-
-
Notifications
You must be signed in to change notification settings - Fork 622
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Lock versions of the dependencies #697
Comments
Can you also suggest recommended security procedures for updating dependencies manually? One platform is snyk definitely. |
It's already in place in our CI. Another check would be to run |
Yeah, we always check that while upgrading. |
Let's discuss this |
@evenstensberg This is the place to discuss it :) what do you think even? @dhruvdutt during a dep installation, npm only installs the direct dependencies, no devs. So in theory only those should be fine, although hackers usually also put cryptocurrency scripts to get CPU clocks from the CIs. So let's just audit and security check everything and that's it. |
Hmmm, makes sense. We can try pinning dependencies. |
Let us add dependabot here and pin the libraries. I think that makes sense with security. |
@evenstensberg what are your thoughts about this? |
We got snyk which I think is enough |
It's enough for us but unfortunately it's not enough for the security for the users We know that if we don't pin our dependencies and there's no lock and it's not been used properly, the consumers will get into their dependency tree all the minor releases/fixes even though it shouldn't be like this. Change is for who consumes the library |
Due to the recent problems happened to the npm world, I'd propose to lock all the versions of our dependencies and development dependencies
It's not a bulletproof solution must at least it's something
Before:
After:
The text was updated successfully, but these errors were encountered: