Dependecy vulnerabilities #1649
Replies: 1 comment
-
These dependencies are used either by the development server (node-fetch) or by the react web app. For the react web app the attack surface is much lower (it runs in the browser with equal permissions as the user). Many of these CVEs are simply not exploitable because they run within the context of the browser on known code (for example we dont use template function of underscore so that CVE is not applicable, we dont issue user controlled regex on anything so slow regex are just not a threat at all). For the react web app we look carefully at XSS/CSRF/XSSI etc as actual real threats - those npm "vulnerabilities" do not represent real issues and chasing them just takes resources away from real issues. npm is well know for a lot of nonsensical false positives - here are some more discussions about this https://overreacted.io/npm-audit-broken-by-design/ we really need to look at each of these warnings carefully to decide if they apply to us (usually they do not). We also have a Snyk project to help with these dependencies a bit and help upgrade when it is possible but generally it is not always possible to always upgrade all dependencies quickly - many of these are transitory. |
Beta Was this translation helpful? Give feedback.
-
Hello,
My team was tasked to deploy this agent in several places, but on our due diligence before deploying, we scanned the code's dependencies with Black Duck, and found that there are a few dependencies that may introduce risk with the agent. These components have available packages for upgrades, but the concern is that the ones listed below, have exploit PoCs associated. I would like to start a discussion on the plan for upgrading these:
Critical:
High:
Beta Was this translation helpful? Give feedback.
All reactions