| Block |
 |
@astrojs/internal-helpers@0.7.1 has Unstable ownership.
Author: matthewp
From: ? → npm/astro@5.12.8 → npm/@astrojs/internal-helpers@0.7.1
ℹ Read more on: This package | This alert | What is unstable ownership?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: Try to reduce the number of authors you depend on to reduce the risk to malicious actors gaining access to your supply chain. Packages should remove inactive collaborators with publishing rights from packages on npm.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@astrojs/internal-helpers@0.7.1. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
@vscode/l10n@0.0.18 has Network access.
Module: globalThis["fetch"]
Location: Package overview
From: ? → npm/@astrojs/check@0.9.4 → npm/@vscode/l10n@0.0.18
ℹ Read more on: This package | This alert | What is network access?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: Packages should remove all network access that is functionally unnecessary. Consumers should audit network access to ensure legitimate use.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@vscode/l10n@0.0.18. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
request-light@0.7.0 has Network access.
Module: globalThis["fetch"]
Location: Package overview
From: ? → npm/@astrojs/check@0.9.4 → npm/request-light@0.7.0
ℹ Read more on: This package | This alert | What is network access?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: Packages should remove all network access that is functionally unnecessary. Consumers should audit network access to ensure legitimate use.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/request-light@0.7.0. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
request-light@0.7.0 has Network access.
Module: http
Location: Package overview
From: ? → npm/@astrojs/check@0.9.4 → npm/request-light@0.7.0
ℹ Read more on: This package | This alert | What is network access?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: Packages should remove all network access that is functionally unnecessary. Consumers should audit network access to ensure legitimate use.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/request-light@0.7.0. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
request-light@0.7.0 has Network access.
Module: https
Location: Package overview
From: ? → npm/@astrojs/check@0.9.4 → npm/request-light@0.7.0
ℹ Read more on: This package | This alert | What is network access?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: Packages should remove all network access that is functionally unnecessary. Consumers should audit network access to ensure legitimate use.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/request-light@0.7.0. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
request-light@0.7.0 has Network access.
Module: net
Location: Package overview
From: ? → npm/@astrojs/check@0.9.4 → npm/request-light@0.7.0
ℹ Read more on: This package | This alert | What is network access?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: Packages should remove all network access that is functionally unnecessary. Consumers should audit network access to ensure legitimate use.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/request-light@0.7.0. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
request-light@0.7.0 has Network access.
Module: tls
Location: Package overview
From: ? → npm/@astrojs/check@0.9.4 → npm/request-light@0.7.0
ℹ Read more on: This package | This alert | What is network access?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: Packages should remove all network access that is functionally unnecessary. Consumers should audit network access to ensure legitimate use.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/request-light@0.7.0. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
unstorage@1.16.1 has Network access.
Module: globalThis["fetch"]
Location: Package overview
From: ? → npm/astro@5.12.8 → npm/unstorage@1.16.1
ℹ Read more on: This package | This alert | What is network access?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: Packages should remove all network access that is functionally unnecessary. Consumers should audit network access to ensure legitimate use.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/unstorage@1.16.1. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
vscode-jsonrpc@8.2.0 has Network access.
Module: net
Location: Package overview
From: ? → npm/@astrojs/check@0.9.4 → npm/vscode-jsonrpc@8.2.0
ℹ Read more on: This package | This alert | What is network access?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: Packages should remove all network access that is functionally unnecessary. Consumers should audit network access to ensure legitimate use.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/vscode-jsonrpc@8.2.0. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
vscode-languageserver@9.0.1 has Shell access.
Module: child_process
Location: Package overview
From: ? → npm/@astrojs/check@0.9.4 → npm/vscode-languageserver@9.0.1
ℹ Read more on: This package | This alert | What is shell access?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: Packages should avoid accessing the shell which can reduce portability, and make it easier for malicious shell access to be introduced.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/vscode-languageserver@9.0.1. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
@astrojs/language-server@2.15.4 has URL strings.
URLs: https://docs.astro.build/en/guides/typescript/#component-props, https://docs.astro.build/en/reference/api-reference/#getstaticpaths, https://docs.astro.build/en/guides/server-side-rendering/#enabling-ssr-in-your-project, https://docs.astro.build/en/guides/server-side-rendering/#configuring-individual-routes, https://docs.astro.build/en/reference/directives-reference/#classlist, https://docs.astro.build/en/core-concepts/astro-components/#slots, https://docs.astro.build/en/core-concepts/astro-components/#named-slots, https://docs.astro.build/en/reference/directives-reference/#definevars, https://docs.astro.build/en/core-concepts/astro-components/#using-hoisted-scripts, https://docs.astro.build/en/reference/directives-reference/#isinline, https://docs.astro.build/en/guides/view-transitions/#script-behavior, https://docs.astro.build/en/reference/directives-reference/#isglobal, https://docs.astro.build/en/reference/directives-reference/#sethtml, https://docs.astro.build/en/reference/directives-reference/#settext, https://docs.astro.build/en/reference/directives-reference/#israw, https://docs.astro.build/en/guides/view-transitions/#transition-directives, https://docs.astro.build/en/reference/directives-reference/#clientload, https://docs.astro.build/en/reference/directives-reference/#clientidle, https://docs.astro.build/en/reference/directives-reference/#clientvisible, https://docs.astro.build/en/reference/directives-reference/#clientmedia, https://docs.astro.build/en/reference/directives-reference/#clientonly
Location: Package overview
From: ? → npm/@astrojs/check@0.9.4 → npm/@astrojs/language-server@2.15.4
ℹ Read more on: This package | This alert | What are URL strings?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@astrojs/language-server@2.15.4. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
@astrojs/language-server@2.15.4 has a Dynamic require.
Location: Package overview
From: ? → npm/@astrojs/check@0.9.4 → npm/@astrojs/language-server@2.15.4
ℹ Read more on: This package | This alert | What is dynamic require?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: Packages should avoid dynamic imports when possible. Audit the use of dynamic require to ensure it is not executing malicious or vulnerable code.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@astrojs/language-server@2.15.4. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
@emmetio/css-parser@0.4.0 is Unmaintained.
Last Publish: 7/15/2017, 4:05:14 PM
From: ? → npm/@astrojs/check@0.9.4 → npm/@emmetio/css-parser@0.4.0
ℹ Read more on: This package | This alert | What are unmaintained packages?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: Package should publish periodic maintenance releases if they are maintained, or deprecate if they have no intention in further maintenance.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@emmetio/css-parser@0.4.0. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
@emmetio/html-matcher@1.3.0 is Unmaintained.
Last Publish: 5/27/2020, 3:50:49 PM
From: ? → npm/@astrojs/check@0.9.4 → npm/@emmetio/html-matcher@1.3.0
ℹ Read more on: This package | This alert | What are unmaintained packages?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: Package should publish periodic maintenance releases if they are maintained, or deprecate if they have no intention in further maintenance.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@emmetio/html-matcher@1.3.0. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
@emmetio/stream-reader-utils@0.1.0 is Unmaintained.
Last Publish: 3/22/2017, 10:56:28 PM
From: ? → npm/@astrojs/check@0.9.4 → npm/@emmetio/stream-reader-utils@0.1.0
ℹ Read more on: This package | This alert | What are unmaintained packages?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: Package should publish periodic maintenance releases if they are maintained, or deprecate if they have no intention in further maintenance.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@emmetio/stream-reader-utils@0.1.0. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
@emmetio/stream-reader@2.2.0 is Unmaintained.
Last Publish: 4/25/2017, 9:23:13 PM
From: ? → npm/@astrojs/check@0.9.4 → npm/@emmetio/stream-reader@2.2.0
ℹ Read more on: This package | This alert | What are unmaintained packages?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: Package should publish periodic maintenance releases if they are maintained, or deprecate if they have no intention in further maintenance.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@emmetio/stream-reader@2.2.0. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
@volar/kit@2.4.22 has Filesystem access.
Module: fs
Location: Package overview
From: ? → npm/@astrojs/check@0.9.4 → npm/@volar/kit@2.4.22
ℹ Read more on: This package | This alert | What is filesystem access?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: If a package must read the file system, clarify what it will read and ensure it reads only what it claims to. If appropriate, packages can leave file system access to consumers and operate on data passed to it instead.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@volar/kit@2.4.22. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
@vscode/emmet-helper@2.11.0 has a New author.
New Author: microsoft1es
Previous Author: vscode-bot
From: ? → npm/@astrojs/check@0.9.4 → npm/@vscode/emmet-helper@2.11.0
ℹ Read more on: This package | This alert | What is new author?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: Scrutinize new collaborator additions to packages because they now have the ability to publish code into your dependency tree. Packages should avoid frequent or unnecessary additions or changes to publishing rights.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@vscode/emmet-helper@2.11.0. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
@vscode/emmet-helper@2.11.0 has URL strings.
URLs: https://code.visualstudio.com/docs/editor/emmet#_emmet-configuration, https://code.visualstudio.com/docs/editor/emmet#_using-custom-emmet-snippets
Location: Package overview
From: ? → npm/@astrojs/check@0.9.4 → npm/@vscode/emmet-helper@2.11.0
ℹ Read more on: This package | This alert | What are URL strings?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@vscode/emmet-helper@2.11.0. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
@vscode/l10n@0.0.18 has Filesystem access.
Module: fs
Location: Package overview
From: ? → npm/@astrojs/check@0.9.4 → npm/@vscode/l10n@0.0.18
ℹ Read more on: This package | This alert | What is filesystem access?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: If a package must read the file system, clarify what it will read and ensure it reads only what it claims to. If appropriate, packages can leave file system access to consumers and operate on data passed to it instead.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@vscode/l10n@0.0.18. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
@vscode/l10n@0.0.18 has Filesystem access.
Module: fs/promises
Location: Package overview
From: ? → npm/@astrojs/check@0.9.4 → npm/@vscode/l10n@0.0.18
ℹ Read more on: This package | This alert | What is filesystem access?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: If a package must read the file system, clarify what it will read and ensure it reads only what it claims to. If appropriate, packages can leave file system access to consumers and operate on data passed to it instead.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@vscode/l10n@0.0.18. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
astro@5.12.8 has URL strings.
URLs: https://docs.netlify.com/configure-builds/manage-dependencies/#node-js-and-javascript, https://docs.github.com/en/actions/guides/building-and-testing-nodejs#specifying-the-nodejs-version, https://vercel.com/docs/runtimes#official-runtimes/node-js/node-js-version, https://docs.astro.build/, http://www.w3.org/2000/svg, https://docs.astro.build/en/guides/actions, https://docs.astro.build/en/guides/endpoints/#server-endpoints-api-routes, https://docs.astro.build/en/reference/cli-reference/#astro-dev, https://registry.npmjs.org, https://docs.astro.build/en/reference/cli-reference/#astro-preview, https://www.typescriptlang.org/tsconfig#allowJs, https://astro.build/telemetry, https://astro.build/issues, 127.0.0.1, https://github.com/rich-harris/devalue, https://astro.build/integrations, https://docs.astro.build/en/guides/deploy/, https://example.com, https://example.com/, https://docs.astro.build/en/core-concepts/routing/#dynamic-routes, https://astro.build/api/v1/dev-overlay/, https://github.com/withastro/astro/issues/new/choose, https://github.com/withastro/roadmap/discussions/new/choose, https://docs.astro.build, https://astro.build/chat
Location: Package overview
From: package.json → npm/astro@5.12.8
ℹ Read more on: This package | This alert | What are URL strings?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/astro@5.12.8. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
chokidar@3.6.0 has Filesystem access.
Module: fs
Location: Package overview
From: ? → npm/tailwindcss@3.4.17 → npm/chokidar@3.6.0
ℹ Read more on: This package | This alert | What is filesystem access?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: If a package must read the file system, clarify what it will read and ensure it reads only what it claims to. If appropriate, packages can leave file system access to consumers and operate on data passed to it instead.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/chokidar@3.6.0. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
chokidar@3.6.0 has Environment variable access.
Env Vars: CHOKIDAR_USEPOLLING
Location: Package overview
From: ? → npm/tailwindcss@3.4.17 → npm/chokidar@3.6.0
ℹ Read more on: This package | This alert | What is environment variable access?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: Packages should be clear about which environment variables they access, and care should be taken to ensure they only access environment variables they claim to.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/chokidar@3.6.0. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
chokidar@3.6.0 has Environment variable access.
Env Vars: CHOKIDAR_INTERVAL
Location: Package overview
From: ? → npm/tailwindcss@3.4.17 → npm/chokidar@3.6.0
ℹ Read more on: This package | This alert | What is environment variable access?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: Packages should be clear about which environment variables they access, and care should be taken to ensure they only access environment variables they claim to.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/chokidar@3.6.0. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
chokidar@3.6.0 has Filesystem access.
Module: fsevents
Location: Package overview
From: ? → npm/tailwindcss@3.4.17 → npm/chokidar@3.6.0
ℹ Read more on: This package | This alert | What is filesystem access?
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: If a package must read the file system, clarify what it will read and ensure it reads only what it claims to. If appropriate, packages can leave file system access to consumers and operate on data passed to it instead.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/chokidar@3.6.0. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
|
See 32 more rows in the dashboard
|