deno/cli/args
Bartek Iwańczuk 0ed74e6c53
Some checks are pending
ci / build libs (push) Blocked by required conditions
ci / test release macos-aarch64 (push) Blocked by required conditions
ci / bench release linux-x86_64 (push) Blocked by required conditions
ci / lint debug linux-x86_64 (push) Blocked by required conditions
ci / lint debug macos-x86_64 (push) Blocked by required conditions
ci / lint debug windows-x86_64 (push) Blocked by required conditions
ci / test debug linux-x86_64 (push) Blocked by required conditions
ci / test release linux-x86_64 (push) Blocked by required conditions
ci / test debug macos-x86_64 (push) Blocked by required conditions
ci / test release macos-x86_64 (push) Blocked by required conditions
ci / test debug windows-x86_64 (push) Blocked by required conditions
ci / test release windows-x86_64 (push) Blocked by required conditions
ci / pre-build (push) Waiting to run
ci / test debug linux-aarch64 (push) Blocked by required conditions
ci / test release linux-aarch64 (push) Blocked by required conditions
ci / test debug macos-aarch64 (push) Blocked by required conditions
ci / publish canary (push) Blocked by required conditions
feat(unstable): add deno audit subcommand (#30966)
This commit adds a new `deno audit` subcommand that collects
all dependencies and queries npm registry for information about
known vulnerabilities of used npm packages.

```
$ ../deno/target/debug/deno audit
...
╭ Prototype Pollution Protection Bypass in qs
│ Severity:   high
│ Package:    qs
│ Vulnerable: <6.0.4
│ Patched:    >=6.0.4
│ Info:       https://github.com/advisories/GHSA-gqgv-6jq5-jjj9
╰ Actions:    install express@5.1.0 (major upgrade)

╭ qs vulnerable to Prototype Pollution
│ Severity:   high
│ Package:    qs
│ Vulnerable: <6.2.4
│ Patched:    >=6.2.4
│ Info:       https://github.com/advisories/GHSA-hrpp-h998-j3pp
╰ Actions:    install express@5.1.0 (major upgrade)

╭ send vulnerable to template injection that can lead to XSS
│ Severity:   low
│ Package:    send
│ Vulnerable: <0.19.0
│ Patched:    >=0.19.0
│ Info:       https://github.com/advisories/GHSA-m6fv-jmcg-4jfg
╰ Actions:    install express@5.1.0 (major upgrade)

╭ serve-static vulnerable to template injection that can lead to XSS
│ Severity:   low
│ Package:    serve-static
│ Vulnerable: <1.16.0
│ Patched:    >=1.16.0
│ Info:       https://github.com/advisories/GHSA-cm22-4g7w-348p
╰ Actions:    install express@5.1.0 (major upgrade)

Found 25 vulnerabilities
Severity: 8 low, 6 moderate, 9 high, 2 critical

```
2025-10-23 18:43:59 +02:00
..
flags.rs feat(unstable): add deno audit subcommand (#30966) 2025-10-23 18:43:59 +02:00
flags_net.rs feat: --allow-net supports CIDR ranges (#29704) 2025-06-26 22:13:04 +02:00
mod.rs fix(cli/args): empty permissions in config should not require -P (#31063) 2025-10-22 21:05:22 -04:00