Skip to content

Security: hydro-project/hydroscope

Security

SECURITY.md

Security Analysis - npm audit False Positives

Date: January 2025

Summary

npm audit is reporting 45 critical vulnerabilities flagged as "malware" in fundamental npm packages. Investigation shows these are false positives in the GitHub Advisory Database.

Affected Packages

  • color-convert - GHSA-ch7m-m9rf-8gvv (published 1 hour ago)
  • debug - GHSA-8mgj-vmr8-frr6 (published 2 hours ago)
  • color-name - GHSA-m99c-cfww-cxqx
  • error-ex - GHSA-5g7q-qh7p-jjvm
  • is-arrayish - GHSA-hfm8-9jrf-7g9w

Evidence of False Positives

1. Package Legitimacy

2. Timing Suspicious

  • All advisories published within last 1-2 hours
  • Claims ALL versions of fundamental packages are malware
  • No prior security issues with these packages

3. Development Dependencies Only

npm audit --omit=dev
# Result: found 0 vulnerabilities
  • Vulnerabilities only exist in development dependencies
  • No production/runtime security risk
  • Packages used only during build/development process

Mitigation Strategy

1. Package Overrides (Implemented)

Added specific version overrides in package.json:

"overrides": {
  "debug": "4.3.7",
  "color-convert": "2.0.1", 
  "color-name": "1.1.4",
  "error-ex": "1.3.2",
  "is-arrayish": "0.2.1"
}

2. Monitoring

  • Monitor GitHub Advisory Database for resolution
  • Check for updates from package maintainers
  • Watch for npm audit database corrections

Risk Assessment

RISK LEVEL: LOW

  • No production dependencies affected
  • Packages are legitimate and widely used
  • Evidence strongly suggests false positives
  • Build process remains secure

Next Steps

  1. Continue monitoring for advisory database corrections
  2. Remove overrides once false positives are resolved
  3. Consider reporting false positives to GitHub Advisory Database

References

There aren’t any published security advisories