-
Notifications
You must be signed in to change notification settings - Fork 3.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[DevOps]: Node Security #1158
Comments
Leave it to you, brother. Definitely think Snyk should be a thing since they're the ones nice enough to talk to us. :) |
I also think we should add the policy to prevent merging PRs without having all the checks pass:
I can enable 2+ approvals through the github policy. |
+1 |
I'm okay with the 2+ approvals. If this can be done through the GitHub review process, please post a link of a how-to, if you have one handy. |
Visit "Setting" > "Branches" https://github.com/markedjs/marked/settings/branches Click "Edit" next to Then check the boxes for the policies Update: I accidentally enabled "Require branches to be up to date before merging" and I realize this is going to be painful for each PR so I disabled that option. Sorry about that 😛 |
I just enabled that, however I am unable to install Snyk. (note: node security is no longer accepting new repos) |
Added Snyk via the MarkedJSBot account. (Starting to think admin might be an owner...but still considering operations for that.)
|
@UziTech and @styfle: In theory, we don't need this but might good for us to have awareness of just in case for CI: https://snyk.io/docs/using-snyk?utm_campaign=welcome_email&utm_campaign=GitHub%20Onboarding&utm_medium=email&utm_medium=email&utm_source=DocsCommandLine&utm_source=hs_automation&utm_content=61782021&_hsenc=p2ANqtz-9XvrdTanuF8D9kJMUpg6eZIkB6GmW7zFpt02S424C2HJb403WhfIn0PI6e3FpaEN1HrnE1YE86p9-zAqqWsrCa21NpVQ&_hsmi=61782021 |
So it doesnt check every PR? |
If "it" in this context is Snyk, it should be every PR - but they have a CLI to extend it would seem. See #1229 |
It looks like npm@6.0.0 will have this security audit built in. See the blog post for details. |
should we add |
Currently the security check for RegEx fails due to some violations. |
@DanielRuf Some fixes and discussion in #1226. |
Marked version: 0.3.18
Markdown flavor: n/a
Proposal type: other
What pain point are you perceiving?
None. More of a curiosity.
What solution are you suggesting?
Was making the rounds to those projects who became dependent on
8fold-marked
to make sure they switched back to latest. Noticed this in their pipeline:Node security... @UziTech what is it, should we have it? (Believe there was a REGEX tool mentioned elsewhere at some point.)
The text was updated successfully, but these errors were encountered: