-
Notifications
You must be signed in to change notification settings - Fork 9.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Remediation advice to each library vuln #3524
Comments
Without explicit remediation advice in the JSON we can still do something similar. We can use the semver lib to interpret the affected version ranges. From that we can calculate the highest affected version. That means we couldn't necessarily say "You need to upgrade to version 3 or higher" but we could say something like "You gotta upgrade this lib to a version over 2.6.1". Good second/third bug here. :) @benschwarz you interested in taking this? |
Yep. Leaving it on my list |
@benschwarz if you're full I can take it |
good |
@benschwarz @evenstensberg any takers? :) |
Could work on this in June. Wrapping up some other work first. |
I'll take it |
I've asked a guy that works at Snyk for any help regarding getting that prop from the vuln db, but what I think we could do, is to add the Edit: Fixed in is our source of truth. Has a prop that indicates what we should output disregarding semver ranges. Should I go for that? |
Sounds great to me @evenstensberg! In fact, I actually think if we don't have any |
Yup. @lirantal from snyk is following up on this |
hey fellas, @evenstensberg @patrickhulce 👋 Notice that to get the data you probably need to tweak the pruned data here to include it https://github.com/GoogleChrome/lighthouse/blob/master/lighthouse-core/scripts/cleanup-vuln-snapshot.js#L56 ? |
The
no-vulnerable-libraries
audit detects and lists security vulnerabilities, but is not able to be used "offline" because there is no remediation advice to go with the vulns.This means we're not able to format lighthouse 'advice' or 'opportunities' as we do elsewhere.
Current output from
no-vulnerable-libraries
audit:Information we don't have in the audit but need:
Having the semver ranges would be useful, but we'd also need to know the current released version of a given library (Snyk vuln page):
If we can have the current released version of a given library added to the snyk client API, then I think we'll be able to do everything that we want.
Ping @tkadlec
The text was updated successfully, but these errors were encountered: