Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
TICKET: 1558
This PR addresses vulnerability GHSA-p8p7-x288-28g6, which involves Server-Side Request Forgery in the request package. Since request is a deprecated, we use a patched, forked version of the package.
This PR addresses and forces @celo/connect to stray away from transitively depend on the vulnerable request package, and instead force it to use the patched version
"npm:@cypress/[email protected]"Validation results
- Celo module tests: All passing
- No runtime errors detected
- @cypress/[email protected] is a maintained fork designed as a drop-in replacement for the deprecated request package. While servify expects ^2.79.0, the updated package version is still compatible.
-
Yarn Auditshows that the GHSA-p8p7-x288-28g6 is no longer a vulnerability.