Installations
npm install yarn-audit-fix
Developer
antongolub
Developer Guide
Module System
ESM
Min. Node Version
>= 16.0.0
Typescript Support
Yes
Node Version
22.10.0
NPM Version
10.8.2
Statistics
181 Stars
703 Commits
9 Forks
4 Watching
5 Branches
10 Contributors
Updated on 27 Nov 2024
Languages
TypeScript (93.32%)
JavaScript (6.68%)
Total Downloads
Cumulative downloads
Total Downloads
10,094,730
Last day
-8.5%
16,085
Compared to previous day
Last week
1%
85,767
Compared to previous week
Last month
7%
380,739
Compared to previous month
Last year
-5.6%
4,062,957
Compared to previous year
Daily Downloads
Weekly Downloads
Monthly Downloads
Yearly Downloads
Dependencies
13
yarn-audit-fix
The missing yarn audit fix
Digest
Problem
yarn audit
detects vulnerabilities, but cannot fix them. Authors suggest using Dependabot or Snyk for security patches. Well, it is very inconvenient in some situations, to say the least of it. The discussion: yarn/issues/7075.yarn audit
does not support custom (in-house, internal) registries. Here are the issue & PR which have not yet received the green light.
Solution
Fortunately, there are several workarounds:
- Compose
npm audit fix
with lockfile converter (thanks to Gianfranco P., stackoverflow/60878037).yarn-audit-fix --flow=convert
just reproduces these steps with minimal changes. More details: dev.to/yarn-audit-fix-workaround - Fetch
yarn/npm audit --json
advisories and patch lockfile inners (kudos to G. Kosev, code reference).yarn-audit-fix --flow=patch
. Full description: dev.to/yarn-audit-fix-for-yarn-2-berry
Key features
- Works with Yarn 1 Classic & Yarn v2+ lockfiles (⚠️ experimental)
- A couple of strategies to fix security issues
- macOS / Linux / Windows support
- CLI / JS API
- TS and flow typings
Getting started
Requirements
Node.js: >=16.0.0
Install
1$ yarn add yarn-audit-fix -D
or even better
npm_config_yes=true npx yarn-audit-fix
CLI
$ yarn-audit-fix [--opts] Preparing temp assets... Generating package-lock.json from yarn.lock... Applying npm audit fix... invoke npm audit fix --package-lock-only added 14 packages, removed 195 packages and updated 1245 packages in 4.795s fixed 3 of 26 vulnerabilities in 1370 scanned packages 23 vulnerabilities required manual review and could not be updated Updating yarn.lock from package-lock.json... invoke yarn import info found npm package-lock.json, converting to yarn.lock warning synp > request@2.88.2: request has been deprecated, see https://github.com/request/request/issues/3142 warning tslint-config-qiwi > tslint-react@5.0.0: tslint-react is deprecated along with TSLint warning @qiwi/libdefkit > @types/read-pkg@5.1.0: This is a stub types definition. read-pkg provides its own type definitions, so you do not need this installed. ... success Saved lockfile. invoke yarn [1/4] 🔍 Resolving packages... success Already up-to-date. Done
Option | Description | Default | with --flow=convert only |
---|---|---|---|
--flow | Define how yarn.lock is modified. convert — to compose npm audit fix with two-way lockfile conversion (legacy flow). patch — to directly inject audit json data | patch | |
--audit-level | Include a vulnerability with a level as defined or higher. Supported values: low, moderate, high, critical | low | |
--cwd | Current working dir | process.cwd() | |
--dry-run | Get an idea of what audit fix will do | ||
--force | Have audit fix install semver-major updates to toplevel dependencies, not just semver-compatible ones | false | |
--help/-h | Print help message | ||
--legacy-peer-deps | Accept an incorrect (potentially broken) deps resolution | ✔ | |
--loglevel | Set custom log level | ✔ | |
--npm-path | Switch to project's local npm version instead of system default. Or provide a custom path. system / local / <custom path> | system | |
--only | Set package update scope: dev /prod | ||
--package-lock-only | Run audit fix without modifying node_modules . Highly recommended to enable. | true | ✔ |
--registry | Custom registry url | ✔ | |
--silent | Disable log output | false | |
--symlink | Symlink type for node_modules ref | junction for Windows, dir otherwise | |
--temp | Directory for temporary assets | <cwd>/node_modules/.cache/yarn-audit-fix | |
--verbose | Switch log level to verbose/debug | false | |
--exclude | Array of glob patterns of packages to exclude from audit | ||
--ignore | Array of glob patterns of advisory IDs to ignore in the audit report |
ENV
All mentioned above CLI options can be replaced with the corresponding env variables with leading YAF prefix. For example:
YAF_FORCE
equals--force
YAF_ONLY=prod
—--only=prod
JS API
yarn-audit-fix is a naive and optimistic workaround, so it exposes all of its inners to give anybody a chance to tweak up and find a better steps combination. Typedoc: https://antongolub.github.io/yarn-audit-fix/modules/
1import { run, runSync } from 'yarn-audit-fix' 2 3// NOTE actually it's promisified `run.sync` 4await run({ 5 flow: 'patch', 6 verbose: true 7}) 8 9// `runSync` is an alias for `run.sync` 10await runSync({ 11 flow: 'patch', 12 verbose: true 13})
Build and run custom flows.
1import { 2 clear, 3 exit, 4 patchLockfile, 5 yarnInstall 6} from 'yarn-audit-fix' 7 8export const flow: TFlow = { 9 main: [ 10 [ 11 'Patching yarn.lock with audit data...', 12 patchLockfile, 13 (...args) => {console.log('Smth interesting:', ...args)}, 14 yarnInstall, 15 ], 16 ['Done'], 17 ], 18 fallback: [['Failure!', exit]], 19} 20 21await run({}, flow)
Migration notes
^10.0.0
v10 bumps the pkg deps and requires NodeJS v14.
^9.0.0
v9 brings experimental Yarn 2+ lockfiles support, so the previous behaviour (when yaf
parsing failure may be used to detect them) has been changed.
^8.0.0
From v8 the library does not contain npm dependency, so the system default is used instead. If necessary you can:
- Install the required npm version and provide a custom path via CLI / ENV / JS API
- Use a pinch of npx magic:
npm_config_yes=true YAF_NPM_PATH=local npx -p yarn-audit-fix -p npm@8 -c yarn-audit-fix
^7.0.0
Following the deps, converted to ESM. So legacy require
API has been dropped since v7.0.0. Use the shiny new import
instead or try your luck with esm-hook. CLI works as before.
1// const {run} = require('yarn-audit-fix') turns into 2import {run} from 'yarn-audit-fix'
^6.0.0
Default fix strategy has been changed to direct lockfile patching with yarn audit --json
data. To use the previous legacy flow, pass --flow=convert
option to CLI.
^4.0.0
--npm-v7
flag is redundant. From v4.0.0 package's own version of npm is used by default. But you're still able to invoke system default with --npm-path=system
or define any custom --npm-path=/another/npm/bin
.
Troubleshooting
DoS vulnerability for colors 1.4.x
If you have installed yaf between 7...11 of Jan 2022 and ran it with --flow=convert
option, you might see an endless garbage loop in stdout.
The problem was caused by the transitive dep: yarn-audit-fix → synp → colors@^1.4.0
. Reasons and details: issues/218, snykvuln/2331906.
How to fix? There are 3 ways:
- Update yarn-audit-fix to
>=9.0.5
- Pin
colors
version in your lockfile to1.4.0
- Reinstall yarn-audit-fix. It looks like npm has already removed the vulnerable versions of
colors
from the registry, 2022-01-11.
yarn-audit-fix version x.x.x is out of date
npm_config_yes=true npx yarn-audit-fix --audit-level=moderate
Runtime digest
yarn-audit-fix version 4.3.6 is out of date. Install the latest 6.0.0 for better results
npx caches previously loaded packages, so you need one of:
- Define version to load:
npm yarn-audit-fix@6.0.0
- Reset npx cache. For Mac/Linux:
rm -rf ~/.npm/_npx
yarn-audit-fix command not found
After installation, the package may not be found. This is probably an issue with $PATH finding node_modules/.bin
contents or smth like that (npm/issues/957).
A bit annoying, but it's easy to handle in several ways.
- You're able to run the cmd through yarn:
yarn yarn-audit-fix
. - Simply invoke
node_modules/.bin/yarn-audit-fix
script.
enoent: no such file or directory
In some cases npm audit fix makes node_modules
to become inconsistent. This is expected. yarn and npm organize the directory space slightly differently.
npm WARN rm not removing /Users/antongolub/projects/queuefy/node_modules/.cache/yarn-audit-fix/node_modules/npm/node_modules/.bin/node-gyp as it wasn't installed by /Users/antongolub/projects/queuefy/node_modules/.cache/yarn-audit-fix/node_modules/npm/node_modules/node-gyp
npm WARN rm not removing /Users/antongolub/projects/queuefy/node_modules/.cache/yarn-audit-fix/node_modules/npm/node_modules/.bin/uuid as it wasn't installed by /Users/antongolub/projects/queuefy/node_modules/.cache/yarn-audit-fix/node_modules/npm/node_modules/uuid
npm ERR! code ENOENT
npm ERR! syscall chmod
npm ERR! path /Users/antongolub/projects/queuefy/node_modules/.cache/yarn-audit-fix/node_modules/@qiwi/libdefkit/node_modules/flowgen/lib/cli/index.js
npm ERR! errno -2
npm ERR! enoent ENOENT: no such file or directory, chmod '/Users/antongolub/projects/queuefy/node_modules/.cache/yarn-audit-fix/node_modules/@qiwi/libdefkit/node_modules/flowgen/lib/cli/index.js'
npm ERR! enoent This is related to npm not being able to find a file.
npm ERR! enoent
npm ERR! /Users/antongolub/.npm/_logs/2020-08-23T07_09_26_924Z-debug.log
{
status: 254,
signal: null,
output: [ null, null, null ]
Let's try this workaround:
- Restore the original
node_modules
state.yarn --force
orrm-rf node_modules && yarn
. - Apply
npx yarn-audit-fix --package-lock-only
. The last param should instruct npm not to modifynode_modules
contents.
--force did not force the update
The problem only concerns repositories with workspaces
(monorepos).
npm audit fix --force
throws 1 status code and suggests running npm audit fix --force
. This quite ironic behaviour is exactly what npm (arborist) does now.
$$ yarn-audit-fix --force
Preparing temp assets...
Generating package-lock.json from yarn.lock...
Applying npm audit fix...
invoke /home/qwelias/.nvm/versions/node/v12.18.1/lib/node_modules/yarn-audit-fix/node_modules/.bin/npm audit fix --package-lock-only --force --prefix=/home/qwelias/prj/stuff/test-yarn-audit-fix/node_modules/.cache/yarn-audit-fix
npm WARN using --force Recommended protections disabled.
npm WARN audit Updating lodash to 4.17.20,which is outside your stated dependency range.
npm WARN audit Manual fix required in linked project at ./packages/bar for lodash@<=4.17.18.
npm WARN audit 'cd ./packages/bar' and run 'npm audit' for details.
npm WARN audit Manual fix required in linked project at ./packages/foo for lodash@<=4.17.18.
npm WARN audit 'cd ./packages/foo' and run 'npm audit' for details.
up to date, audited 7 packages in 2s
# npm audit report
lodash <=4.17.18
Severity: high
Prototype Pollution - https://npmjs.com/advisories/782
Prototype Pollution - https://npmjs.com/advisories/1065
fix available via `npm audit fix --force`
Will install lodash@4.17.20, which is outside the stated dependency range
packages/bar/node_modules/lodash
packages/foo/node_modules/lodash
1 high severity vulnerability
To address all issues, run:
npm audit fix --force
{
status: 1,
signal: null,
output: [ null, null, null ],
pid: 176019,
stdout: null,
stderr: null
}
So you need, as the message says, to manually change the dependency versions. npm@7 is still in beta, perhaps this logic will be changed later.
In some cases npm@6 works better, so if you have such a version installed on your system, you may try:
1npx yarn-audit-fix --npm-path=system --flow=convert
You may also try to cast the optimistic flags combo
1npx yarn-audit-fix --package-lock-only=false --force --legacy-peer-deps --flow=convert
Unfortunately, even this invocation may return something like:
1# npm audit report 2 3hosted-git-info <3.0.8 4Severity: moderate 5Regular Expression Deinal of Service - https://npmjs.com/advisories/1677 6No fix available 7node_modules/normalize-package-data/node_modules/hosted-git-info 8 normalize-package-data 2.0.0 - 2.5.0 9 Depends on vulnerable versions of hosted-git-info 10 node_modules/normalize-package-data 11 meow 3.4.0 - 9.0.0 12 Depends on vulnerable versions of normalize-package-data 13 Depends on vulnerable versions of read-pkg-up
No fix available just means that no fix available. If you still doubt the correctness of the output, you can check it by hand.
1npm i --package-lock-only 2npm audit fix --package-lock-only --force
Same response for alternative patching flow:
1npm_config_yes=true npx yarn-audit-fix --audit-level=moderate --flow=patch
1Patching yarn.lock with audit data... 2invoke yarn audit --json --level moderate 3Can't find patched version that satisfies postcss@^7.0.0 in >=8.2.10 4Can't find patched version that satisfies postcss@^7.0.1 in >=8.2.10 5Can't find patched version that satisfies postcss@^7.0.27 in >=8.2.10 6Can't find patched version that satisfies ws@^7.2.3 in >=6.2.2 <7.0.0 || >=7.4.6 7Upgraded deps: <none> 8invoke yarn --update-checksums
Not everything can be repaired, alack.
Cannot install package despite being on correct node version
yarn-audit-fix is compatible with any NodeJS version which supports ESM, but the nested packages can define their own engine requirements.
1pkg-dir@7.0.0: The engine "node" is incompatible with this module. Expected version ">=14.16". Got "14.15.1"
The recommended way is to update the runtime version. As a temporary workaround, you can simply pass --ignore-engines
flag.
1yarn add yarn-audit-fix -D --ignore-engines
Response Code: 400 (Bad Request)
In some cases yarn npm audit fails because the yarn.lock
file contains a transitive dependency in unreadable format:
'example-dependency': 'npm:example-dependency@1.0.0'
This will results in:
1invoke yarn npm audit --all --json --recursive 2➤ YN0035: Bad Request 3➤ YN0035: Response Code: 400 (Bad Request) 4➤ YN0035: Request Method: POST 5➤ YN0035: Request URL: https://registry.yarnpkg.com/-/npm/v1/security/audits/quick
https://github.com/yarnpkg/berry/issues/4117
A workaround is available using the exclude
option:
- Update project yarn to >=3.3.0 (lower version doesn't support this parameter for yarn npm audit).
- Apply
npx yarn-audit-fix --exclude example-dependency
. This will cause yarn to ignoreexample-dependency
while creating the audit report.
Contributing
Feel free to open any issues: bugs, feature requests or other questions. You're always welcome to suggest a PR. Just fork this repo, write some code, add some tests and push your changes. Any feedback is appreciated.
License
No vulnerabilities found.
Reason
22 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10
Reason
no binaries found in the repo
Reason
no dangerous workflow patterns detected
Reason
security policy file detected
Details
- Info: security policy file detected: SECURITY.md:1
- Info: Found linked content: SECURITY.md:1
- Info: Found disclosure, vulnerability, and/or timelines in security policy: SECURITY.md:1
- Info: Found text in security policy: SECURITY.md:1
Reason
license file detected
Details
- Info: project has a license file: LICENSE:0
- Info: FSF or OSI recognized license: MIT License: LICENSE:0
Reason
SAST tool is run on all commits
Details
- Info: SAST configuration detected: CodeQL
- Info: all commits (23) are checked with a SAST tool
Reason
Found 3/19 approved changesets -- score normalized to 1
Reason
detected GitHub workflow tokens with excessive permissions
Details
- Info: jobLevel 'checks' permission set to 'read': .github/workflows/ci.yaml:11
- Warn: jobLevel 'statuses' permission set to 'write': .github/workflows/ci.yaml:12
- Warn: jobLevel 'contents' permission set to 'write': .github/workflows/ci.yaml:13
- Warn: jobLevel 'packages' permission set to 'write': .github/workflows/ci.yaml:14
- Info: jobLevel 'actions' permission set to 'read': .github/workflows/codeql-analysis.yml:28
- Info: jobLevel 'contents' permission set to 'read': .github/workflows/codeql-analysis.yml:29
- Warn: no topLevel permission defined: .github/workflows/ci.yaml:1
- Warn: no topLevel permission defined: .github/workflows/codeql-analysis.yml:1
Reason
dependency not pinned by hash detected -- score normalized to 0
Details
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yaml:18: update your workflow using https://app.stepsecurity.io/secureworkflow/antongolub/yarn-audit-fix/ci.yaml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yaml:23: update your workflow using https://app.stepsecurity.io/secureworkflow/antongolub/yarn-audit-fix/ci.yaml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/ci.yaml:39: update your workflow using https://app.stepsecurity.io/secureworkflow/antongolub/yarn-audit-fix/ci.yaml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yaml:69: update your workflow using https://app.stepsecurity.io/secureworkflow/antongolub/yarn-audit-fix/ci.yaml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yaml:72: update your workflow using https://app.stepsecurity.io/secureworkflow/antongolub/yarn-audit-fix/ci.yaml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yaml:83: update your workflow using https://app.stepsecurity.io/secureworkflow/antongolub/yarn-audit-fix/ci.yaml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yaml:102: update your workflow using https://app.stepsecurity.io/secureworkflow/antongolub/yarn-audit-fix/ci.yaml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:42: update your workflow using https://app.stepsecurity.io/secureworkflow/antongolub/yarn-audit-fix/codeql-analysis.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:46: update your workflow using https://app.stepsecurity.io/secureworkflow/antongolub/yarn-audit-fix/codeql-analysis.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:57: update your workflow using https://app.stepsecurity.io/secureworkflow/antongolub/yarn-audit-fix/codeql-analysis.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:71: update your workflow using https://app.stepsecurity.io/secureworkflow/antongolub/yarn-audit-fix/codeql-analysis.yml/master?enable=pin
- Warn: npmCommand not pinned by hash: .github/workflows/ci.yaml:111
- Info: 0 out of 10 GitHub-owned GitHubAction dependencies pinned
- Info: 0 out of 1 third-party GitHubAction dependencies pinned
- Info: 0 out of 1 npmCommand dependencies pinned
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
project is not fuzzed
Details
- Warn: no fuzzer integrations found
Reason
104 existing vulnerabilities detected
Details
- Warn: Project is vulnerable to: GHSA-67hx-6x53-jw92
- Warn: Project is vulnerable to: GHSA-93q8-gq69-wqmw
- Warn: Project is vulnerable to: GHSA-qwcr-r2fm-qrc7
- Warn: Project is vulnerable to: GHSA-cwfw-4gq5-mrqx
- Warn: Project is vulnerable to: GHSA-g95f-p29q-9xw4
- Warn: Project is vulnerable to: GHSA-grv7-fg5c-xmjg
- Warn: Project is vulnerable to: GHSA-x9w5-v3q2-3rhw
- Warn: Project is vulnerable to: GHSA-wxhq-pm8v-cw75
- Warn: Project is vulnerable to: GHSA-pxg6-pf52-xh8x
- Warn: Project is vulnerable to: GHSA-3xgq-45jj-v275
- Warn: Project is vulnerable to: GHSA-w573-4hg7-7wgq
- Warn: Project is vulnerable to: GHSA-c6rp-wrp9-qr4q
- Warn: Project is vulnerable to: GHSA-phwq-j96m-2c2q
- Warn: Project is vulnerable to: GHSA-ghr5-ch3p-vcr6
- Warn: Project is vulnerable to: GHSA-434g-2637-qmqr
- Warn: Project is vulnerable to: GHSA-49q7-c7j4-3p7m
- Warn: Project is vulnerable to: GHSA-977x-g7h5-7qgw
- Warn: Project is vulnerable to: GHSA-f7q4-pwc6-w24p
- Warn: Project is vulnerable to: GHSA-fc9h-whq2-v747
- Warn: Project is vulnerable to: GHSA-rv95-896h-c2vc
- Warn: Project is vulnerable to: GHSA-qw6h-vgh9-j6wx
- Warn: Project is vulnerable to: GHSA-74fj-2j2h-c42q
- Warn: Project is vulnerable to: GHSA-pw2r-vq6v-hr8c
- Warn: Project is vulnerable to: GHSA-jchw-25xp-jwwc
- Warn: Project is vulnerable to: GHSA-cxjh-pqwp-8mfp
- Warn: Project is vulnerable to: GHSA-pfrx-2q88-qq97
- Warn: Project is vulnerable to: GHSA-rc47-6667-2j5j
- Warn: Project is vulnerable to: GHSA-c7qv-q95q-8v27
- Warn: Project is vulnerable to: GHSA-78xj-cgh5-2h22
- Warn: Project is vulnerable to: GHSA-2p57-rm9w-gvfp
- Warn: Project is vulnerable to: GHSA-896r-f27r-55mw
- Warn: Project is vulnerable to: GHSA-9c47-m6qq-7p4h
- Warn: Project is vulnerable to: GHSA-76p3-8jx3-jpfq
- Warn: Project is vulnerable to: GHSA-3rfm-jhwj-7488
- Warn: Project is vulnerable to: GHSA-hhq3-ff78-jv3g
- Warn: Project is vulnerable to: GHSA-35jh-r3h4-6jhm
- Warn: Project is vulnerable to: GHSA-6vfc-qv3f-vr6c
- Warn: Project is vulnerable to: GHSA-ch52-vgq2-943f
- Warn: Project is vulnerable to: GHSA-5v2h-r2cx-5xgj
- Warn: Project is vulnerable to: GHSA-rrrm-qjm4-v8hf
- Warn: Project is vulnerable to: GHSA-952p-6rrq-rcjv
- Warn: Project is vulnerable to: GHSA-f8q6-p94x-37v3
- Warn: Project is vulnerable to: GHSA-xvch-5gv4-984h
- Warn: Project is vulnerable to: GHSA-7hpj-7hhx-2fgx
- Warn: Project is vulnerable to: GHSA-qrpm-p2h7-hrv2
- Warn: Project is vulnerable to: GHSA-r683-j2x4-v87g
- Warn: Project is vulnerable to: GHSA-5rrq-pxf6-6jx5
- Warn: Project is vulnerable to: GHSA-8fr3-hfg3-gpgp
- Warn: Project is vulnerable to: GHSA-gf8q-jrpm-jvxq
- Warn: Project is vulnerable to: GHSA-2r2c-g63r-vccr
- Warn: Project is vulnerable to: GHSA-cfm4-qjh2-4765
- Warn: Project is vulnerable to: GHSA-x4jg-mjrx-434g
- Warn: Project is vulnerable to: GHSA-rp65-9cf3-cjxr
- Warn: Project is vulnerable to: GHSA-3j8f-xvm3-ffx4
- Warn: Project is vulnerable to: GHSA-4p35-cfcx-8653
- Warn: Project is vulnerable to: GHSA-7f3x-x4pr-wqhj
- Warn: Project is vulnerable to: GHSA-jpp7-7chh-cf67
- Warn: Project is vulnerable to: GHSA-q6wq-5p59-983w
- Warn: Project is vulnerable to: GHSA-j9fq-vwqv-2fm2
- Warn: Project is vulnerable to: GHSA-pqw5-jmp5-px4v
- Warn: Project is vulnerable to: GHSA-9wv6-86v2-598j
- Warn: Project is vulnerable to: GHSA-566m-qj78-rww5
- Warn: Project is vulnerable to: GHSA-7fh5-64p2-3v2j
- Warn: Project is vulnerable to: GHSA-hwj9-h5mp-3pm3
- Warn: Project is vulnerable to: GHSA-hrpp-h998-j3pp
- Warn: Project is vulnerable to: GHSA-p8p7-x288-28g6
- Warn: Project is vulnerable to: GHSA-c2qf-rxjj-qqgw
- Warn: Project is vulnerable to: GHSA-m6fv-jmcg-4jfg
- Warn: Project is vulnerable to: GHSA-cm22-4g7w-348p
- Warn: Project is vulnerable to: GHSA-mxhp-79qh-mcx6
- Warn: Project is vulnerable to: GHSA-f5x3-32g6-xq36
- Warn: Project is vulnerable to: GHSA-4wf5-vphf-c2xc
- Warn: Project is vulnerable to: GHSA-72xf-g2v4-qvf3
- Warn: Project is vulnerable to: GHSA-v4rh-8p82-6h5w
- Warn: Project is vulnerable to: GHSA-j8xg-fqg3-53r7
- Warn: Project is vulnerable to: GHSA-3h5v-q93c-6h6q
- Warn: Project is vulnerable to: GHSA-p9pc-299p-vxgp
- Warn: Project is vulnerable to: GHSA-hxwm-x553-x359
- Warn: Project is vulnerable to: GHSA-v88g-cgmw-v5xw
- Warn: Project is vulnerable to: GHSA-whgm-jr23-g3j9
- Warn: Project is vulnerable to: GHSA-fwr7-v2mv-hh25
- Warn: Project is vulnerable to: GHSA-w8qv-6jwh-64r5
- Warn: Project is vulnerable to: GHSA-gxpj-cx7g-858c
- Warn: Project is vulnerable to: GHSA-6h5x-7c5m-7cr7
- Warn: Project is vulnerable to: GHSA-8mmm-9v2q-x3f9
- Warn: Project is vulnerable to: GHSA-33f9-j839-rf8h
- Warn: Project is vulnerable to: GHSA-c36v-fmgq-m8hx
- Warn: Project is vulnerable to: GHSA-4wx3-54gh-9fr9
- Warn: Project is vulnerable to: GHSA-3949-f494-cm99
- Warn: Project is vulnerable to: GHSA-g4rg-993r-mgx7
- Warn: Project is vulnerable to: GHSA-4rq4-32rv-6wp6
- Warn: Project is vulnerable to: GHSA-64g7-mvw6-v9qj
- Warn: Project is vulnerable to: GHSA-3jfq-g458-7qm9
- Warn: Project is vulnerable to: GHSA-r628-mhmh-qjhw
- Warn: Project is vulnerable to: GHSA-9r2w-394v-53qc
- Warn: Project is vulnerable to: GHSA-5955-9wpr-37jh
- Warn: Project is vulnerable to: GHSA-qq89-hq3f-393p
- Warn: Project is vulnerable to: GHSA-7p7h-4mm5-852v
- Warn: Project is vulnerable to: GHSA-38fc-wpqx-33j7
- Warn: Project is vulnerable to: GHSA-rqff-837h-mm52
- Warn: Project is vulnerable to: GHSA-8v38-pw62-9cw2
- Warn: Project is vulnerable to: GHSA-hgjh-723h-mx2j
- Warn: Project is vulnerable to: GHSA-jf5r-8hm2-f872
- Warn: Project is vulnerable to: GHSA-wr3j-pwj9-hqq6
Score
5.3
/10
Last Scanned on 2024-11-25
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn MoreOther packages similar to yarn-audit-fix
npm-audit-resolver
Aids humans and automation in managing npm audit results
improved-yarn-audit
A wrapper around yarn audit that fixes many issues
lerna-audit
Micro util to run npm audit for lerna packages (with autofix)
audit-ci
Audits NPM, Yarn, and PNPM projects in CI environments