| Block |
 |
Embedded URLs or IPs: npm @firebase/ai
URLs: firebasevertexai.googleapis.com, https://staging-firebasevertexai.sandbox.googleapis.com, https://spec.openapis.org/oas/v3.0.3, https://json-schema.org/, https://firebase.google.com/docs/vertex-ai/models, https://firebase.google.com/docs/ai-logic/imagen-models-migration, https://cloud.google.com/terms/service-terms, https://ai.google.dev/gemini-api/terms#grounding-with-google-search, https://ai.google.dev/gemini-api/terms#grounding-with-google-maps, http://firebase.google.com/docs/vertex-ai/generate-images, http://firebase.google.com/docs/vertex-ai/generate-images-imagen, http://firebase.google.com/docs/vertex-ai/model-parameters#imagen, https://cloud.google.com/vertex-ai/generative-ai/docs/image/responsible-ai-imagen, http://www.apache.org/licenses/LICENSE-2.0, https://cloud.google.com/vertex-ai/generative-ai/docs/image/responsible-ai-imagen#person-face-gen, https://cloud.google.com/vertex-ai/generative-ai/docs/image/responsible-ai-imagen#safety-filters, https://cloud.google.com/text-to-speech/docs/chirp3-hd, https://firebasevertexai.googleapis.com,, https://console.cloud.google.com/apis/library/firebasevertexai.googleapis.com?project=_, https://swagger.io/docs/specification/v3_0/data-models/data-types/#any-type, https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/JSON/stringify#tojson_behavior, https://developer.mozilla.org/en-US/docs/Web/API/Web_components/Using_shadow_DOM, https://console.firebase.google.com/project/, https://github.com/firebase/firebase-js-sdk/issues/8566, https://github.com/firebase/firebase-js-sdk/issues., https://ai.google.dev/api/rest/v1beta/Content#part, https://developer.mozilla.org/en-US/docs/Web/API/AudioWorkletProcessor, https://developer.mozilla.org/en-US/docs/Web/API/Web_Audio_API/Best_practices#autoplay_policy, https://developer.mozilla.org/en-US/docs/Web/API/MediaDevices/getUserMedia#exceptions, https://developer.mozilla.org/en-US/docs/Web/API/AudioWorklet
Location: Package overview
From: ? → npm/firebase@12.13.0 → npm/@firebase/ai@2.12.0
ℹ Read more on: This package | This alert | What are URL strings?
Next steps: Take a moment to review the security alert above. Review
the linked package source code to understand the potential risk. Ensure the
package is not malicious before proceeding. If you're unsure how to proceed,
reach out to your security team or ask the Socket team for help at
support@socket.dev.
Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@firebase/ai@2.12.0. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
Embedded URLs or IPs: npm @firebase/analytics
URLs: https://firebase.googleapis.com/v1alpha/projects/-/apps/, https://www.googletagmanager.com/gtag/js, http://www.apache.org/licenses/LICENSE-2.0, https://firebase.google.com/docs/analytics/screenviews, https://developers.google.com/analytics/devguides/collection/ga4/reference/config#client_id, https://developers.google.com/gtagjs/reference/ga4-events, https://developers.google.com/analytics/devguides/collection/ga4/exceptions, https://developers.google.com/analytics/devguides/collection/ga4/views, https://firebase.google.com/docs/web/setup#config-object, https://developers.google.com/analytics/devguides/collection/ga4/cookies-user-id, https://developers.google.com/analytics/devguides/collection/ga4/display-features, https://developers.google.com/tag-platform/tag-manager/templates/consent-apis
Location: Package overview
From: ? → npm/firebase@12.13.0 → npm/@firebase/analytics@0.10.22
ℹ Read more on: This package | This alert | What are URL strings?
Next steps: Take a moment to review the security alert above. Review
the linked package source code to understand the potential risk. Ensure the
package is not malicious before proceeding. If you're unsure how to proceed,
reach out to your security team or ask the Socket team for help at
support@socket.dev.
Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@firebase/analytics@0.10.22. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
Embedded URLs or IPs: npm @firebase/app
URLs: http://www.apache.org/licenses/LICENSE-2.0, https://firebase.google.com/docs/web/setup#add_firebase_to_your_app, https://firebase.google.com/docs/web/setup#multiple-projects, https://console.firebase.google.com, https://YOUR_APP.firebaseio.com, YOUR_APP.firebaseapp.com, YOUR_APP.appspot.com, firebaseio.com, appspot.com, https://firebase.google.com/docs/web/setup#config-object
Location: Package overview
From: ? → npm/firebase@12.13.0 → npm/@firebase/app@0.14.12
ℹ Read more on: This package | This alert | What are URL strings?
Next steps: Take a moment to review the security alert above. Review
the linked package source code to understand the potential risk. Ensure the
package is not malicious before proceeding. If you're unsure how to proceed,
reach out to your security team or ask the Socket team for help at
support@socket.dev.
Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@firebase/app@0.14.12. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
Embedded URLs or IPs: npm @firebase/auth-compat
URLs: cloudworkstations.dev, facebook.com, github.com, google.com, twitter.com, firebaseapp.com, apple.com, identitytoolkit.googleapis.com, staging-identitytoolkit.sandbox.googleapis.com, test-identitytoolkit.sandbox.googleapis.com, https://apis.google.com/js/api.js, https://www.google.com/recaptcha/api.js, https://www.google.com/recaptcha/enterprise.js?render=, securetoken.googleapis.com, http://www.apache.org/licenses/LICENSE-2.0
Location: Package overview
From: ? → npm/firebase@12.13.0 → npm/@firebase/auth-compat@0.6.6
ℹ Read more on: This package | This alert | What are URL strings?
Next steps: Take a moment to review the security alert above. Review
the linked package source code to understand the potential risk. Ensure the
package is not malicious before proceeding. If you're unsure how to proceed,
reach out to your security team or ask the Socket team for help at
support@socket.dev.
Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@firebase/auth-compat@0.6.6. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
Embedded URLs or IPs: npm @firebase/auth
URLs: example.page.link, firebaseapp.com, example.firebaseapp.com, https://firebase.google.com/docs/auth/web/phone-auth#test-with-whitelisted-phone-numbers, http://127.0.0.1:9099, 127.0.0.1, facebook.com, https://cloud.google.com/identity-platform/docs/admin/email-enumeration-protection, https://firebase.google.com/docs/auth/web/redirect-best-practices, google.com, twitter.com, github.com, https://developers.google.com/recaptcha/docs/display#render_param, https://www.google.com/recaptcha/, https://www.example.com/?email=user@example.com, example.com, securetoken.googleapis.com, identitytoolkit.googleapis.com, http://www.apache.org/licenses/LICENSE-2.0, test.com, https://github.com/firebase/firebase-js-sdk/blob/4fbc73610d70be4e0852e7de63a39cb7897e8546/packages/auth/src/core/auth/auth_impl.ts#L309-L316, apple.com, https://github.com/Microsoft/TypeScript-wiki/blob/master/Breaking-Changes.md#extending-built-ins-like-error-array-and-map-may-no-longer-work, https://firebase.google.com/docs/reference/admin/node/admin.auth.Auth#createcustomtoken, https://firebase.google.com/docs/auth/admin, https://issues.chromium.org/issues/40196122, https://firebaseopensource.com/projects/firebaseextended/reactfire/, https://github.com/firebase/firebase-js-sdk/issues/634, https://developer.mozilla.org/en-US/docs/Web/API/ServiceWorkerContainer/ready, https://github.com/cloudflare/next-on-pages/issues/487, https://github.com/nordnet/cordova-universal-links-plugin, https://www.npmjs.com/package/cordova-universal-links-plugin-fix, https://www.npmjs.com/package/cordova-plugin-buildinfo, https://github.com/google/cordova-plugin-browsertab, https://cordova.apache.org/docs/en/latest/reference/cordova-plugin-inappbrowser/, https://www.w3.org/TR/2013/WD-WebCryptoAPI-20130108/#cryptooperation-interface, https://github.com/EddyVerbruggen/Custom-URL-scheme, staging-identitytoolkit.sandbox.googleapis.com, test-identitytoolkit.sandbox.googleapis.com, https://apis.google.com/js/api.js, https://www.google.com/recaptcha/api.js, https://www.google.com/recaptcha/enterprise.js?render=, https://github.com/google/google-authenticator/wiki/Key-Uri-Format
Location: Package overview
From: ? → npm/firebase@12.13.0 → npm/@firebase/auth@1.13.1
ℹ Read more on: This package | This alert | What are URL strings?
Next steps: Take a moment to review the security alert above. Review
the linked package source code to understand the potential risk. Ensure the
package is not malicious before proceeding. If you're unsure how to proceed,
reach out to your security team or ask the Socket team for help at
support@socket.dev.
Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@firebase/auth@1.13.1. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
Embedded URLs or IPs: npm @firebase/data-connect
URLs: http://www.apache.org/licenses/LICENSE-2.0, firebasedataconnect.googleapis.com, 127.0.0.1
Location: Package overview
From: ? → npm/firebase@12.13.0 → npm/@firebase/data-connect@0.7.0
ℹ Read more on: This package | This alert | What are URL strings?
Next steps: Take a moment to review the security alert above. Review
the linked package source code to understand the potential risk. Ensure the
package is not malicious before proceeding. If you're unsure how to proceed,
reach out to your security team or ask the Socket team for help at
support@socket.dev.
Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@firebase/data-connect@0.7.0. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
Embedded URLs or IPs: npm @firebase/database
URLs: http://javascript.nwbox.com/IEContentLoaded/, http://hg.secondlife.com/llsd/src/tip/js/typedarray.js, http://www.apache.org/licenses/LICENSE-2.0, https://app.asana.com/0/search/8688598998380/8237608042508, https://app.asana.com/0/58926111402292/68021340250410, firebase.com, firebaseio.com, https://firebase.google.com/docs/database/web/offline-capabilities, -default-rtdb.firebaseio.com, https://firebase.google.com/docs/database/web/read-and-write, firebaseio.com/users/ada, https://firebase.google.com/docs/database/web/lists-of-data#filtering_data, https://firebase.google.com/docs/database/web/retrieve-data, https://firebase.google.com/docs/database/security/indexing-data, https://firebase.google.com/docs/database/web/lists-of-data#sort_data, https://firebase.google.com/docs/database/web/lists-of-data#append_to_a_list_of_data, https://firebase.googleblog.com/2015/02/the-2120-ways-to-ensure-unique_68.html, https://firebase.google.com/docs/database/web/lists-of-data#sorting_and_filtering_data
Location: Package overview
From: ? → npm/firebase@12.13.0 → npm/@firebase/database@1.1.3
ℹ Read more on: This package | This alert | What are URL strings?
Next steps: Take a moment to review the security alert above. Review
the linked package source code to understand the potential risk. Ensure the
package is not malicious before proceeding. If you're unsure how to proceed,
reach out to your security team or ask the Socket team for help at
support@socket.dev.
Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@firebase/database@1.1.3. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
Embedded URLs or IPs: npm @firebase/firestore
URLs: https://github.com/firebase/firebase-js-sdk/issues/1674., https://firebase.google.com/docs/web/setup#config-object, http://www.apache.org/licenses/LICENSE-2.0, google.com, facebook.com, github.com, twitter.com, microsoft.com, apple.com, https://developers.google.com/protocol-buffers/docs/proto3#json, https://github.com/google/re2/wiki/Syntax, https://firebase.google.com/docs/reference/firestore/indexes/#json_format, example_option.foo, firestore.googleapis.com, https://github.com/axemclion/IndexedDBShim, https://github.com/grpc/grpc/blob/bceec94ea4fc5f0085d81235d8e1c06798dc341a/include/grpc%2B%2B/impl/codegen/status_code_enum.h, https://github.com/google/protobuf/blob/master/src/google/protobuf/timestamp.proto, https://developer.microsoft.com/en-us/microsoft-edge/platform/status/indexeddbarraysandmultientrysupport/, https://bugs.webkit.org/show_bug.cgi?id=197050,, https://stackoverflow.com/q/56496296/110915, https://developer.mozilla.org/en-US/docs/Web/API/IndexedDB_API/Using_IndexedDB, https://developer.mozilla.org/en-US/docs/Web/API/IDBVersionChangeRequest/setVersion, https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Object/is, https://developer.mozilla.org/en-US/docs/Web/JavaScript/Data_structures:, https://github.com/microsoft/TypeScript/issues/5451, https://cloud.google.com/apis/design/errors., https://bugs.webkit.org/show_bug.cgi?id=292721, https://en.wikipedia.org/wiki/Disjunctive_normal_form, https://en.wikipedia.org/wiki/Associative_property#Propositional_logic, https://github.com/indexeddbshim/IndexedDBShim/issues/334, https://bugs.chromium.org/p/chromium/issues/detail?id=701972, https://bugs.webkit.org/show_bug.cgi?id=226547, https://developer.mozilla.org/en-US/docs/Web/JavaScript/Guide/Regular_Expressions, https://github.com/firebase/firebase-js-sdk/issues/7115, https://goo.gle/454yvug., https://github.com/googleapis/googleapis/blob/master/google/rpc/code.proto, https://github.com/firebase/firebase-js-sdk/blob/0131e1f/packages/util/src/errors.ts#L106, https://www.typescriptlang.org/docs/handbook/advanced-types.html#distributive-conditional-types, https://github.com/firebase/firebase-js-sdk/issues/6987., https://github.com/grpc/grpc/blob/master/doc/statuscodes.md, https://www.typescriptlang.org/docs/handbook/advanced-types.html#type-inference-in-conditional-types, https://stackoverflow.com/questions/50374908/transform-union-type-to-intersection-type, address.city
Location: Package overview
From: ? → npm/firebase@12.13.0 → npm/@firebase/firestore@4.14.1
ℹ Read more on: This package | This alert | What are URL strings?
Next steps: Take a moment to review the security alert above. Review
the linked package source code to understand the potential risk. Ensure the
package is not malicious before proceeding. If you're unsure how to proceed,
reach out to your security team or ask the Socket team for help at
support@socket.dev.
Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@firebase/firestore@4.14.1. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
Embedded URLs or IPs: npm @firebase/messaging
URLs: https://fcmregistrations.googleapis.com/v1, https://firebase.google.com/docs/reference/fcm/rest/v1/projects.messages#notification, https://firebase.google.com/docs/cloud-messaging/concept-options#collapsible_and_non-collapsible_messages, https://firebase.google.com/docs/cloud-messaging/js/client#configure_web_credentials_in_your_app, https://developers.google.com/web/fundamentals/push-notifications/web-push-protocol, https://firebase.google.com/docs/cloud-messaging/js/client#access_the_registration_token, http://www.apache.org/licenses/LICENSE-2.0, https://developer.mozilla.org/en-US/docs/Web/API/notification/maxActions, https://github.com/firebase/firebase-js-sdk/issues/2590
Location: Package overview
From: ? → npm/firebase@12.13.0 → npm/@firebase/messaging@0.12.26
ℹ Read more on: This package | This alert | What are URL strings?
Next steps: Take a moment to review the security alert above. Review
the linked package source code to understand the potential risk. Ensure the
package is not malicious before proceeding. If you're unsure how to proceed,
reach out to your security team or ask the Socket team for help at
support@socket.dev.
Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@firebase/messaging@0.12.26. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|
| Block |
 |
Embedded URLs or IPs: npm @firebase/storage
URLs: firebasestorage.googleapis.com, http://www.apache.org/licenses/LICENSE-2.0, https://cloud.google.com/storage/docs/configuring-cors, https://firebase.google.com/docs/web/environments-js-sdk#polyfills, https://cloud.google.com/storage/docs/metadata#generation-number
Location: Package overview
From: ? → npm/firebase@12.13.0 → npm/@firebase/storage@0.14.3
ℹ Read more on: This package | This alert | What are URL strings?
Next steps: Take a moment to review the security alert above. Review
the linked package source code to understand the potential risk. Ensure the
package is not malicious before proceeding. If you're unsure how to proceed,
reach out to your security team or ask the Socket team for help at
support@socket.dev.
Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/@firebase/storage@0.14.3. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
|