-
Notifications
You must be signed in to change notification settings - Fork 241
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[RRFC] Warn users when skipping alias/git deps during audit #497
Comments
@rotem-cider Thanks for filing this! Since this is working as intended, I've transferred this issue to our RFC repo where we can further discuss the design/direction/implementation. I also updated the title of the issue (prev. |
It seems like alias deps should not be skipped at all, but skipping git deps is a behavior i'd expect. |
Great, Thanks @darcyclarke I’ll be happy to participate in future rfc talks to help improve the ecosystem |
The problem
When running "NPM audit" with alias packages, or packages received from git installation,
it simply skips the package with no warning or sign that the package was not validated.
Organizations relying on the npm audit functionality as part of their installation can be fooled into downloading malwared / vulnerable packages.
Sample vulnerable package "pug => 3.0.0" can be bypassed when used with an alias "pug => npm:[email protected]"
Same bypass can happen also when using from tarball
Steps to reproduce
Possible Remediation
In npm 7 package aliases are checked but still not with "out-of-store" packages,
Currently because of the issue here - npm/cli#2701 it is not possible to upgrade to npm 7 in CI environments
There is no warning of packages that are not scanned in UI or in the outcoming JSON which I think should have some kind of warning/error
This issue was disclosed to the security team in March and it was decided that this should be filed as a feature/issue and not a security bug.
The text was updated successfully, but these errors were encountered: