You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Dec 8, 2021. It is now read-only.
High Code Injection
Package js-yaml
Patched in >=3.13.1
Dependency of graphqlgen [dev]
Path graphqlgen > js-yaml
More info https://npmjs.com/advisories/813
Versions
graphqlgen: 0.5.1
OS name and version: Windows 10
The text was updated successfully, but these errors were encountered:
I would recommend to simply update the js-yaml dependency.
Also using ^ when declaring dependencies can often avoid such kind of bug, as the patch in the dependency's repo could automatically be loaded, without making changes to graphqlgen.
I also have this high vulnerability plus 67 vulnerabilities (63 low, 3 moderate, 1 high). But they are all dev packages, just us graphqlgen and Jest which I believe when it is built, the final product wont use this packages w/ vulnerabilities.
What do you think? Is that right?
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Description
The
js-yaml
dependency ingraphqlgen
'spackage.json
is reported to be a vulnerability.See https://www.npmjs.com/advisories/813.
Steps to reproduce
npm install --save graphqlgen
npm audit
Expected results
npm audit
reports no vulnerabilities.Actual results
npm audit
reports a high severity vulnerability:Versions
The text was updated successfully, but these errors were encountered: