This run took 105 seconds.
$ date
--- stdout ---
Sat Nov 29 00:05:33 UTC 2025
--- end ---
$ git clone file:///srv/git/design-codex.git repo --depth=1 -b main
--- stderr ---
Cloning into 'repo'...
--- stdout ---
--- end ---
$ git config user.name libraryupgrader
--- stdout ---
--- end ---
$ git config user.email tools.libraryupgrader@tools.wmflabs.org
--- stdout ---
--- end ---
$ git submodule update --init
--- stdout ---
--- end ---
$ grr init
--- stdout ---
Installed commit-msg hook.
--- end ---
$ git show-ref refs/heads/main
--- stdout ---
33495bc3a8d0895e9cdf37af8c061b6da909af3c refs/heads/main
--- end ---
$ /usr/bin/npm audit --json
--- stdout ---
{
"auditReportVersion": 2,
"vulnerabilities": {
"@babel/helpers": {
"name": "@babel/helpers",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1104001,
"name": "@babel/helpers",
"dependency": "@babel/helpers",
"title": "Babel has inefficient RegExp complexity in generated code with .replace when transpiling named capturing groups",
"url": "https://github.com/advisories/GHSA-968p-4wvh-cqc8",
"severity": "moderate",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 6.2,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": "<7.26.10"
}
],
"effects": [],
"range": "<7.26.10",
"nodes": [
"node_modules/@babel/helpers"
],
"fixAvailable": true
},
"@netlify/build": {
"name": "@netlify/build",
"severity": "moderate",
"isDirect": false,
"via": [
"@netlify/edge-bundler",
"@netlify/zip-it-and-ship-it"
],
"effects": [
"netlify-cli"
],
"range": "0.0.24 - 0.0.26 || 9.1.0 - 11.17.0 || 11.37.2 - 12.1.2 || 29.20.8 - 32.1.0",
"nodes": [
"node_modules/netlify-cli/node_modules/@netlify/build"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "23.12.2",
"isSemVerMajor": true
}
},
"@netlify/edge-bundler": {
"name": "@netlify/edge-bundler",
"severity": "moderate",
"isDirect": false,
"via": [
"esbuild"
],
"effects": [
"@netlify/build",
"netlify-cli"
],
"range": "8.20.0 - 11.4.0 || 12.0.0 - 13.0.0",
"nodes": [
"node_modules/netlify-cli/node_modules/@netlify/edge-bundler"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "23.12.2",
"isSemVerMajor": true
}
},
"@netlify/functions-utils": {
"name": "@netlify/functions-utils",
"severity": "moderate",
"isDirect": false,
"via": [
"@netlify/zip-it-and-ship-it"
],
"effects": [],
"range": "1.3.14 - 1.3.29 || 1.3.41 || 5.2.24 - 5.3.16",
"nodes": [
"node_modules/netlify-cli/node_modules/@netlify/functions-utils"
],
"fixAvailable": true
},
"@netlify/zip-it-and-ship-it": {
"name": "@netlify/zip-it-and-ship-it",
"severity": "moderate",
"isDirect": false,
"via": [
"esbuild"
],
"effects": [
"@netlify/build",
"@netlify/functions-utils",
"netlify-cli"
],
"range": "2.2.0 - 4.2.7 || 9.17.0 - 10.0.7",
"nodes": [
"node_modules/netlify-cli/node_modules/@netlify/zip-it-and-ship-it"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "23.12.2",
"isSemVerMajor": true
}
},
"@octokit/endpoint": {
"name": "@octokit/endpoint",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1102258,
"name": "@octokit/endpoint",
"dependency": "@octokit/endpoint",
"title": "@octokit/endpoint has a Regular Expression in parse that Leads to ReDoS Vulnerability Due to Catastrophic Backtracking",
"url": "https://github.com/advisories/GHSA-x4c5-c7rf-jjgv",
"severity": "moderate",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
"range": ">=9.0.5 <9.0.6"
}
],
"effects": [],
"range": "9.0.5",
"nodes": [
"node_modules/netlify-cli/node_modules/@octokit/endpoint"
],
"fixAvailable": true
},
"@octokit/plugin-paginate-rest": {
"name": "@octokit/plugin-paginate-rest",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1102899,
"name": "@octokit/plugin-paginate-rest",
"dependency": "@octokit/plugin-paginate-rest",
"title": "@octokit/plugin-paginate-rest has a Regular Expression in iterator Leads to ReDoS Vulnerability Due to Catastrophic Backtracking",
"url": "https://github.com/advisories/GHSA-h5c3-5r3r-rr8q",
"severity": "moderate",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
"range": ">=9.3.0-beta.1 <11.4.1"
}
],
"effects": [
"@octokit/rest"
],
"range": "9.3.0-beta.1 - 11.4.0",
"nodes": [
"node_modules/netlify-cli/node_modules/@octokit/plugin-paginate-rest"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "23.12.2",
"isSemVerMajor": true
}
},
"@octokit/request": {
"name": "@octokit/request",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1102896,
"name": "@octokit/request",
"dependency": "@octokit/request",
"title": "@octokit/request has a Regular Expression in fetchWrapper that Leads to ReDoS Vulnerability Due to Catastrophic Backtracking",
"url": "https://github.com/advisories/GHSA-rmvr-2pp2-xj38",
"severity": "moderate",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
"range": ">=1.0.0 <8.4.1"
}
],
"effects": [],
"range": "<=8.4.0",
"nodes": [
"node_modules/netlify-cli/node_modules/@octokit/request"
],
"fixAvailable": true
},
"@octokit/request-error": {
"name": "@octokit/request-error",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1102256,
"name": "@octokit/request-error",
"dependency": "@octokit/request-error",
"title": "@octokit/request-error has a Regular Expression in index that Leads to ReDoS Vulnerability Due to Catastrophic Backtracking",
"url": "https://github.com/advisories/GHSA-xx4v-prfh-6cgc",
"severity": "moderate",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
"range": ">=1.0.0 <5.1.1"
}
],
"effects": [],
"range": "<=5.1.0",
"nodes": [
"node_modules/netlify-cli/node_modules/@octokit/request-error"
],
"fixAvailable": true
},
"@octokit/rest": {
"name": "@octokit/rest",
"severity": "moderate",
"isDirect": false,
"via": [
"@octokit/plugin-paginate-rest"
],
"effects": [
"netlify-cli"
],
"range": "20.1.1 || 21.0.0-beta.1 - 21.0.0-beta.4",
"nodes": [
"node_modules/netlify-cli/node_modules/@octokit/rest"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "23.12.2",
"isSemVerMajor": true
}
},
"axios": {
"name": "axios",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1097679,
"name": "axios",
"dependency": "axios",
"title": "Axios Cross-Site Request Forgery Vulnerability",
"url": "https://github.com/advisories/GHSA-wf5p-g6vw-rhxx",
"severity": "moderate",
"cwe": [
"CWE-352"
],
"cvss": {
"score": 6.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
},
"range": ">=0.8.1 <0.28.0"
},
{
"source": 1108262,
"name": "axios",
"dependency": "axios",
"title": "Axios is vulnerable to DoS attack through lack of data size check",
"url": "https://github.com/advisories/GHSA-4hjh-wcwx-xvwj",
"severity": "high",
"cwe": [
"CWE-770"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": "<0.30.2"
},
{
"source": 1111034,
"name": "axios",
"dependency": "axios",
"title": "axios Requests Vulnerable To Possible SSRF and Credential Leakage via Absolute URL",
"url": "https://github.com/advisories/GHSA-jr5f-v2jv-69x6",
"severity": "high",
"cwe": [
"CWE-918"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": "<0.30.0"
}
],
"effects": [
"wait-on"
],
"range": "<=0.30.1",
"nodes": [
"node_modules/wait-on/node_modules/axios"
],
"fixAvailable": {
"name": "start-server-and-test",
"version": "2.1.3",
"isSemVerMajor": true
}
},
"brace-expansion": {
"name": "brace-expansion",
"severity": "low",
"isDirect": false,
"via": [
{
"source": 1105443,
"name": "brace-expansion",
"dependency": "brace-expansion",
"title": "brace-expansion Regular Expression Denial of Service vulnerability",
"url": "https://github.com/advisories/GHSA-v6h2-p8h4-qcjw",
"severity": "low",
"cwe": [
"CWE-400"
],
"cvss": {
"score": 3.1,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
"range": ">=1.0.0 <=1.1.11"
},
{
"source": 1105444,
"name": "brace-expansion",
"dependency": "brace-expansion",
"title": "brace-expansion Regular Expression Denial of Service vulnerability",
"url": "https://github.com/advisories/GHSA-v6h2-p8h4-qcjw",
"severity": "low",
"cwe": [
"CWE-400"
],
"cvss": {
"score": 3.1,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
"range": ">=2.0.0 <=2.0.1"
}
],
"effects": [],
"range": "1.0.0 - 1.1.11 || 2.0.0 - 2.0.1",
"nodes": [
"node_modules/@bundled-es-modules/glob/node_modules/brace-expansion",
"node_modules/@typescript-eslint/typescript-estree/node_modules/brace-expansion",
"node_modules/brace-expansion",
"node_modules/editorconfig/node_modules/brace-expansion",
"node_modules/eslint-plugin-n/node_modules/brace-expansion",
"node_modules/filelist/node_modules/brace-expansion",
"node_modules/js-beautify/node_modules/brace-expansion",
"node_modules/netlify-cli/node_modules/@fastify/static/node_modules/brace-expansion",
"node_modules/netlify-cli/node_modules/@netlify/build-info/node_modules/brace-expansion",
"node_modules/netlify-cli/node_modules/@netlify/build/node_modules/brace-expansion",
"node_modules/netlify-cli/node_modules/@netlify/zip-it-and-ship-it/node_modules/brace-expansion",
"node_modules/netlify-cli/node_modules/archiver-utils/node_modules/brace-expansion",
"node_modules/netlify-cli/node_modules/brace-expansion",
"node_modules/netlify-cli/node_modules/readdir-glob/node_modules/brace-expansion",
"packages/codex-design-tokens/node_modules/brace-expansion",
"packages/codex-docs/node_modules/brace-expansion",
"packages/codex-icons/node_modules/brace-expansion"
],
"fixAvailable": true
},
"esbuild": {
"name": "esbuild",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1102341,
"name": "esbuild",
"dependency": "esbuild",
"title": "esbuild enables any website to send any requests to the development server and read the response",
"url": "https://github.com/advisories/GHSA-67mh-4wv8-2f99",
"severity": "moderate",
"cwe": [
"CWE-346"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
},
"range": "<=0.24.2"
}
],
"effects": [
"@netlify/edge-bundler",
"@netlify/zip-it-and-ship-it",
"tsx",
"vite"
],
"range": "<=0.24.2",
"nodes": [
"node_modules/esbuild",
"node_modules/netlify-cli/node_modules/@netlify/edge-bundler/node_modules/esbuild",
"node_modules/netlify-cli/node_modules/esbuild",
"node_modules/vite/node_modules/esbuild",
"node_modules/vitepress/node_modules/esbuild"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "23.12.2",
"isSemVerMajor": true
}
},
"external-editor": {
"name": "external-editor",
"severity": "low",
"isDirect": false,
"via": [
"tmp"
],
"effects": [
"inquirer"
],
"range": ">=1.1.1",
"nodes": [
"node_modules/netlify-cli/node_modules/external-editor"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "23.12.2",
"isSemVerMajor": true
}
},
"form-data": {
"name": "form-data",
"severity": "critical",
"isDirect": false,
"via": [
{
"source": 1109538,
"name": "form-data",
"dependency": "form-data",
"title": "form-data uses unsafe random function in form-data for choosing boundary",
"url": "https://github.com/advisories/GHSA-fjxv-7rqg-78g4",
"severity": "critical",
"cwe": [
"CWE-330"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=4.0.0 <4.0.4"
}
],
"effects": [],
"range": "4.0.0 - 4.0.3",
"nodes": [
"node_modules/form-data"
],
"fixAvailable": true
},
"glob": {
"name": "glob",
"severity": "high",
"isDirect": true,
"via": [
{
"source": 1109842,
"name": "glob",
"dependency": "glob",
"title": "glob CLI: Command injection via -c/--cmd executes matches with shell:true",
"url": "https://github.com/advisories/GHSA-5j98-mcp5-4vw2",
"severity": "high",
"cwe": [
"CWE-78"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
"range": ">=10.2.0 <10.5.0"
},
{
"source": 1109843,
"name": "glob",
"dependency": "glob",
"title": "glob CLI: Command injection via -c/--cmd executes matches with shell:true",
"url": "https://github.com/advisories/GHSA-5j98-mcp5-4vw2",
"severity": "high",
"cwe": [
"CWE-78"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
"range": ">=11.0.0 <11.1.0"
}
],
"effects": [],
"range": "10.2.0 - 10.4.5 || 11.0.0 - 11.0.3",
"nodes": [
"node_modules/@bundled-es-modules/glob/node_modules/glob",
"node_modules/js-beautify/node_modules/glob",
"node_modules/netlify-cli/node_modules/@fastify/static/node_modules/glob",
"node_modules/netlify-cli/node_modules/archiver-utils/node_modules/glob",
"node_modules/svglint/node_modules/glob",
"packages/codex-design-tokens/node_modules/glob",
"packages/codex-docs/node_modules/glob",
"packages/codex-icons/node_modules/glob"
],
"fixAvailable": {
"name": "glob",
"version": "11.1.0",
"isSemVerMajor": false
}
},
"http-proxy-middleware": {
"name": "http-proxy-middleware",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1104105,
"name": "http-proxy-middleware",
"dependency": "http-proxy-middleware",
"title": "http-proxy-middleware allows fixRequestBody to proceed even if bodyParser has failed",
"url": "https://github.com/advisories/GHSA-9gqv-wp59-fq42",
"severity": "moderate",
"cwe": [
"CWE-754"
],
"cvss": {
"score": 4,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N"
},
"range": ">=1.3.0 <2.0.9"
},
{
"source": 1104106,
"name": "http-proxy-middleware",
"dependency": "http-proxy-middleware",
"title": "http-proxy-middleware can call writeBody twice because \"else if\" is not used",
"url": "https://github.com/advisories/GHSA-4www-5p9h-95mh",
"severity": "moderate",
"cwe": [
"CWE-670"
],
"cvss": {
"score": 4,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L"
},
"range": ">=1.3.0 <2.0.8"
}
],
"effects": [
"netlify-cli"
],
"range": "1.3.0 - 2.0.8",
"nodes": [
"node_modules/netlify-cli/node_modules/http-proxy-middleware"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "23.12.2",
"isSemVerMajor": true
}
},
"inquirer": {
"name": "inquirer",
"severity": "low",
"isDirect": false,
"via": [
"external-editor"
],
"effects": [
"netlify-cli",
"tabtab"
],
"range": "3.0.0 - 8.2.6 || 9.0.0 - 9.3.7",
"nodes": [
"node_modules/netlify-cli/node_modules/inquirer"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "23.12.2",
"isSemVerMajor": true
}
},
"ipx": {
"name": "ipx",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1106842,
"name": "ipx",
"dependency": "ipx",
"title": "IPX Allows Path Traversal via Prefix Matching Bypass",
"url": "https://github.com/advisories/GHSA-mm3p-j368-7jcr",
"severity": "moderate",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=2.0.0-0 <2.1.1"
}
],
"effects": [
"netlify-cli"
],
"range": "2.0.0-0 - 2.1.0",
"nodes": [
"node_modules/netlify-cli/node_modules/ipx"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "23.12.2",
"isSemVerMajor": true
}
},
"js-yaml": {
"name": "js-yaml",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1109801,
"name": "js-yaml",
"dependency": "js-yaml",
"title": "js-yaml has prototype pollution in merge (<<)",
"url": "https://github.com/advisories/GHSA-mh29-5h37-fv8m",
"severity": "moderate",
"cwe": [
"CWE-1321"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
"range": "<3.14.2"
},
{
"source": 1109802,
"name": "js-yaml",
"dependency": "js-yaml",
"title": "js-yaml has prototype pollution in merge (<<)",
"url": "https://github.com/advisories/GHSA-mh29-5h37-fv8m",
"severity": "moderate",
"cwe": [
"CWE-1321"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
"range": ">=4.0.0 <4.1.1"
}
],
"effects": [
"netlify-cli"
],
"range": "<3.14.2 || >=4.0.0 <4.1.1",
"nodes": [
"node_modules/@istanbuljs/load-nyc-config/node_modules/js-yaml",
"node_modules/js-yaml",
"node_modules/netlify-cli/node_modules/js-yaml"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "23.12.2",
"isSemVerMajor": true
}
},
"netlify-cli": {
"name": "netlify-cli",
"severity": "moderate",
"isDirect": true,
"via": [
"@netlify/build",
"@netlify/edge-bundler",
"@netlify/zip-it-and-ship-it",
"@octokit/rest",
"http-proxy-middleware",
"inquirer",
"ipx",
"js-yaml",
"tabtab"
],
"effects": [],
"range": "2.0.0-alpha.1 - 23.5.0",
"nodes": [
"node_modules/netlify-cli"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "23.12.2",
"isSemVerMajor": true
}
},
"node-forge": {
"name": "node-forge",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1110996,
"name": "node-forge",
"dependency": "node-forge",
"title": "node-forge has ASN.1 Unbounded Recursion",
"url": "https://github.com/advisories/GHSA-554w-wpv2-vw27",
"severity": "high",
"cwe": [
"CWE-674"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": "<1.3.2"
},
{
"source": 1110997,
"name": "node-forge",
"dependency": "node-forge",
"title": "node-forge is vulnerable to ASN.1 OID Integer Truncation",
"url": "https://github.com/advisories/GHSA-65ch-62r8-g69g",
"severity": "moderate",
"cwe": [
"CWE-190"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": "<1.3.2"
},
{
"source": 1110998,
"name": "node-forge",
"dependency": "node-forge",
"title": "node-forge has an Interpretation Conflict vulnerability via its ASN.1 Validator Desynchronization",
"url": "https://github.com/advisories/GHSA-5gfm-wpxj-wjgq",
"severity": "high",
"cwe": [
"CWE-436"
],
"cvss": {
"score": 8.6,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"
},
"range": "<1.3.2"
}
],
"effects": [],
"range": "<=1.3.1",
"nodes": [
"node_modules/netlify-cli/node_modules/node-forge"
],
"fixAvailable": true
},
"on-headers": {
"name": "on-headers",
"severity": "low",
"isDirect": false,
"via": [
{
"source": 1106812,
"name": "on-headers",
"dependency": "on-headers",
"title": "on-headers is vulnerable to http response header manipulation",
"url": "https://github.com/advisories/GHSA-76c9-3jph-rj3q",
"severity": "low",
"cwe": [
"CWE-241"
],
"cvss": {
"score": 3.4,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N"
},
"range": "<1.1.0"
}
],
"effects": [],
"range": "<1.1.0",
"nodes": [
"node_modules/netlify-cli/node_modules/on-headers"
],
"fixAvailable": true
},
"patch-package": {
"name": "patch-package",
"severity": "low",
"isDirect": false,
"via": [
"tmp"
],
"effects": [],
"range": "<=8.0.0 || >=8.1.0-canary",
"nodes": [
"node_modules/patch-package"
],
"fixAvailable": true
},
"prismjs": {
"name": "prismjs",
"severity": "moderate",
"isDirect": true,
"via": [
{
"source": 1105770,
"name": "prismjs",
"dependency": "prismjs",
"title": "PrismJS DOM Clobbering vulnerability",
"url": "https://github.com/advisories/GHSA-x7hr-w5r2-h6wg",
"severity": "moderate",
"cwe": [
"CWE-79",
"CWE-94"
],
"cvss": {
"score": 4.9,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N"
},
"range": "<1.30.0"
}
],
"effects": [],
"range": "<1.30.0",
"nodes": [
"node_modules/prismjs"
],
"fixAvailable": {
"name": "prismjs",
"version": "1.30.0",
"isSemVerMajor": false
}
},
"start-server-and-test": {
"name": "start-server-and-test",
"severity": "high",
"isDirect": true,
"via": [
"wait-on"
],
"effects": [],
"range": "1.11.1 - 2.0.2",
"nodes": [
"node_modules/start-server-and-test"
],
"fixAvailable": {
"name": "start-server-and-test",
"version": "2.1.3",
"isSemVerMajor": true
}
},
"tabtab": {
"name": "tabtab",
"severity": "low",
"isDirect": false,
"via": [
"inquirer"
],
"effects": [
"netlify-cli"
],
"range": ">=3.0.0-beta",
"nodes": [
"node_modules/netlify-cli/node_modules/tabtab"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "23.12.2",
"isSemVerMajor": true
}
},
"tar-fs": {
"name": "tar-fs",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1109532,
"name": "tar-fs",
"dependency": "tar-fs",
"title": "tar-fs has a symlink validation bypass if destination directory is predictable with a specific tarball",
"url": "https://github.com/advisories/GHSA-vj76-c3g6-qr5v",
"severity": "high",
"cwe": [
"CWE-22",
"CWE-61"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=2.0.0 <2.1.4"
},
{
"source": 1109534,
"name": "tar-fs",
"dependency": "tar-fs",
"title": "tar-fs has a symlink validation bypass if destination directory is predictable with a specific tarball",
"url": "https://github.com/advisories/GHSA-vj76-c3g6-qr5v",
"severity": "high",
"cwe": [
"CWE-22",
"CWE-61"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=3.0.0 <3.1.1"
},
{
"source": 1109542,
"name": "tar-fs",
"dependency": "tar-fs",
"title": "tar-fs can extract outside the specified dir with a specific tarball",
"url": "https://github.com/advisories/GHSA-8cj5-5rvv-wf4v",
"severity": "high",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=3.0.0 <3.0.9"
},
{
"source": 1109543,
"name": "tar-fs",
"dependency": "tar-fs",
"title": "tar-fs can extract outside the specified dir with a specific tarball",
"url": "https://github.com/advisories/GHSA-8cj5-5rvv-wf4v",
"severity": "high",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=2.0.0 <2.1.3"
},
{
"source": 1109551,
"name": "tar-fs",
"dependency": "tar-fs",
"title": "tar-fs Vulnerable to Link Following and Path Traversal via Extracting a Crafted tar File",
"url": "https://github.com/advisories/GHSA-pq67-2wwv-3xjx",
"severity": "high",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
},
"range": ">=3.0.0 <3.0.7"
},
{
"source": 1109552,
"name": "tar-fs",
"dependency": "tar-fs",
"title": "tar-fs Vulnerable to Link Following and Path Traversal via Extracting a Crafted tar File",
"url": "https://github.com/advisories/GHSA-pq67-2wwv-3xjx",
"severity": "high",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
},
"range": ">=2.0.0 <2.1.2"
}
],
"effects": [],
"range": "2.0.0 - 2.1.3 || 3.0.0 - 3.1.0",
"nodes": [
"node_modules/netlify-cli/node_modules/prebuild-install/node_modules/tar-fs",
"node_modules/netlify-cli/node_modules/tar-fs"
],
"fixAvailable": true
},
"tmp": {
"name": "tmp",
"severity": "low",
"isDirect": false,
"via": [
{
"source": 1109537,
"name": "tmp",
"dependency": "tmp",
"title": "tmp allows arbitrary temporary file / directory write via symbolic link `dir` parameter",
"url": "https://github.com/advisories/GHSA-52f5-9888-hmc6",
"severity": "low",
"cwe": [
"CWE-59"
],
"cvss": {
"score": 2.5,
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"
},
"range": "<=0.2.3"
}
],
"effects": [
"external-editor",
"patch-package"
],
"range": "<=0.2.3",
"nodes": [
"node_modules/netlify-cli/node_modules/tmp",
"node_modules/netlify-cli/node_modules/tmp-promise/node_modules/tmp",
"node_modules/patch-package/node_modules/tmp",
"node_modules/tmp"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "23.12.2",
"isSemVerMajor": true
}
},
"tsx": {
"name": "tsx",
"severity": "moderate",
"isDirect": true,
"via": [
"esbuild"
],
"effects": [],
"range": "3.13.0 - 4.19.2",
"nodes": [
"node_modules/tsx"
],
"fixAvailable": {
"name": "tsx",
"version": "4.20.6",
"isSemVerMajor": false
}
},
"undici": {
"name": "undici",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1101609,
"name": "undici",
"dependency": "undici",
"title": "Use of Insufficiently Random Values in undici",
"url": "https://github.com/advisories/GHSA-c76h-2ccp-4975",
"severity": "moderate",
"cwe": [
"CWE-330"
],
"cvss": {
"score": 6.8,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
},
"range": ">=6.0.0 <6.21.1"
},
{
"source": 1104500,
"name": "undici",
"dependency": "undici",
"title": "undici Denial of Service attack via bad certificate data",
"url": "https://github.com/advisories/GHSA-cxrh-j4jr-qwg3",
"severity": "low",
"cwe": [
"CWE-401"
],
"cvss": {
"score": 3.1,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
"range": ">=6.0.0 <6.21.2"
}
],
"effects": [],
"range": "6.0.0 - 6.21.1",
"nodes": [
"node_modules/undici"
],
"fixAvailable": true
},
"vite": {
"name": "vite",
"severity": "moderate",
"isDirect": true,
"via": [
{
"source": 1102438,
"name": "vite",
"dependency": "vite",
"title": "Websites were able to send any requests to the development server and read the response in vite",
"url": "https://github.com/advisories/GHSA-vg6x-rcgg-rjx6",
"severity": "moderate",
"cwe": [
"CWE-346",
"CWE-350",
"CWE-1385"
],
"cvss": {
"score": 6.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
},
"range": ">=6.0.0 <=6.0.8"
},
{
"source": 1103518,
"name": "vite",
"dependency": "vite",
"title": "Vite bypasses server.fs.deny when using ?raw??",
"url": "https://github.com/advisories/GHSA-x574-m823-4x7w",
"severity": "moderate",
"cwe": [
"CWE-200",
"CWE-284"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
},
"range": ">=6.0.0 <6.0.12"
},
{
"source": 1103629,
"name": "vite",
"dependency": "vite",
"title": "Vite has a `server.fs.deny` bypassed for `inline` and `raw` with `?import` query",
"url": "https://github.com/advisories/GHSA-4r4m-qw57-chr8",
"severity": "moderate",
"cwe": [
"CWE-200",
"CWE-284"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
},
"range": ">=6.0.0 <6.0.13"
},
{
"source": 1103885,
"name": "vite",
"dependency": "vite",
"title": "Vite has an `server.fs.deny` bypass with an invalid `request-target`",
"url": "https://github.com/advisories/GHSA-356w-63v5-8wf4",
"severity": "moderate",
"cwe": [
"CWE-200"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=6.0.0 <6.0.15"
},
{
"source": 1104174,
"name": "vite",
"dependency": "vite",
"title": "Vite's server.fs.deny bypassed with /. for files under project root",
"url": "https://github.com/advisories/GHSA-859w-5945-r5v3",
"severity": "moderate",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=6.0.0 <=6.1.5"
},
{
"source": 1104203,
"name": "vite",
"dependency": "vite",
"title": "Vite allows server.fs.deny to be bypassed with .svg or relative paths",
"url": "https://github.com/advisories/GHSA-xcj6-pq6g-qj4x",
"severity": "moderate",
"cwe": [
"CWE-200",
"CWE-284"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
},
"range": ">=6.0.0 <6.0.14"
},
{
"source": 1107323,
"name": "vite",
"dependency": "vite",
"title": "Vite middleware may serve files starting with the same name with the public directory",
"url": "https://github.com/advisories/GHSA-g4jq-h2w9-997c",
"severity": "low",
"cwe": [
"CWE-22",
"CWE-200",
"CWE-284"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": "<=5.4.19"
},
{
"source": 1107324,
"name": "vite",
"dependency": "vite",
"title": "Vite middleware may serve files starting with the same name with the public directory",
"url": "https://github.com/advisories/GHSA-g4jq-h2w9-997c",
"severity": "low",
"cwe": [
"CWE-22",
"CWE-200",
"CWE-284"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=6.0.0 <=6.3.5"
},
{
"source": 1107325,
"name": "vite",
"dependency": "vite",
"title": "Vite middleware may serve files starting with the same name with the public directory",
"url": "https://github.com/advisories/GHSA-g4jq-h2w9-997c",
"severity": "low",
"cwe": [
"CWE-22",
"CWE-200",
"CWE-284"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=7.0.0 <=7.0.6"
},
{
"source": 1107327,
"name": "vite",
"dependency": "vite",
"title": "Vite's `server.fs` settings were not applied to HTML files",
"url": "https://github.com/advisories/GHSA-jqfw-vq24-v9c3",
"severity": "low",
"cwe": [
"CWE-23",
"CWE-200",
"CWE-284"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": "<=5.4.19"
},
{
"source": 1107328,
"name": "vite",
"dependency": "vite",
"title": "Vite's `server.fs` settings were not applied to HTML files",
"url": "https://github.com/advisories/GHSA-jqfw-vq24-v9c3",
"severity": "low",
"cwe": [
"CWE-23",
"CWE-200",
"CWE-284"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=6.0.0 <=6.3.5"
},
{
"source": 1107329,
"name": "vite",
"dependency": "vite",
"title": "Vite's `server.fs` settings were not applied to HTML files",
"url": "https://github.com/advisories/GHSA-jqfw-vq24-v9c3",
"severity": "low",
"cwe": [
"CWE-23",
"CWE-200",
"CWE-284"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=7.0.0 <=7.0.6"
},
{
"source": 1109131,
"name": "vite",
"dependency": "vite",
"title": "vite allows server.fs.deny bypass via backslash on Windows",
"url": "https://github.com/advisories/GHSA-93m4-6634-74q7",
"severity": "moderate",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=5.2.6 <=5.4.20"
},
{
"source": 1109135,
"name": "vite",
"dependency": "vite",
"title": "vite allows server.fs.deny bypass via backslash on Windows",
"url": "https://github.com/advisories/GHSA-93m4-6634-74q7",
"severity": "moderate",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=6.0.0 <=6.4.0"
},
{
"source": 1109136,
"name": "vite",
"dependency": "vite",
"title": "vite allows server.fs.deny bypass via backslash on Windows",
"url": "https://github.com/advisories/GHSA-93m4-6634-74q7",
"severity": "moderate",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=7.0.0 <=7.0.7"
},
"esbuild"
],
"effects": [],
"range": "<=6.4.0 || 7.0.0 - 7.0.7",
"nodes": [
"node_modules/vite",
"node_modules/vitepress/node_modules/vite",
"packages/codex-docs/node_modules/vite",
"packages/codex-icons/node_modules/vite",
"packages/codex/node_modules/vite"
],
"fixAvailable": {
"name": "vite",
"version": "7.2.4",
"isSemVerMajor": false
}
},
"wait-on": {
"name": "wait-on",
"severity": "high",
"isDirect": false,
"via": [
"axios"
],
"effects": [
"start-server-and-test"
],
"range": "5.0.0-rc.0 - 7.1.0",
"nodes": [
"node_modules/wait-on"
],
"fixAvailable": {
"name": "start-server-and-test",
"version": "2.1.3",
"isSemVerMajor": true
}
}
},
"metadata": {
"vulnerabilities": {
"info": 0,
"low": 7,
"moderate": 19,
"high": 6,
"critical": 1,
"total": 33
},
"dependencies": {
"prod": 141,
"dev": 2572,
"optional": 281,
"peer": 81,
"peerOptional": 0,
"total": 2712
}
}
}
--- end ---
Upgrading n:eslint-config-wikimedia from 0.31.0 -> 0.32.2
$ /usr/bin/npm install
--- stderr ---
npm WARN EBADENGINE Unsupported engine {
npm WARN EBADENGINE package: undefined,
npm WARN EBADENGINE required: { npm: '>=10.8.2', node: '>=20.19.1' },
npm WARN EBADENGINE current: { node: 'v20.19.2', npm: '9.2.0' }
npm WARN EBADENGINE }
npm WARN EBADENGINE Unsupported engine {
npm WARN EBADENGINE package: '@wikimedia/codex@2.3.3',
npm WARN EBADENGINE required: { npm: '>=10.8.2', node: '>=20.19.1' },
npm WARN EBADENGINE current: { node: 'v20.19.2', npm: '9.2.0' }
npm WARN EBADENGINE }
npm WARN EBADENGINE Unsupported engine {
npm WARN EBADENGINE package: '@wikimedia/codex-design-tokens@2.3.3',
npm WARN EBADENGINE required: { npm: '>=10.8.1', node: '>=20.19.1' },
npm WARN EBADENGINE current: { node: 'v20.19.2', npm: '9.2.0' }
npm WARN EBADENGINE }
npm WARN EBADENGINE Unsupported engine {
npm WARN EBADENGINE package: undefined,
npm WARN EBADENGINE required: { npm: '>=10.8.2', node: '>=20.19.1' },
npm WARN EBADENGINE current: { node: 'v20.19.2', npm: '9.2.0' }
npm WARN EBADENGINE }
npm WARN EBADENGINE Unsupported engine {
npm WARN EBADENGINE package: '@wikimedia/codex-icons@2.3.3',
npm WARN EBADENGINE required: { npm: '>=10.8.2', node: '>=20.19.1' },
npm WARN EBADENGINE current: { node: 'v20.19.2', npm: '9.2.0' }
npm WARN EBADENGINE }
npm WARN EBADENGINE Unsupported engine {
npm WARN EBADENGINE package: '@wikimedia/codex@2.3.3',
npm WARN EBADENGINE required: { node: '>=20.19.1', npm: '>=10.8.2' },
npm WARN EBADENGINE current: { node: 'v20.19.2', npm: '9.2.0' }
npm WARN EBADENGINE }
npm WARN EBADENGINE Unsupported engine {
npm WARN EBADENGINE package: '@wikimedia/codex-design-tokens@2.3.3',
npm WARN EBADENGINE required: { node: '>=20.19.1', npm: '>=10.8.1' },
npm WARN EBADENGINE current: { node: 'v20.19.2', npm: '9.2.0' }
npm WARN EBADENGINE }
npm WARN EBADENGINE Unsupported engine {
npm WARN EBADENGINE package: '@wikimedia/codex-icons@2.3.3',
npm WARN EBADENGINE required: { node: '>=20.19.1', npm: '>=10.8.2' },
npm WARN EBADENGINE current: { node: 'v20.19.2', npm: '9.2.0' }
npm WARN EBADENGINE }
npm WARN EBADENGINE Unsupported engine {
npm WARN EBADENGINE package: undefined,
npm WARN EBADENGINE required: { node: '>=20.19.1', npm: '>=10.8.2' },
npm WARN EBADENGINE current: { node: 'v20.19.2', npm: '9.2.0' }
npm WARN EBADENGINE }
npm WARN deprecated inflight@1.0.6: This module is not supported, and leaks memory. Do not use it. Check out lru-cache if you want a good and tested way to coalesce async requests by a key value, which is much more comprehensive and powerful.
npm WARN deprecated rimraf@2.7.1: Rimraf versions prior to v4 are no longer supported
npm WARN deprecated @humanwhocodes/config-array@0.11.14: Use @eslint/config-array instead
npm WARN deprecated rimraf@3.0.2: Rimraf versions prior to v4 are no longer supported
npm WARN deprecated abab@2.0.6: Use your platform's native atob() and btoa() methods instead
npm WARN deprecated glob@7.2.3: Glob versions prior to v9 are no longer supported
npm WARN deprecated @humanwhocodes/object-schema@2.0.3: Use @eslint/object-schema instead
npm WARN deprecated glob@8.1.0: Glob versions prior to v9 are no longer supported
npm WARN deprecated domexception@4.0.0: Use your platform's native DOMException instead
npm WARN deprecated eslint@8.57.0: This version is no longer supported. Please see https://eslint.org/version-support for other options.
--- stdout ---
added 2470 packages, and audited 2477 packages in 1m
465 packages are looking for funding
run `npm fund` for details
33 vulnerabilities (7 low, 19 moderate, 6 high, 1 critical)
To address issues that do not require attention, run:
npm audit fix
To address all issues (including breaking changes), run:
npm audit fix --force
Run `npm audit` for details.
--- end ---
$ package-lock-lint /src/repo/npm-shrinkwrap.json
--- stdout ---
Checking /src/repo/npm-shrinkwrap.json
node_modules/codex-docs@unknown: "resolved" is not a valid URL: "packages/codex-docs" (relative URL without a base)
node_modules/@wikimedia/codex-design-tokens@unknown: "resolved" is not a valid URL: "packages/codex-design-tokens" (relative URL without a base)
node_modules/netlify-cli/tools/lint-rules@unknown: Neither "resolved" nor "version" are present
node_modules/@wikimedia/codex-icons@unknown: "resolved" is not a valid URL: "packages/codex-icons" (relative URL without a base)
node_modules/@wikimedia/codex@unknown: "resolved" is not a valid URL: "packages/codex" (relative URL without a base)
--- end ---
Traceback (most recent call last):
File "/venv/lib/python3.13/site-packages/runner/__init__.py", line 2044, in main
libup.run(args.repo, args.output, args.branch)
~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/venv/lib/python3.13/site-packages/runner/__init__.py", line 1980, in run
self.npm_upgrade(plan)
~~~~~~~~~~~~~~~~^^^^^^
File "/venv/lib/python3.13/site-packages/runner/__init__.py", line 1240, in npm_upgrade
self.check_package_lock()
~~~~~~~~~~~~~~~~~~~~~~~^^
File "/venv/lib/python3.13/site-packages/runner/__init__.py", line 338, in check_package_lock
self.check_call(["package-lock-lint", str(path)])
~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/venv/lib/python3.13/site-packages/runner/shell2.py", line 63, in check_call
res.check_returncode()
~~~~~~~~~~~~~~~~~~~~^^
File "/usr/lib/python3.13/subprocess.py", line 508, in check_returncode
raise CalledProcessError(self.returncode, self.args, self.stdout,
self.stderr)
subprocess.CalledProcessError: Command '['package-lock-lint', '/src/repo/npm-shrinkwrap.json']' returned non-zero exit status 1.