.80.143
Depends on vulnerable versions of @webex/internal-plugin-conversation
Depends on vulnerable versions of @webex/internal-plugin-mercury
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/plugin-rooms
@webex/plugin-team-memberships >=1.80.143
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/plugin-team-memberships
@webex/plugin-teams >=1.80.143
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/plugin-teams
@webex/plugin-webhooks >=1.80.143
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/plugin-webhooks
@webex/storage-adapter-local-storage >=1.80.143
Depends on vulnerable versions of @webex/webex-core
node_modules/@webex/storage-adapter-local-storage
webex >=1.80.143
Depends on vulnerable versions of @webex/internal-plugin-calendar
Depends on vulnerable versions of @webex/internal-plugin-device
Depends on vulnerable versions of @webex/internal-plugin-presence
Depends on vulnerable versions of @webex/plugin-attachment-actions
Depends on vulnerable versions of @webex/plugin-authorization
Depends on vulnerable versions of @webex/plugin-device-manager
Depends on vulnerable versions of @webex/plugin-logger
Depends on vulnerable versions of @webex/plugin-meetings
Depends on vulnerable versions of @webex/plugin-memberships
Depends on vulnerable versions of @webex/plugin-messages
Depends on vulnerable versions of @webex/plugin-people
Depends on vulnerable versions of @webex/plugin-rooms
Depends on vulnerable versions of @webex/plugin-team-memberships
Depends on vulnerable versions of @webex/plugin-teams
Depends on vulnerable versions of @webex/plugin-webhooks
Depends on vulnerable versions of @webex/storage-adapter-local-storage
Depends on vulnerable versions of @webex/webex-core
node_modules/webex
ajv <6.12.3
Severity: moderate
Prototype Pollution in Ajv - https://github.com/advisories/GHSA-v88g-cgmw-v5xw
fix available via `npm audit fix`
node_modules/ajv
ansi-regex 3.0.0 || 4.0.0 - 4.1.0
Severity: high
Inefficient Regular Expression Complexity in chalk/ansi-regex - https://github.com/advisories/GHSA-93q8-gq69-wqmw
Inefficient Regular Expression Complexity in chalk/ansi-regex - https://github.com/advisories/GHSA-93q8-gq69-wqmw
fix available via `npm audit fix`
node_modules/ansi-regex
node_modules/cliui/node_modules/ansi-regex
node_modules/inquirer/node_modules/ansi-regex
node_modules/table/node_modules/ansi-regex
node_modules/wrap-ansi/node_modules/ansi-regex
node_modules/yargs/node_modules/ansi-regex
bl 2.0.0 - 2.2.0
Severity: moderate
Remote Memory Exposure in bl - https://github.com/advisories/GHSA-pp7h-53gx-mx7r
fix available via `npm audit fix`
node_modules/bl
bson <=1.1.3
Severity: high
Deserialization of Untrusted Data in bson - https://github.com/advisories/GHSA-4jwp-vfvf-657p
Deserialization of Untrusted Data in bson - https://github.com/advisories/GHSA-v8w9-2789-6hhr
fix available via `npm audit fix`
node_modules/bson
flat <5.0.1
Severity: critical
flat vulnerable to Prototype Pollution - https://github.com/advisories/GHSA-2j2x-2gpw-g8fm
fix available via `npm audit fix --force`
Will install mocha@10.2.0, which is a breaking change
node_modules/flat
yargs-unparser <=1.6.3
Depends on vulnerable versions of flat
node_modules/yargs-unparser
mocha 5.1.0 - 9.2.1
Depends on vulnerable versions of minimatch
Depends on vulnerable versions of yargs-unparser
node_modules/mocha
json-schema <0.4.0
Severity: critical
json-schema is vulnerable to Prototype Pollution - https://github.com/advisories/GHSA-896r-f27r-55mw
fix available via `npm audit fix`
node_modules/json-schema
jsprim 0.3.0 - 1.4.1 || 2.0.0 - 2.0.1
Depends on vulnerable versions of json-schema
node_modules/jsprim
jsonwebtoken <=8.5.1
Severity: high
jsonwebtoken's insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC - https://github.com/advisories/GHSA-hjrf-2m68-5959
jsonwebtoken unrestricted key type could lead to legacy keys usage - https://github.com/advisories/GHSA-8cf7-32gw-wr33
jsonwebtoken vulnerable to signature validation bypass due to insecure default algorithm in jwt.verify() - https://github.com/advisories/GHSA-qwph-4952-7xr6
jsonwebtoken has insecure input validation in jwt.verify function - https://github.com/advisories/GHSA-27h2-hvpr-p74q
fix available via `npm audit fix`
node_modules/jsonwebtoken
lodash <=4.17.20
Severity: high
Prototype Pollution in lodash - https://github.com/advisories/GHSA-p6mc-m468-83gw
Command Injection in lodash - https://github.com/advisories/GHSA-35jh-r3h4-6jhm
Regular Expression Denial of Service (ReDoS) in lodash - https://github.com/advisories/GHSA-29mw-wpgm-hmr9
fix available via `npm audit fix`
node_modules/lodash
minimatch <3.0.5
Severity: high
minimatch ReDoS vulnerability - https://github.com/advisories/GHSA-f8q6-p94x-37v3
fix available via `npm audit fix --force`
Will install mocha@10.2.0, which is a breaking change
node_modules/minimatch
minimist <1.2.6
Severity: critical
Prototype Pollution in minimist - https://github.com/advisories/GHSA-xvch-5gv4-984h
fix available via `npm audit fix`
node_modules/minimist
moment <=2.29.3
Severity: high
Path Traversal: 'dir/../../filename' in moment.locale - https://github.com/advisories/GHSA-8hfj-j24r-96c4
Moment.js vulnerable to Inefficient Regular Expression Complexity - https://github.com/advisories/GHSA-wc69-rhjr-hc9g
fix available via `npm audit fix`
node_modules/moment
node-forge <=1.2.1
Severity: high
Improper Verification of Cryptographic Signature in `node-forge` - https://github.com/advisories/GHSA-2r2c-g63r-vccr
Improper Verification of Cryptographic Signature in node-forge - https://github.com/advisories/GHSA-x4jg-mjrx-434g
Improper Verification of Cryptographic Signature in node-forge - https://github.com/advisories/GHSA-cfm4-qjh2-4765
Open Redirect in node-forge - https://github.com/advisories/GHSA-8fr3-hfg3-gpgp
Prototype Pollution in node-forge debug API. - https://github.com/advisories/GHSA-5rrq-pxf6-6jx5
Prototype Pollution in node-forge util.setPath API - https://github.com/advisories/GHSA-wxgw-qj99-44c2
URL parsing in node-forge could lead to undesired behavior. - https://github.com/advisories/GHSA-gf8q-jrpm-jvxq
Prototype Pollution in node-forge - https://github.com/advisories/GHSA-92xj-mqp7-vmcj
fix available via `npm audit fix`
node_modules/node-forge
node-jose <=2.0.0
Depends on vulnerable versions of node-forge
node_modules/node-jose
node-kms <=0.3.2
Depends on vulnerable versions of node-jose
node_modules/node-kms
node-scr <=0.2.2
Depends on vulnerable versions of node-jose
node_modules/node-scr
qs 6.5.0 - 6.5.2 || 6.7.0 - 6.7.2
Severity: high
qs vulnerable to Prototype Pollution - https://github.com/advisories/GHSA-hrpp-h998-j3pp
qs vulnerable to Prototype Pollution - https://github.com/advisories/GHSA-hrpp-h998-j3pp
fix available via `npm audit fix`
node_modules/qs
node_modules/request/node_modules/qs
body-parser 1.19.0
Depends on vulnerable versions of qs
node_modules/body-parser
express 4.17.0 - 4.17.1 || 5.0.0-alpha.1 - 5.0.0-alpha.8
Depends on vulnerable versions of body-parser
Depends on vulnerable versions of qs
node_modules/express
validator <=13.6.0
Severity: moderate
Inefficient Regular Expression Complexity in validator.js - https://github.com/advisories/GHSA-qgmg-gppg-76g5
Inefficient Regular Expression Complexity in Validator.js - https://github.com/advisories/GHSA-xx4c-jj58-r7x6
fix available via `npm audit fix --force`
Will install webex-node-bot-framework@2.3.15, which is a breaking change
node_modules/validator
webex-node-bot-framework <=2.3.6
Depends on vulnerable versions of validator
node_modules/webex-node-bot-framework
y18n 4.0.0
Severity: high
Prototype Pollution in y18n - https://github.com/advisories/GHSA-c4w7-xm78-47vh
fix available via `npm audit fix`
node_modules/y18n
52 vulnerabilities (35 moderate, 11 high, 6 critical)
To address issues that do not require attention, run:
npm audit fix
To address all issues (including breaking changes), run:
npm audit fix --force
Is this project live at all ? When starting it the npm audit finds 52 vulnerabilities (35 moderate, 11 high, 6 critical).