Gathering detailed insights and metrics for improved-yarn-audit
Gathering detailed insights and metrics for improved-yarn-audit
Gathering detailed insights and metrics for improved-yarn-audit
Gathering detailed insights and metrics for improved-yarn-audit
npm install improved-yarn-audit
98
Supply Chain
91.7
Quality
75.8
Maintenance
100
Vulnerability
100
License
Module System
Min. Node Version
Typescript Support
Node Version
NPM Version
47 Stars
36 Commits
13 Forks
3 Watching
3 Branches
7 Contributors
Updated on 27 Sept 2024
JavaScript (78.19%)
Shell (21.81%)
Cumulative downloads
Total Downloads
Last day
-2.6%
9,507
Compared to previous day
Last week
0.5%
44,993
Compared to previous week
Last month
5.5%
193,936
Compared to previous month
Last year
-9.9%
2,207,421
Compared to previous year
No dependencies detected.
This project aims to improve upon the existing Yarn package manager audit functionality.
GitHub Repo: https://github.com/djfdyuruiry/improved-yarn-audit
Currently yarn audit
has several issues making it difficult to use in a CI pipeline:
improved-yarn-audit
provides a wrapper around the yarn audit
command which addresses all of the above problems.
Run:
yarn add improved-yarn-audit
To execute an audit check, run:
yarn run improved-yarn-audit
You can define a minimum severity level to report, any advisories below this level are ignored.
yarn run improved-yarn-audit --min-severity moderate
Run with --help
to see all levels available
Often dev dependencies can become outdated and the package maintainer no longer provides updates. This leads to audit advisories that will never affect your production code.
To remedy this, you can pass a csv list of advisory IDs to ignore.
yarn run improved-yarn-audit --exclude GHSA-f9cm-p3w6-xvr3,GHSA-cph5-m8f7-6c5x,GHSA-gpvr-g6gh-9mc2
If an .iyarc
file is present in the current working directory, it will be parsed and used to specify a list of advisory exclusions.
Advisory exclusions to be ignored can either be provided on their own line, or as a comma separated list.
Example .iyarc
file:
1# This file can contain comments, you could do something like: 2# 34 is ignored because there is no fix available (last checked 20th March 2020) 334 4 5# This one doesn't affect us 6GHSA-3fw8-66wf-pr7m 7 8# We can also ignore all these, as a comma separated list 946,53,124 10GHSA-f9cm-p3w6-xvr3,GHSA-cph5-m8f7-6c5x,GHSA-gpvr-g6gh-9mc2
Note: if you pass in exclusions using the command line, these will override the .iyarc
file
Over time as you bump package versions, exclusions may become redundant as those advisories are no longer present in your dependencies.
If you want to fail the audit check when exclusions are missing from the Yarn audit output use the --fail-on-missing-exclusions
flag.
yarn run improved-yarn-audit --fail-on-missing-exclusions
The exit code will be the total number of missing exclusions detected.
If you want to ignore any advisories from dev dependencies, you can use the --ignore-dev-deps
flag to do this.
yarn run improved-yarn-audit --ignore-dev-deps
As of April 2019 there are outstanding network issues with the NPM registry audit API, which cause frequent request failues. To work around this until a fix is implemented you can pass a flag to retry any failed requests.
yarn run improved-yarn-audit --retry-on-network-failure
If you are an NPM fan looking for a similar solution, checkout the better-npm-audit package.
No vulnerabilities found.
Reason
no dangerous workflow patterns detected
Reason
no binaries found in the repo
Reason
0 existing vulnerabilities detected
Reason
license file detected
Details
Reason
Found 6/30 approved changesets -- score normalized to 2
Reason
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Reason
detected GitHub workflow tokens with excessive permissions
Details
Reason
dependency not pinned by hash detected -- score normalized to 0
Details
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
security policy file not detected
Details
Reason
project is not fuzzed
Details
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
Score
Last Scanned on 2024-11-25
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More