You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Once we merge into the Node.js codebase, getting security patches out the door becomes more painful.
I've had to fix several prototype related bugs/security notifications over the years by virtue of using a POJO when parsing. Here's an example as to how this can cause weird behavior:
The issues I looked at that were reported against Yargs and Minimist were due to supporting structured options, where --foo.bar is parsed into { foo: { bar: true } }. We are doing single level assignment in parseArgs, although we do also have arrays.
I'm not against using SafeMap, but I don't think we are exposed to the same risks.
Once we merge into the Node.js codebase, getting security patches out the door becomes more painful.
I've had to fix several prototype related bugs/security notifications over the years by virtue of using a POJO when parsing. Here's an example as to how this can cause weird behavior:
I think it would be worth preemptively moving our implementation to using a
Map
, and then converting the Map into an object as a final step.The text was updated successfully, but these errors were encountered: