mirror of
https://github.com/github/awesome-copilot.git
synced 2026-04-11 02:35:55 +00:00
* feat: add security-review skill for AI-powered codebase vulnerability scanning * chore: regenerate README tables * fix: address Copilot review comments on reference files
3.9 KiB
3.9 KiB
Vulnerable & High-Risk Package Watchlist
Load this during Step 2 (Dependency Audit). Check versions in the project's lock files.
npm / Node.js
| Package | Vulnerable Versions | Issue | Safe Version |
|---|---|---|---|
| lodash | < 4.17.21 | Prototype pollution (CVE-2021-23337) | >= 4.17.21 |
| axios | < 1.6.0 | SSRF, open redirect | >= 1.6.0 |
| jsonwebtoken | < 9.0.0 | Algorithm confusion bypass | >= 9.0.0 |
| node-jose | < 2.2.0 | Key confusion | >= 2.2.0 |
| shelljs | < 0.8.5 | ReDoS | >= 0.8.5 |
| tar | < 6.1.9 | Path traversal | >= 6.1.9 |
| minimist | < 1.2.6 | Prototype pollution | >= 1.2.6 |
| qs | < 6.7.3 | Prototype pollution | >= 6.7.3 |
| express | < 4.19.2 | Open redirect | >= 4.19.2 |
| multer | < 1.4.4 | DoS | >= 1.4.4-lts.1 |
| xml2js | < 0.5.0 | Prototype pollution | >= 0.5.0 |
| fast-xml-parser | < 4.2.4 | ReDoS | >= 4.2.4 |
| semver | < 7.5.2 | ReDoS | >= 7.5.2 |
| tough-cookie | < 4.1.3 | Prototype pollution | >= 4.1.3 |
| word-wrap | < 1.2.4 | ReDoS | >= 1.2.4 |
| vm2 | ANY | Sandbox escape (deprecated) | Use isolated-vm instead |
| serialize-javascript | < 3.1.0 | XSS | >= 3.1.0 |
| node-fetch | < 2.6.7 | Open redirect | >= 2.6.7 or 3.x |
Patterns to flag (regardless of version):
evalorvm.runInContextin dependencies- Any package pulling in
node-gypnative addons from unknown publishers - Packages with < 1000 weekly downloads but required in production code (supply chain risk)
Python / pip
| Package | Vulnerable Versions | Issue | Safe Version |
|---|---|---|---|
| Pillow | < 10.0.1 | Multiple CVEs, buffer overflow | >= 10.0.1 |
| cryptography | < 41.0.0 | OpenSSL vulnerabilities | >= 41.0.0 |
| PyYAML | < 6.0 | Arbitrary code via yaml.load() | >= 6.0 |
| paramiko | < 3.4.0 | Authentication bypass | >= 3.4.0 |
| requests | < 2.31.0 | Proxy auth info leak | >= 2.31.0 |
| urllib3 | < 2.0.7 | Header injection | >= 2.0.7 |
| Django | < 4.2.16 | Various | >= 4.2.16 |
| Flask | < 3.0.3 | Various | >= 3.0.3 |
| Jinja2 | < 3.1.4 | HTML attribute injection | >= 3.1.4 |
| sqlalchemy | < 2.0.28 | Various | >= 2.0.28 |
| aiohttp | < 3.9.4 | SSRF, path traversal | >= 3.9.4 |
| werkzeug | < 3.0.3 | Various | >= 3.0.3 |
Java / Maven
| Package | Vulnerable Versions | Issue |
|---|---|---|
| log4j-core | 2.0-2.14.1 | Log4Shell RCE (CVE-2021-44228) — CRITICAL |
| log4j-core | 2.15.0 | Incomplete fix — still vulnerable |
| Spring Framework | < 5.3.28, < 6.0.13 | Various CVEs |
| Spring Boot | < 3.1.4 | Various |
| Jackson-databind | < 2.14.0 | Deserialization |
| Apache Commons Text | < 1.10.0 | Text4Shell RCE (CVE-2022-42889) |
| Apache Struts | < 6.3.0 | Various RCE |
| Netty | < 4.1.94 | HTTP request smuggling |
Ruby / Gems
| Gem | Vulnerable Versions | Issue |
|---|---|---|
| rails | < 7.1.3 | Various |
| nokogiri | < 1.16.2 | XXE, various |
| rexml | < 3.2.7 | ReDoS |
| rack | < 3.0.9 | Various |
| devise | < 4.9.3 | Various |
Rust / Cargo
| Crate | Issue |
|---|---|
| openssl | Check advisory db for current version |
| hyper | Check advisory db for current version |
Reference: https://rustsec.org/advisories/
Go
Reference: https://pkg.go.dev/vuln/ and https://vuln.go.dev
Common risky patterns:
golang.org/x/crypto— check if version is within 6 months of current- Any dependency using
syscallpackage directly — review carefully
General Red Flags (Any Ecosystem)
Flag any dependency that:
- Has not been updated in > 2 years AND has > 10 open security issues
- Has been deprecated by its maintainer with a security advisory
- Is a fork of a known package from an unknown publisher (typosquatting)
- Has a name that's one character off from a popular package (e.g.,
lodashvs1odash) - Was recently transferred to a new owner (check git history / npm transfer notices)