Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Updating to svgo ^1.0.3 and synchronizing promise #35

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

Trainbird
Copy link

@Trainbird Trainbird commented Dec 12, 2017

This is a fully working update to svgo@^1.0.3, closing #34 on the way.

Closes #34. Closes #44. Closes #45.

@michaeljonathanblack
Copy link

Why was this never verified or merged?

@@ -46,7 +46,8 @@
"babel-traverse": "^6.26.0",
"babylon": "^6.18.0",
"lodash.isplainobject": "^4.0.6",
"promise-synchronizer": "^1.0.6",
Copy link
Collaborator

@ljharb ljharb Jun 22, 2018

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this is not a package i'm interested in using; making async things sync is a very dangerous choice to make in JS.

@ljharb
Copy link
Collaborator

ljharb commented Jun 22, 2018

@Trainbird can this PR be updated to update svgo alone?

@Trainbird
Copy link
Author

Maybe Babel 7 solves the issue ... this PR in its original idea (synchronizing Promises with a 3rd party plugin) is (understandably) not compliant with package policy.

@mengqing
Copy link

Any chance that this PR gets merged or simply just update svgo alone?

The severity of the npm audit on js-yaml -> svgo is now updated to "High - Code Injection" from the "Moderate - Denial of Service"

@CarlosOlave
Copy link

any updates on this PR?

Screen Shot 2019-09-12 at 10 10 21 AM

ya'll

@ljharb
Copy link
Collaborator

ljharb commented Sep 12, 2019

@CarlosOlave it actually is zero severity since it’s a false positive for our use of svgo.

@darakian
Copy link

darakian commented Oct 4, 2019

Any update on this PR? I'd much rather not bundle known exploits.

@ljharb
Copy link
Collaborator

ljharb commented Oct 8, 2019

@darakian this is a babel transform, so it shouldn't be bundled in any case, nor is there any known exploit that actually applies to this package.

@darakian
Copy link

darakian commented Oct 9, 2019

@ljharb Is there some public analysis that I can read which supports that conclusion?

@ljharb
Copy link
Collaborator

ljharb commented Oct 9, 2019

The CVE itself. The attack vector here would have to be, you’re transpiling your own malicious svgs. When the solution is “don’t attack yourself”, it shouldn’t take much convincing that there’s no actual vulnerability.

@darakian
Copy link

darakian commented Oct 9, 2019

That does assume that all inputs are known to be good though. In my case that's fine, but as a general stance I don't think that's good.

@ljharb
Copy link
Collaborator

ljharb commented Oct 9, 2019

All inputs to any Babel transform are known to be good, or else it wouldn’t be safe to transform them.

To reiterate, I’d prefer to upgrade, but Babel transforms are sync and the latest version of svgo is async.

@mverissimo
Copy link

Any update about this PR?

@ljharb
Copy link
Collaborator

ljharb commented Sep 1, 2020

There won’t be any updates until svg/svgo#1015 is addressed.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Upgrade to latest version of svgo Global styles from inlined svg conflicting
7 participants