-
Notifications
You must be signed in to change notification settings - Fork 234
Please enable Dependabot on this project and fix the vulnerable dependencies used #184
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Hi @rajbos, Just be aware when you are using this, or any other action based on the Anyway, I would say the security vulnerabilities are not that critical when you are running the code in a sandbox environment and only against your own input. If I run into some issues with updates, help will be appreciated :) |
Thanks., will wait for those fixes. Do note: while only the That's why we check all of this before on-boarding the action into our setup 🔬 . |
I've managed to update almost all dependencies to the latest version. Security vulnerabilities should be fixed now. Dependabot and a new release will be next. @rajbos I've run into a strange issue, that cost me some time. Maybe you can help me understand it? got@v12.x has a dependency on @sindresorhus/is@v5.x and it uses the optional chaining operator |
Hmm, I'm not to much into how that works. Have you checked if downgrade the node version on the runners with the |
We want to onboard this project and always run a security scan on the action. One of the steps is forking the action and enabling Dependabot to see what it finds.
In this case it found a lot of vulnerable dependencies 😢. Could you enable Dependabot and let it propose fixes for the vulnerable dependencies it found. It's free for public repos and will keep your dependencies up to date if you let it.
Happy to help if needed.
The text was updated successfully, but these errors were encountered: