Feature: Fix Dependabot Vulnerabilities#46
Feature: Fix Dependabot Vulnerabilities#46vivek0369 wants to merge 3 commits intoNexGenStudioDev:masterfrom
Conversation
There was a problem hiding this comment.
Code Review
This pull request introduces a Dependabot configuration for automated dependency updates and adds security audit scripts to package.json. It also removes several Tauri-related dependencies and adds package overrides for security vulnerabilities. Feedback was provided regarding the accidental removal of core Tauri dependencies and the shell plugin, which are likely necessary for the application to function. Additionally, the audit scripts should be updated to use pnpm instead of npm to ensure consistency with the project's package manager.
|
@vivek0369 fix issue that gemini Suggest |
Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>
Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>
|
@abhishek-nexgen-dev I have fixed all the issues. Please check and review the PR. |
|
@vivek0369 okay i will definitely review this pr once prev one is done |
Overview
This PR resolves all 13 active Dependabot security alerts in the repository and introduces a complete automated security infrastructure to prevent future regressions.
The implementation focuses on three major areas:
The vulnerabilities originated entirely from nested transitive dependencies inside development tooling and not from direct production dependencies.
Problem Analysis
The security alerts originated from transitive dependency chains inside:
shadcn@modelcontextprotocol/sdkfast-glob@babel/coremswAlthough these packages are development dependencies, they still introduce supply chain risks during build and CI/CD execution.
Vulnerabilities Fixed
< 10.1.110.2.0< 7.5.47.7.4< 3.0.33.0.3< 4.0.84.0.8All duplicate Dependabot alerts caused by nested dependency chains are fully resolved.
Solution Implemented
Dependency Overrides
Updated
package.jsonoverrides to force secure dependency resolution for all vulnerable transitive packages.This approach avoids breaking changes while ensuring secure dependency resolution.
Added Security Audit Scripts
Purpose
auditaudit:allLockfile Regeneration
Regenerated
package-lock.jsonafter applying secure overrides.Verified Versions
Added Dependabot Automation
.github/dependabot.ymlConfigured automated dependency updates for:
src-tauri)PR Grouping Strategy
tauri-pluginsreact-ecosystemdev-toolingThis reduces PR spam and keeps dependency management organized.
Added Security Workflow
.github/workflows/security-audit.ymlIntroduced a dedicated security pipeline running on:
npm Security Audit
npm audit --omit=dev --audit-level=highRust Security Audit
cargo auditThe workflow now blocks releases if high or critical vulnerabilities exist.
Release Pipeline Hardening
Updated:
Added mandatory audit verification before builds:
This prevents vulnerable builds from being published.
Audit Results
Before
After
All Dependabot alerts are resolved successfully.
What This PR Does NOT Change
Only dependency resolution and security infrastructure were improved.
Testing Performed
Dependency Validation
npm auditnpm audit --omit=devnpm audit:allBuild Validation
pnpm installpnpm tauri devpnpm tauri buildVerification
Type of Change
Labels
NSOC 26securitydependabotci/cddevopssupply-chain-securitynpmtaurigithub-actionsRelated Issue
Closes #18