Nearly half the packages specified have high risk vulnerabilities, all have some vulnerability.
See original GitHub issueAfter npm i we can see that the level of vulnerabilities is unacceptable.
added 646 packages from 383 contributors and audited 762 packages in 7.892s
found 724 vulnerabilities (353 low, 23 moderate, 348 high)
run npm audit fix
to fix them, or npm audit
for details
I’m trying to fix the problem, at least locally. It will take a long time because every single specified package has a vulnerability.
Issue Analytics
- State:
- Created 3 years ago
- Comments:6 (3 by maintainers)
Top Results From Across the Web
Open Source Security Explained - Snyk
Open source security is the risks and vulnerabilities that come with ... Open source packages are typically maintained by a single developer or...
Read more >Tenable: 72% of organizations remain vulnerable to Log4Shell
Tenable conducted research on the current scope and impact of Log4Shell, and found that 72% of organizations remain vulnerable.
Read more >25+ Cyber Security Vulnerability Statistics and Facts of 2022
Half of internal-facing web application vulnerabilities are considered high risk. Edgescan's 2022 Vulnerability Statistics Report analyzed ...
Read more >Open source trends from the 2022 OSSRA - Synopsys
All industries studied contained a high percentage of open source ... license conflicts and nearly half contained high-risk vulnerabilities.
Read more >Severity Levels
The service assigns every vulnerability in the KnowledgeBase a severity level, which is determined by the security risk associated with its exploitation.
Read more >
Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free
Top Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
This is why veteran coders with decades of experience disapprove of JS as a back-end language. Javascript is not intended to be a server side language, and these node packages create vulnerabilities that get servers hacked.
This is a serious security concern and should be addressed by the developer, or there should be adequate warning in the readme.md that discourages production use without fixing all these vulnerabilities.
Is there a way to only use the client side layer of GrapesJS? Can the developer please identify the client side files?
honestly, this is what I get from the current dev
All related to dependencies of
documentation
library (used to create API .md files for documentation). Anyway, as others already had mentioned, GrapesJS is a client-side framework, so keep in mind that vulnerabilities reported by npm are mainly in libraries required for the development, so it’s not something you deploy in production.