-
-
Notifications
You must be signed in to change notification settings - Fork 6.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
npm audit fails due to postcss #6467
Comments
I am also facing the similar issue. Auditing fails due to postcss. Version: 4.5.13 Yarn Audit details: |
Has anyone tried just adding a resolution to their |
@dwwinters That was my thought as well, if its compatible we could sub 8.2.x in. I'd love to try resolving with a short-term solution, but I'm not sure what you mean with adding a resolution and I couldn't find a suitable match in the NPM docs. Could you help me and point me at some docs so can help my self on this one? |
@OwnageBanana I use Yarn v1 for a legacy project (otherwise I would be using npm) and it allows you to specify a resolution for dependencies. Looks like an equivalent capability has been proposed for npm in the form of overrides, but it doesn't appear to have landed yet. |
I added the resolution to the
I also had to add autoprefixer and cssnano to higher versions as the lower versions are not compatible with postcss version |
I'd recommend only running Those warnings on As for this particular vulnerability, it does not affect most use cases.
|
@sodatea sorry there might be a better place to discuss but still I can't leave without leaving a note on
Following https://snyk.io/blog/ten-npm-security-best-practices/ (here: 10. "typosquatting attacks") and some well known examples mentioned there, I can't follow the advice at all. In fact, having a vulnerable devDep might even get worse, as this affects anyone's local machine with user privileges and thus any type of risk within a developers infrastructure if not well protected by 2fa, encrypted vaults etc. The same applies to CI/CD-Pipelines which somehow grant access to deployment targets by definition while still installing devDeps to be able to actually commit a build. I know the point in "It's not productive code" - but that doesn't mean dev vulnerabilities are not a risk. They are! |
…on of postcc to work: vuejs/vue-cli#6467
Version
5.0.0-beta.0
Environment info
Steps to reproduce
vue create something
npm audit
complains:What is expected?
npm audit
does not return an errorWhat is actually happening?
npm audit
returns an errorThe text was updated successfully, but these errors were encountered: