-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore: dependency pinning and auditing #3449
base: master
Are you sure you want to change the base?
Conversation
The latest updates on your projects. Learn more about Vercel for Git ↗︎
|
CodSpeed Performance ReportMerging #3449 will degrade performances by 19.93%Comparing Summary
Benchmarks breakdown
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Dependabot already alerts us of existing vulnerabilities in our dependencies, so I don't believe this CI check is necessary.
Also I'm not sure if dependency pinning serves as a defence against upgrading to malicious software:
-
We already commit our lockfile, and so
pnpm
will install the same versions of the dependency. So if a vulnerability is discovered in an audit, we should actually upgrade to the patched version as opposed to keeping the dependency pinned at a particular version. -
Even pinned versions can become compromised retroactively - an attacker could gain access to the package registry account and replace the package content while keeping the same version number - we could explore using provenance logs for npm packages in such a case, but not many deps provide them unfortunately. That being said It still may be worthwhile to run
pnpm audit signatures
in the future.
@maschad neither of these changes were intended as full-proof solutions, but merely mitigation. Agreed deps can be retroactively compromised and we commit our lock file. Pinning dependencies does mitigate risk of us upgrading to a compromised version, which I believe is a more common risk. Good point on the |
Okay I'm taking the approvals as agreement. Will hold off till after this weeks release window and then will merge, as I'll resolve the audit issues over the holiday period. |
…/chore/dep-pinning-audit
bc3d6f5
Coverage Report:
Changed Files:Coverage values did not change👌. |
Summary
Checklist