Skip to content

[Feature][High] Add dependency vulnerability scanning to CI pipeline #3384

@numbers-official

Description

@numbers-official

Summary

The CI pipeline (.github/workflows/test.yml) runs lint and unit tests but does not include any dependency vulnerability scanning. With 80+ direct dependencies including security-sensitive packages (Web3, Capacitor plugins, crypto libraries), undetected vulnerable dependencies pose a significant supply chain risk.

Evidence

Impact

  • Vulnerable dependencies may ship to production undetected
  • Stale Dependabot PRs accumulate, increasing the effort to catch up
  • Major version dependency drift increases the risk of breaking changes when finally updated

Suggested Approach

  1. Add npm audit --audit-level=high step to the test workflow:
- name: Security audit
  run: npm audit --audit-level=high --omit=dev
  1. Configure Dependabot auto-merge for patch updates via .github/dependabot.yml
  2. Consider adding a scheduled weekly security scan workflow
  3. Prioritize reviewing the 8 pending Dependabot PRs, especially the major version bumps

Related

Generated by Health Monitor with Omni

Metadata

Metadata

Labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions