|
| 1 | +# Dependency Updates Overview |
| 2 | + |
| 3 | +## Security Vulnerabilities Found (21 total) |
| 4 | + |
| 5 | +- 5 low severity |
| 6 | +- 11 moderate severity |
| 7 | +- 4 high severity |
| 8 | +- 1 critical severity |
| 9 | + |
| 10 | +### Critical Security Issues |
| 11 | + |
| 12 | +1. **vitest** (2.0.2 → 2.1.9+): Remote Code Execution vulnerability when accessing malicious websites while Vitest API server is listening |
| 13 | + |
| 14 | +### High Security Issues |
| 15 | + |
| 16 | +1. **cookie** (<0.7.0): Allows injection of unexpected key-value pairs (already addressed in separate PR #960) |
| 17 | +2. **cross-spawn**: Regular Expression Denial of Service (ReDoS) |
| 18 | +3. **tar-fs**: Link following and path traversal vulnerabilities |
| 19 | +4. **send/serve-static**: Template injection leading to XSS |
| 20 | + |
| 21 | +## Major Version Updates Available |
| 22 | + |
| 23 | +### Production Dependencies |
| 24 | + |
| 25 | +- **@azure/arm-appservice**: 15.0.0 → 17.0.0 |
| 26 | +- **@azure/arm-resources**: 5.2.0 → 6.1.0 |
| 27 | +- **@azure/msal-common**: 14.13.0 → 15.7.1 |
| 28 | +- **chalk**: 4.1.2 → 5.4.1 |
| 29 | +- **commander**: 9.5.0 → 14.0.0 |
| 30 | +- **concurrently**: 7.6.0 → 9.2.0 |
| 31 | +- **cookie**: 0.5.0 → 1.0.2 (security fix already in separate PR) |
| 32 | +- **finalhandler**: 1.2.0 → 2.1.0 |
| 33 | +- **get-port**: 5.1.1 → 7.1.0 |
| 34 | +- **internal-ip**: 6.2.0 → 8.0.0 |
| 35 | +- **json-schema-library**: 9.3.5 → 10.1.2 |
| 36 | +- **node-fetch**: 2.7.0 → 3.3.2 |
| 37 | +- **open**: 8.4.2 → 10.1.2 |
| 38 | +- **ora**: 5.4.1 → 8.2.0 |
| 39 | +- **rimraf**: 5.0.7 → 6.0.1 |
| 40 | +- **serve-static**: 1.15.0 → 2.2.0 |
| 41 | +- **wait-on**: 7.2.0 → 8.0.3 |
| 42 | + |
| 43 | +### Development Dependencies |
| 44 | + |
| 45 | +- **@semantic-release/commit-analyzer**: 11.1.0 → 13.0.1 |
| 46 | +- **@semantic-release/release-notes-generator**: 12.1.0 → 14.0.3 |
| 47 | +- **@types/node**: 18.19.39 → 24.0.4 |
| 48 | +- **@types/update-notifier**: 5.1.0 → 6.0.8 |
| 49 | +- **cypress**: 9.7.0 → 14.5.0 (major update with breaking changes) |
| 50 | +- **husky**: 4.3.8 → 9.1.7 (major update with breaking changes) |
| 51 | +- **lint-staged**: 12.5.0 → 16.1.2 |
| 52 | +- **semantic-release**: 22.0.12 → 24.2.5 |
| 53 | +- **supertest**: 6.3.4 → 7.1.1 |
| 54 | +- **vitest**: 2.0.2 → 3.2.4 |
| 55 | + |
| 56 | +## Recommendations |
| 57 | + |
| 58 | +1. **Immediate Actions**: |
| 59 | + - Cookie vulnerability fix (PR #960 already submitted) |
| 60 | + - Enable Dependabot (this PR) for automated security updates |
| 61 | +2. **Short-term Actions**: |
| 62 | + - Update critical and high-severity vulnerabilities |
| 63 | + - Review and test major version updates for breaking changes |
| 64 | +3. **Long-term Actions**: |
| 65 | + - Gradually update major versions with proper testing |
| 66 | + - Consider updating Node.js type definitions to match current Node.js version |
| 67 | + - Migrate from deprecated packages (e.g., node-fetch v2 to v3 or native fetch) |
| 68 | + |
| 69 | +## Notes on Breaking Changes |
| 70 | + |
| 71 | +### Husky (4.x → 9.x) |
| 72 | + |
| 73 | +- Configuration format has changed significantly |
| 74 | +- Git hooks setup is now different |
| 75 | +- May require migration script |
| 76 | + |
| 77 | +### Cypress (9.x → 14.x) |
| 78 | + |
| 79 | +- Many API changes and deprecations |
| 80 | +- Component testing setup changed |
| 81 | +- Configuration format updated |
| 82 | + |
| 83 | +### Node-fetch (2.x → 3.x) |
| 84 | + |
| 85 | +- Now ESM-only module |
| 86 | +- Requires Node.js 12.20.0 or higher |
| 87 | +- Some API changes |
| 88 | + |
| 89 | +These major updates should be handled separately with thorough testing. |
0 commit comments