-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Should be consistent with server command (skipAudit) #419
Comments
Audit is no longer a thing in the latest code, although those options are still in the commands. @davewasmer what's the goal here? |
I'm open to suggestions. Ideally, I want to make security a "default" thing as much as possible in Denali. The Node Security Project (nsp) is a good resource that catalogs CVE's for Node projects and offers tools to programmatically analyze your package.json for vulnerable packages. My gut says that this should be baked into Denali core, although I'm open to reasons why an addon might be better. If it's core, then one question is when to run the check - on every single build? On production builds only? On CI only? |
What about a |
Hm, yea, that could work. Here's a slight tweak, lemme know what you think:
I think this approach is a good blend of security by default, while allowing for escape valves for folks that don't want it, and easy ways to track down problems locally when detected. |
https://github.com/denali-js/denali/blob/82401b4517b94426c3d723981eafad6356fd39cf/commands/build.ts#L39
The text was updated successfully, but these errors were encountered: