Skip to content
This repository has been archived by the owner on Jan 30, 2018. It is now read-only.

Audit package for vulnerable dependencies #5

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

accraze
Copy link

@accraze accraze commented Oct 20, 2015

This PR contains a new feature: Auditing a package for vulnerabilities in it's dependencies.

  • Using nsp we can audit a package's dependencies for known vulnerabilities and threats listed by the Node Security Project.

The plugin will audit the cwd's package.json file and if nsp finds any vulnerabilities, it will return a SRError otherwise it will return null.

Tests/test data are included

resolves semantic-release/semantic-release#67

@accraze
Copy link
Author

accraze commented Oct 20, 2015

@boennemann let me know how this works for you...

@boennemann
Copy link
Member

Hey @accraze,

this looks pretty good. I'm just wondering where the packagePath argument comes from, and whether we should just add a default for cwd + 'package.json'.

Best,
Stephan

@accraze
Copy link
Author

accraze commented Oct 27, 2015

@boennemann.... I added the default for cwd + 'package.json'... now the packagePath arg is only used for testing.

@accraze accraze force-pushed the vulnerable-packages branch from 663b03b to 3618468 Compare January 24, 2016 16:55
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants