Replies: 3 comments 1 reply
-
💬 Your Product Feedback Has Been Submitted 🎉 Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩
Where to look to see what's shipping 👀
What you can do in the meantime 💻
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ |
Beta Was this translation helpful? Give feedback.
This comment was marked as off-topic.
This comment was marked as off-topic.
-
It looks like the NPM database is oversimplifying the vulnerability details compared to the GitHub Security Advisory (GHSA). A few key discrepancies stand out: Issues with NPM API Data
GitHub's advisory provides two separate version ranges:
NPM API lists the range as >=1.0.0 <9.2.1, which falsely suggests that all @octokit/request versions below 9.2.1 are affected, even though 8.4.1 and later 8.x versions are safe.
GitHub clearly specifies first_patched_version fields (8.4.1 and 9.2.1). NPM API lacks this crucial detail, leading to misleading security warnings when installing already-fixed versions like @octokit/request@8.4.1.
GitHub: Categorizes this as "medium" severity. NPM: Labels it as "moderate," which is slightly different but could impact decision-making in automated security audits. Impact of This Issue Users installing @octokit/request@8.x may receive incorrect warnings, causing unnecessary concern or unnecessary package updates. Automated security scans (e.g., npm audit) might flag safe versions due to the incorrect version range. Developers may switch to a newer version unnecessarily, leading to potential dependency conflicts. Potential Fixes or Workarounds Manually verify advisories using the GitHub API instead of relying solely on npm audit. Use npm audit --json and compare results with the GitHub Advisory API before acting. File an issue with NPM to request more precise version ranges in their advisories. |
Beta Was this translation helpful? Give feedback.
-
It seems that the npm database for vulnerabilities is either out of date with GHSA or is over simplifying fixed and affected versions.
For example, when users install
@octokit/request@8
they get a warning stating that the package has a vulnerability, when in fact it has been resolved.Reference: octokit/graphql.js#638
Look at the response given by the GitHub API (https://api.github.com/advisories/GHSA-rmvr-2pp2-xj38) and then compare it to the response from the NPM API (https://registry.npmjs.org/-/npm/v1/security/advisories/bulk)
GitHub API:
NPM API:
Beta Was this translation helpful? Give feedback.
All reactions