Title: Dependency Security Vulnerabilities Detected
Description:
Automated audit (npm audit
) reveals three high-severity issues in my current dependency set.
Fixing them requires upgrading to versions that introduce breaking changes (e.g., LangChain 0.3.27 or Puppeteer 24.x),
so I must keep the following versions pinned until compatibility updates are implemented.
-
@langchain/community < 0.3.3
- Vulnerability: SQL Injection in
GraphCypherQAChain
(GHSA-6m59-8fmv-m5f9) - Affected: Our code uses
langchain@≤0.2.18
, which depends on@langchain/community@<0.3.3
. - Fix: Upgrade to
@langchain/[email protected]
(will require[email protected]
, a breaking change).
- Vulnerability: SQL Injection in
-
tar-fs 2.0.0 – 2.1.1
- Vulnerability: Path Traversal / Link Following when extracting a malicious tar (GHSA-pq67-2wwv-3xjx)
- Affected:
@puppeteer/browsers@≤1.4.1
→[email protected]–22.11.1
→[email protected]
. - Fix: Upgrade to
tar-fs@≥2.1.2
by moving[email protected]
(breaking change).
-
ws 8.0.0 – 8.17.0
- Vulnerability: Denial-of-Service when handling requests with many HTTP headers (GHSA-3h5v-q93c-6h6q)
- Affected:
[email protected]–22.11.1
depends onws@^8
. - Fix: Upgrade to
[email protected]
(indirectly via[email protected]
, also a breaking change).
Current Pinned Versions (Must Remain Until Compatibility Fixes):
[email protected]
(locks@langchain/community@<0.3.3
)[email protected]
(locks@puppeteer/browsers@≤1.4.1
,[email protected]
,[email protected]
)