Skip to content

Bump firebase from 12.12.1 to 12.13.0

0d238d6
Select commit
Loading
Failed to load commit list.
Merged

Bump firebase from 12.12.1 to 12.13.0 #735

Bump firebase from 12.12.1 to 12.13.0
0d238d6
Select commit
Loading
Failed to load commit list.
Socket Security / Socket Security: Pull Request Alerts failed May 7, 2026 in 2m 14s

Pull Request #735 Alerts: Complete with warnings

Report Status Message
PR #735 Alerts ⚠️ Found 10 project alerts

Pull request alerts notify when new issues are detected between the diff of the pull request and it's target branch.

Details

Caution

Review the following alerts detected in dependencies.

According to your organization's Security Policy, you must resolve all "Block" alerts before proceeding. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Block Low
Embedded URLs or IPs: npm @firebase/ai

URLs: firebasevertexai.googleapis.com, https://staging-firebasevertexai.sandbox.googleapis.com, https://spec.openapis.org/oas/v3.0.3, https://json-schema.org/, https://firebase.google.com/docs/vertex-ai/models, https://firebase.google.com/docs/ai-logic/imagen-models-migration, https://cloud.google.com/terms/service-terms, https://ai.google.dev/gemini-api/terms#grounding-with-google-search, https://ai.google.dev/gemini-api/terms#grounding-with-google-maps, http://firebase.google.com/docs/vertex-ai/generate-images, http://firebase.google.com/docs/vertex-ai/generate-images-imagen, http://firebase.google.com/docs/vertex-ai/model-parameters#imagen, https://cloud.google.com/vertex-ai/generative-ai/docs/image/responsible-ai-imagen, http://www.apache.org/licenses/LICENSE-2.0, https://cloud.google.com/vertex-ai/generative-ai/docs/image/responsible-ai-imagen#person-face-gen, https://cloud.google.com/vertex-ai/generative-ai/docs/image/responsible-ai-imagen#safety-filters, https://cloud.google.com/text-to-speech/docs/chirp3-hd, https://firebasevertexai.googleapis.com,, https://console.cloud.google.com/apis/library/firebasevertexai.googleapis.com?project=_, https://swagger.io/docs/specification/v3_0/data-models/data-types/#any-type, https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/JSON/stringify#tojson_behavior, https://developer.mozilla.org/en-US/docs/Web/API/Web_components/Using_shadow_DOM, https://console.firebase.google.com/project/, https://github.com/firebase/firebase-js-sdk/issues/8566, https://github.com/firebase/firebase-js-sdk/issues., https://ai.google.dev/api/rest/v1beta/Content#part, https://developer.mozilla.org/en-US/docs/Web/API/AudioWorkletProcessor, https://developer.mozilla.org/en-US/docs/Web/API/Web_Audio_API/Best_practices#autoplay_policy, https://developer.mozilla.org/en-US/docs/Web/API/MediaDevices/getUserMedia#exceptions, https://developer.mozilla.org/en-US/docs/Web/API/AudioWorklet

Location: Package overview

From: ?npm/firebase@12.13.0npm/@firebase/ai@2.12.0

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@firebase/ai@2.12.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Embedded URLs or IPs: npm @firebase/analytics

URLs: https://firebase.googleapis.com/v1alpha/projects/-/apps/, https://www.googletagmanager.com/gtag/js, http://www.apache.org/licenses/LICENSE-2.0, https://firebase.google.com/docs/analytics/screenviews, https://developers.google.com/analytics/devguides/collection/ga4/reference/config#client_id, https://developers.google.com/gtagjs/reference/ga4-events, https://developers.google.com/analytics/devguides/collection/ga4/exceptions, https://developers.google.com/analytics/devguides/collection/ga4/views, https://firebase.google.com/docs/web/setup#config-object, https://developers.google.com/analytics/devguides/collection/ga4/cookies-user-id, https://developers.google.com/analytics/devguides/collection/ga4/display-features, https://developers.google.com/tag-platform/tag-manager/templates/consent-apis

Location: Package overview

From: ?npm/firebase@12.13.0npm/@firebase/analytics@0.10.22

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@firebase/analytics@0.10.22. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Embedded URLs or IPs: npm @firebase/app

URLs: http://www.apache.org/licenses/LICENSE-2.0, https://firebase.google.com/docs/web/setup#add_firebase_to_your_app, https://firebase.google.com/docs/web/setup#multiple-projects, https://console.firebase.google.com, https://YOUR_APP.firebaseio.com, YOUR_APP.firebaseapp.com, YOUR_APP.appspot.com, firebaseio.com, appspot.com, https://firebase.google.com/docs/web/setup#config-object

Location: Package overview

From: ?npm/firebase@12.13.0npm/@firebase/app@0.14.12

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@firebase/app@0.14.12. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Embedded URLs or IPs: npm @firebase/auth-compat

URLs: cloudworkstations.dev, facebook.com, github.com, google.com, twitter.com, firebaseapp.com, apple.com, identitytoolkit.googleapis.com, staging-identitytoolkit.sandbox.googleapis.com, test-identitytoolkit.sandbox.googleapis.com, https://apis.google.com/js/api.js, https://www.google.com/recaptcha/api.js, https://www.google.com/recaptcha/enterprise.js?render=, securetoken.googleapis.com, http://www.apache.org/licenses/LICENSE-2.0

Location: Package overview

From: ?npm/firebase@12.13.0npm/@firebase/auth-compat@0.6.6

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@firebase/auth-compat@0.6.6. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Embedded URLs or IPs: npm @firebase/auth

URLs: example.page.link, firebaseapp.com, example.firebaseapp.com, https://firebase.google.com/docs/auth/web/phone-auth#test-with-whitelisted-phone-numbers, http://127.0.0.1:9099, 127.0.0.1, facebook.com, https://cloud.google.com/identity-platform/docs/admin/email-enumeration-protection, https://firebase.google.com/docs/auth/web/redirect-best-practices, google.com, twitter.com, github.com, https://developers.google.com/recaptcha/docs/display#render_param, https://www.google.com/recaptcha/, https://www.example.com/?email=user@example.com, example.com, securetoken.googleapis.com, identitytoolkit.googleapis.com, http://www.apache.org/licenses/LICENSE-2.0, test.com, https://github.com/firebase/firebase-js-sdk/blob/4fbc73610d70be4e0852e7de63a39cb7897e8546/packages/auth/src/core/auth/auth_impl.ts#L309-L316, apple.com, https://github.com/Microsoft/TypeScript-wiki/blob/master/Breaking-Changes.md#extending-built-ins-like-error-array-and-map-may-no-longer-work, https://firebase.google.com/docs/reference/admin/node/admin.auth.Auth#createcustomtoken, https://firebase.google.com/docs/auth/admin, https://issues.chromium.org/issues/40196122, https://firebaseopensource.com/projects/firebaseextended/reactfire/, https://github.com/firebase/firebase-js-sdk/issues/634, https://developer.mozilla.org/en-US/docs/Web/API/ServiceWorkerContainer/ready, https://github.com/cloudflare/next-on-pages/issues/487, https://github.com/nordnet/cordova-universal-links-plugin, https://www.npmjs.com/package/cordova-universal-links-plugin-fix, https://www.npmjs.com/package/cordova-plugin-buildinfo, https://github.com/google/cordova-plugin-browsertab, https://cordova.apache.org/docs/en/latest/reference/cordova-plugin-inappbrowser/, https://www.w3.org/TR/2013/WD-WebCryptoAPI-20130108/#cryptooperation-interface, https://github.com/EddyVerbruggen/Custom-URL-scheme, staging-identitytoolkit.sandbox.googleapis.com, test-identitytoolkit.sandbox.googleapis.com, https://apis.google.com/js/api.js, https://www.google.com/recaptcha/api.js, https://www.google.com/recaptcha/enterprise.js?render=, https://github.com/google/google-authenticator/wiki/Key-Uri-Format

Location: Package overview

From: ?npm/firebase@12.13.0npm/@firebase/auth@1.13.1

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@firebase/auth@1.13.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Embedded URLs or IPs: npm @firebase/data-connect

URLs: http://www.apache.org/licenses/LICENSE-2.0, firebasedataconnect.googleapis.com, 127.0.0.1

Location: Package overview

From: ?npm/firebase@12.13.0npm/@firebase/data-connect@0.7.0

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@firebase/data-connect@0.7.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Embedded URLs or IPs: npm @firebase/database

URLs: http://javascript.nwbox.com/IEContentLoaded/, http://hg.secondlife.com/llsd/src/tip/js/typedarray.js, http://www.apache.org/licenses/LICENSE-2.0, https://app.asana.com/0/search/8688598998380/8237608042508, https://app.asana.com/0/58926111402292/68021340250410, firebase.com, firebaseio.com, https://firebase.google.com/docs/database/web/offline-capabilities, -default-rtdb.firebaseio.com, https://firebase.google.com/docs/database/web/read-and-write, firebaseio.com/users/ada, https://firebase.google.com/docs/database/web/lists-of-data#filtering_data, https://firebase.google.com/docs/database/web/retrieve-data, https://firebase.google.com/docs/database/security/indexing-data, https://firebase.google.com/docs/database/web/lists-of-data#sort_data, https://firebase.google.com/docs/database/web/lists-of-data#append_to_a_list_of_data, https://firebase.googleblog.com/2015/02/the-2120-ways-to-ensure-unique_68.html, https://firebase.google.com/docs/database/web/lists-of-data#sorting_and_filtering_data

Location: Package overview

From: ?npm/firebase@12.13.0npm/@firebase/database@1.1.3

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@firebase/database@1.1.3. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Embedded URLs or IPs: npm @firebase/firestore

URLs: https://github.com/firebase/firebase-js-sdk/issues/1674., https://firebase.google.com/docs/web/setup#config-object, http://www.apache.org/licenses/LICENSE-2.0, google.com, facebook.com, github.com, twitter.com, microsoft.com, apple.com, https://developers.google.com/protocol-buffers/docs/proto3#json, https://github.com/google/re2/wiki/Syntax, https://firebase.google.com/docs/reference/firestore/indexes/#json_format, example_option.foo, firestore.googleapis.com, https://github.com/axemclion/IndexedDBShim, https://github.com/grpc/grpc/blob/bceec94ea4fc5f0085d81235d8e1c06798dc341a/include/grpc%2B%2B/impl/codegen/status_code_enum.h, https://github.com/google/protobuf/blob/master/src/google/protobuf/timestamp.proto, https://developer.microsoft.com/en-us/microsoft-edge/platform/status/indexeddbarraysandmultientrysupport/, https://bugs.webkit.org/show_bug.cgi?id=197050,, https://stackoverflow.com/q/56496296/110915, https://developer.mozilla.org/en-US/docs/Web/API/IndexedDB_API/Using_IndexedDB, https://developer.mozilla.org/en-US/docs/Web/API/IDBVersionChangeRequest/setVersion, https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Object/is, https://developer.mozilla.org/en-US/docs/Web/JavaScript/Data_structures:, https://github.com/microsoft/TypeScript/issues/5451, https://cloud.google.com/apis/design/errors., https://bugs.webkit.org/show_bug.cgi?id=292721, https://en.wikipedia.org/wiki/Disjunctive_normal_form, https://en.wikipedia.org/wiki/Associative_property#Propositional_logic, https://github.com/indexeddbshim/IndexedDBShim/issues/334, https://bugs.chromium.org/p/chromium/issues/detail?id=701972, https://bugs.webkit.org/show_bug.cgi?id=226547, https://developer.mozilla.org/en-US/docs/Web/JavaScript/Guide/Regular_Expressions, https://github.com/firebase/firebase-js-sdk/issues/7115, https://goo.gle/454yvug., https://github.com/googleapis/googleapis/blob/master/google/rpc/code.proto, https://github.com/firebase/firebase-js-sdk/blob/0131e1f/packages/util/src/errors.ts#L106, https://www.typescriptlang.org/docs/handbook/advanced-types.html#distributive-conditional-types, https://github.com/firebase/firebase-js-sdk/issues/6987., https://github.com/grpc/grpc/blob/master/doc/statuscodes.md, https://www.typescriptlang.org/docs/handbook/advanced-types.html#type-inference-in-conditional-types, https://stackoverflow.com/questions/50374908/transform-union-type-to-intersection-type, address.city

Location: Package overview

From: ?npm/firebase@12.13.0npm/@firebase/firestore@4.14.1

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@firebase/firestore@4.14.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Embedded URLs or IPs: npm @firebase/messaging

URLs: https://fcmregistrations.googleapis.com/v1, https://firebase.google.com/docs/reference/fcm/rest/v1/projects.messages#notification, https://firebase.google.com/docs/cloud-messaging/concept-options#collapsible_and_non-collapsible_messages, https://firebase.google.com/docs/cloud-messaging/js/client#configure_web_credentials_in_your_app, https://developers.google.com/web/fundamentals/push-notifications/web-push-protocol, https://firebase.google.com/docs/cloud-messaging/js/client#access_the_registration_token, http://www.apache.org/licenses/LICENSE-2.0, https://developer.mozilla.org/en-US/docs/Web/API/notification/maxActions, https://github.com/firebase/firebase-js-sdk/issues/2590

Location: Package overview

From: ?npm/firebase@12.13.0npm/@firebase/messaging@0.12.26

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@firebase/messaging@0.12.26. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Embedded URLs or IPs: npm @firebase/storage

URLs: firebasestorage.googleapis.com, http://www.apache.org/licenses/LICENSE-2.0, https://cloud.google.com/storage/docs/configuring-cors, https://firebase.google.com/docs/web/environments-js-sdk#polyfills, https://cloud.google.com/storage/docs/metadata#generation-number

Location: Package overview

From: ?npm/firebase@12.13.0npm/@firebase/storage@0.14.3

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@firebase/storage@0.14.3. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report