-
-
Notifications
You must be signed in to change notification settings - Fork 27k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerabilities... #13337
Comments
After using 'npm audit fix --force', the number of vulnerabilities increased from 6 to 53. |
In your package-lock.json under "node_modules/react-scripts" Then run npm install |
@baturkey there's a better way to override . With this method, you don't have to keep updating the package-lock manually. This object would be at the root of "overrides": {
"react-scripts": {
"@svgr/webpack": "8.1.0",
"typescript": "5.0.2"
}
} This tells it to override those dependencies with the specified versions when they're a child of react-scripts. I also had to override the typescript version for my upgrade, so I included that as well. |
TIL, thanks @TShaunik ! |
This vulnerability has been around for about 10 months, is this project abandoned? |
I feel like it is. Not a single version (not even a patch) has been released in 16 months. Looking at ejecting my React app from CRA to get free of |
Yeah 453 open pull requests isn't a good sign, weird though for Facebook, maybe that team got downsized? |
Thank you all for your responses! I've resolved the issue following @TShaunik's 'override' approach. |
Trying to have something work directly to the script |
This is still an issue. Overriding @svgr/webpack to several major versions above what is specified in CRA is not a proper solution. Why was this closed? |
Does this manual override to several versions newer break anything? I guess it will, esp in projects with overrides etc. So its not a proper solution. |
@ziaulrehman40 It's a solution to address the reality that they've not released anything since April 12, 2022. We're going through an SOC 2 audit and I had 3 options:
If we were to fail the audit, and we wouldn't know for 3 months (the observation window), we'd lose customers so the first option was ruled out immediately. The 2nd was considered, but I couldn't afford to be derailed to tackle the consequences of ejecting |
Hello, I am currently receiving warnings about a chain of dependencies leading to a package (nth-check) with a known high-severity vulnerability. (See attached.) What should I do? Note: npm audit fix --force does not resolve the issue.
The text was updated successfully, but these errors were encountered: