wikidata/query-builder: main (log #887436)

sourcepatches

This run took 109 seconds.

$ date
--- stdout ---
Thu Jan 19 13:37:23 UTC 2023

--- end ---
$ git clone file:///srv/git/wikidata-query-builder.git repo --depth=1 -b master
--- stderr ---
Cloning into 'repo'...
--- stdout ---

--- end ---
$ git config user.name libraryupgrader
--- stdout ---

--- end ---
$ git config user.email tools.libraryupgrader@tools.wmflabs.org
--- stdout ---

--- end ---
$ git submodule update --init
--- stdout ---

--- end ---
$ grr init
--- stdout ---
Installed commit-msg hook.

--- end ---
$ git show-ref refs/heads/master
--- stdout ---
c0dbe7ce9cd25ffbcdc2dafd2df2ba19e0633a73 refs/heads/master

--- end ---
$ /usr/bin/npm audit --json --legacy-peer-deps
--- stdout ---
{
  "auditReportVersion": 2,
  "vulnerabilities": {
    "@netlify/build": {
      "name": "@netlify/build",
      "severity": "high",
      "isDirect": false,
      "via": [
        "@netlify/cache-utils",
        "@netlify/functions-utils",
        "got",
        "update-notifier"
      ],
      "effects": [
        "netlify-cli"
      ],
      "range": ">=0.1.31",
      "nodes": [
        "node_modules/netlify-cli/node_modules/@netlify/build"
      ],
      "fixAvailable": true
    },
    "@netlify/cache-utils": {
      "name": "@netlify/cache-utils",
      "severity": "high",
      "isDirect": false,
      "via": [
        "cpy"
      ],
      "effects": [
        "@netlify/build"
      ],
      "range": "*",
      "nodes": [
        "node_modules/netlify-cli/node_modules/@netlify/cache-utils"
      ],
      "fixAvailable": true
    },
    "@netlify/functions-utils": {
      "name": "@netlify/functions-utils",
      "severity": "high",
      "isDirect": false,
      "via": [
        "cpy"
      ],
      "effects": [
        "@netlify/build"
      ],
      "range": "*",
      "nodes": [
        "node_modules/netlify-cli/node_modules/@netlify/functions-utils"
      ],
      "fixAvailable": true
    },
    "all-node-versions": {
      "name": "all-node-versions",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        "fetch-node-website"
      ],
      "effects": [
        "node-version-alias",
        "normalize-node-version"
      ],
      "range": "2.0.0 - 8.0.0",
      "nodes": [
        "node_modules/netlify-cli/node_modules/all-node-versions"
      ],
      "fixAvailable": true
    },
    "cpy": {
      "name": "cpy",
      "severity": "high",
      "isDirect": false,
      "via": [
        "globby"
      ],
      "effects": [
        "@netlify/cache-utils",
        "@netlify/functions-utils"
      ],
      "range": "7.0.0 - 8.1.2",
      "nodes": [
        "node_modules/netlify-cli/node_modules/cpy"
      ],
      "fixAvailable": true
    },
    "decode-uri-component": {
      "name": "decode-uri-component",
      "severity": "low",
      "isDirect": false,
      "via": [
        {
          "source": 1087979,
          "name": "decode-uri-component",
          "dependency": "decode-uri-component",
          "title": "decode-uri-component vulnerable to Denial of Service (DoS)",
          "url": "https://github.com/advisories/GHSA-w573-4hg7-7wgq",
          "severity": "low",
          "cwe": [
            "CWE-20"
          ],
          "cvss": {
            "score": 0,
            "vectorString": null
          },
          "range": "<0.2.1"
        }
      ],
      "effects": [],
      "range": "<0.2.1",
      "nodes": [
        "node_modules/netlify-cli/node_modules/decode-uri-component"
      ],
      "fixAvailable": true
    },
    "download": {
      "name": "download",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        "got"
      ],
      "effects": [
        "gh-release-fetch"
      ],
      "range": ">=4.0.0",
      "nodes": [
        "node_modules/netlify-cli/node_modules/download"
      ],
      "fixAvailable": true
    },
    "fast-glob": {
      "name": "fast-glob",
      "severity": "high",
      "isDirect": false,
      "via": [
        "glob-parent"
      ],
      "effects": [
        "globby"
      ],
      "range": "<=2.2.7",
      "nodes": [
        "node_modules/netlify-cli/node_modules/cpy/node_modules/fast-glob"
      ],
      "fixAvailable": true
    },
    "fetch-node-website": {
      "name": "fetch-node-website",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        "got"
      ],
      "effects": [
        "all-node-versions"
      ],
      "range": "2.0.0 - 5.0.3",
      "nodes": [
        "node_modules/netlify-cli/node_modules/fetch-node-website"
      ],
      "fixAvailable": true
    },
    "formidable": {
      "name": "formidable",
      "severity": "high",
      "isDirect": false,
      "via": [
        "qs"
      ],
      "effects": [],
      "range": "2.0.0-canary.20200129.2 - 2.0.1",
      "nodes": [
        "node_modules/netlify-cli/node_modules/formidable"
      ],
      "fixAvailable": true
    },
    "gh-release-fetch": {
      "name": "gh-release-fetch",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        "download"
      ],
      "effects": [
        "netlify-cli"
      ],
      "range": "*",
      "nodes": [
        "node_modules/netlify-cli/node_modules/gh-release-fetch"
      ],
      "fixAvailable": true
    },
    "glob-parent": {
      "name": "glob-parent",
      "severity": "high",
      "isDirect": false,
      "via": [
        {
          "source": 1088261,
          "name": "glob-parent",
          "dependency": "glob-parent",
          "title": "glob-parent before 5.1.2 vulnerable to Regular Expression Denial of Service in enclosure regex",
          "url": "https://github.com/advisories/GHSA-ww39-953v-wcq6",
          "severity": "high",
          "cwe": [
            "CWE-400"
          ],
          "cvss": {
            "score": 7.5,
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
          },
          "range": "<5.1.2"
        }
      ],
      "effects": [
        "fast-glob"
      ],
      "range": "<5.1.2",
      "nodes": [
        "node_modules/netlify-cli/node_modules/cpy/node_modules/glob-parent"
      ],
      "fixAvailable": true
    },
    "globby": {
      "name": "globby",
      "severity": "high",
      "isDirect": false,
      "via": [
        "fast-glob"
      ],
      "effects": [
        "cpy"
      ],
      "range": "8.0.0 - 9.2.0",
      "nodes": [
        "node_modules/netlify-cli/node_modules/cpy/node_modules/globby"
      ],
      "fixAvailable": true
    },
    "got": {
      "name": "got",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        {
          "source": 1088468,
          "name": "got",
          "dependency": "got",
          "title": "Got allows a redirect to a UNIX socket",
          "url": "https://github.com/advisories/GHSA-pfrx-2q88-qq97",
          "severity": "moderate",
          "cwe": [],
          "cvss": {
            "score": 5.3,
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
          },
          "range": "<11.8.5"
        }
      ],
      "effects": [
        "@netlify/build",
        "download",
        "fetch-node-website",
        "package-json"
      ],
      "range": "<11.8.5",
      "nodes": [
        "node_modules/netlify-cli/node_modules/@netlify/build/node_modules/got",
        "node_modules/netlify-cli/node_modules/download/node_modules/got",
        "node_modules/netlify-cli/node_modules/fetch-node-website/node_modules/got",
        "node_modules/netlify-cli/node_modules/package-json/node_modules/got"
      ],
      "fixAvailable": true
    },
    "json5": {
      "name": "json5",
      "severity": "high",
      "isDirect": false,
      "via": [
        {
          "source": 1088341,
          "name": "json5",
          "dependency": "json5",
          "title": "Prototype Pollution in JSON5 via Parse Method",
          "url": "https://github.com/advisories/GHSA-9c47-m6qq-7p4h",
          "severity": "high",
          "cwe": [
            "CWE-1321"
          ],
          "cvss": {
            "score": 7.1,
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H"
          },
          "range": "<1.0.2"
        },
        {
          "source": 1088342,
          "name": "json5",
          "dependency": "json5",
          "title": "Prototype Pollution in JSON5 via Parse Method",
          "url": "https://github.com/advisories/GHSA-9c47-m6qq-7p4h",
          "severity": "high",
          "cwe": [
            "CWE-1321"
          ],
          "cvss": {
            "score": 7.1,
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H"
          },
          "range": ">=2.0.0 <2.2.2"
        }
      ],
      "effects": [],
      "range": "<1.0.2 || >=2.0.0 <2.2.2",
      "nodes": [
        "node_modules/json5",
        "node_modules/netlify-cli/node_modules/json5",
        "node_modules/netlify-cli/node_modules/tsconfig-paths/node_modules/json5"
      ],
      "fixAvailable": true
    },
    "jsonwebtoken": {
      "name": "jsonwebtoken",
      "severity": "high",
      "isDirect": false,
      "via": [
        {
          "source": 1085321,
          "name": "jsonwebtoken",
          "dependency": "jsonwebtoken",
          "title": "jsonwebtoken's insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC",
          "url": "https://github.com/advisories/GHSA-hjrf-2m68-5959",
          "severity": "moderate",
          "cwe": [
            "CWE-287",
            "CWE-1259"
          ],
          "cvss": {
            "score": 5,
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"
          },
          "range": "<=8.5.1"
        },
        {
          "source": 1085403,
          "name": "jsonwebtoken",
          "dependency": "jsonwebtoken",
          "title": "jsonwebtoken unrestricted key type could lead to legacy keys usage ",
          "url": "https://github.com/advisories/GHSA-8cf7-32gw-wr33",
          "severity": "moderate",
          "cwe": [
            "CWE-327"
          ],
          "cvss": {
            "score": 0,
            "vectorString": null
          },
          "range": "<=8.5.1"
        },
        {
          "source": 1087848,
          "name": "jsonwebtoken",
          "dependency": "jsonwebtoken",
          "title": "jsonwebtoken vulnerable to signature validation bypass due to insecure default algorithm in jwt.verify()",
          "url": "https://github.com/advisories/GHSA-qwph-4952-7xr6",
          "severity": "moderate",
          "cwe": [
            "CWE-287",
            "CWE-327"
          ],
          "cvss": {
            "score": 6.4,
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L"
          },
          "range": "<9.0.0"
        },
        {
          "source": 1088370,
          "name": "jsonwebtoken",
          "dependency": "jsonwebtoken",
          "title": "jsonwebtoken has insecure input validation in jwt.verify function",
          "url": "https://github.com/advisories/GHSA-27h2-hvpr-p74q",
          "severity": "high",
          "cwe": [
            "CWE-20"
          ],
          "cvss": {
            "score": 7.6,
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L"
          },
          "range": "<=8.5.1"
        }
      ],
      "effects": [
        "netlify-cli",
        "verdaccio"
      ],
      "range": "<=8.5.1",
      "nodes": [
        "node_modules/netlify-cli/node_modules/jsonwebtoken"
      ],
      "fixAvailable": true
    },
    "latest-version": {
      "name": "latest-version",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        "package-json"
      ],
      "effects": [
        "update-notifier"
      ],
      "range": "0.2.0 - 5.1.0",
      "nodes": [
        "node_modules/netlify-cli/node_modules/latest-version"
      ],
      "fixAvailable": true
    },
    "luxon": {
      "name": "luxon",
      "severity": "high",
      "isDirect": false,
      "via": [
        {
          "source": 1087862,
          "name": "luxon",
          "dependency": "luxon",
          "title": "Luxon Inefficient Regular Expression Complexity vulnerability",
          "url": "https://github.com/advisories/GHSA-3xq5-wjfh-ppjc",
          "severity": "high",
          "cwe": [
            "CWE-1333"
          ],
          "cvss": {
            "score": 7.5,
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
          },
          "range": ">=3.0.0 <3.2.1"
        }
      ],
      "effects": [],
      "range": "3.0.0 - 3.2.0",
      "nodes": [
        "node_modules/netlify-cli/node_modules/luxon"
      ],
      "fixAvailable": true
    },
    "netlify-cli": {
      "name": "netlify-cli",
      "severity": "moderate",
      "isDirect": true,
      "via": [
        "@netlify/build",
        "gh-release-fetch",
        "jsonwebtoken",
        "node-version-alias"
      ],
      "effects": [],
      "range": ">=2.13.0",
      "nodes": [
        "node_modules/netlify-cli"
      ],
      "fixAvailable": true
    },
    "node-version-alias": {
      "name": "node-version-alias",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        "all-node-versions",
        "normalize-node-version"
      ],
      "effects": [
        "netlify-cli"
      ],
      "range": "<=1.0.1",
      "nodes": [
        "node_modules/netlify-cli/node_modules/node-version-alias"
      ],
      "fixAvailable": true
    },
    "normalize-node-version": {
      "name": "normalize-node-version",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        "all-node-versions"
      ],
      "effects": [],
      "range": "2.0.0 - 10.0.0",
      "nodes": [
        "node_modules/netlify-cli/node_modules/normalize-node-version"
      ],
      "fixAvailable": true
    },
    "package-json": {
      "name": "package-json",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        "got"
      ],
      "effects": [
        "latest-version"
      ],
      "range": "<=6.5.0",
      "nodes": [
        "node_modules/netlify-cli/node_modules/package-json"
      ],
      "fixAvailable": true
    },
    "qs": {
      "name": "qs",
      "severity": "high",
      "isDirect": false,
      "via": [
        {
          "source": 1088643,
          "name": "qs",
          "dependency": "qs",
          "title": "qs vulnerable to Prototype Pollution",
          "url": "https://github.com/advisories/GHSA-hrpp-h998-j3pp",
          "severity": "high",
          "cwe": [
            "CWE-1321"
          ],
          "cvss": {
            "score": 7.5,
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
          },
          "range": ">=6.9.0 <6.9.7"
        }
      ],
      "effects": [
        "formidable"
      ],
      "range": "6.9.0 - 6.9.6",
      "nodes": [
        "node_modules/netlify-cli/node_modules/formidable/node_modules/qs"
      ],
      "fixAvailable": true
    },
    "terser": {
      "name": "terser",
      "severity": "high",
      "isDirect": false,
      "via": [
        {
          "source": 1088439,
          "name": "terser",
          "dependency": "terser",
          "title": "Terser insecure use of regular expressions before v4.8.1 and v5.14.2 leads to ReDoS",
          "url": "https://github.com/advisories/GHSA-4wf5-vphf-c2xc",
          "severity": "high",
          "cwe": [],
          "cvss": {
            "score": 7.5,
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
          },
          "range": ">=5.0.0 <5.14.2"
        }
      ],
      "effects": [],
      "range": "5.0.0 - 5.14.1",
      "nodes": [
        "node_modules/terser"
      ],
      "fixAvailable": true
    },
    "update-notifier": {
      "name": "update-notifier",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        "latest-version"
      ],
      "effects": [
        "@netlify/build"
      ],
      "range": "0.2.0 - 5.1.0",
      "nodes": [
        "node_modules/netlify-cli/node_modules/@netlify/build/node_modules/update-notifier"
      ],
      "fixAvailable": true
    },
    "verdaccio": {
      "name": "verdaccio",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        "jsonwebtoken"
      ],
      "effects": [],
      "range": "2.2.7-r - 5.18.0",
      "nodes": [
        "node_modules/netlify-cli/node_modules/verdaccio"
      ],
      "fixAvailable": true
    },
    "vite": {
      "name": "vite",
      "severity": "moderate",
      "isDirect": true,
      "via": [
        {
          "source": 1088406,
          "name": "vite",
          "dependency": "vite",
          "title": "Vitejs Vite before v2.9.13 vulnerable to directory traversal via crafted URL to victim's service",
          "url": "https://github.com/advisories/GHSA-mv48-hcvh-8jj8",
          "severity": "moderate",
          "cwe": [
            "CWE-22"
          ],
          "cvss": {
            "score": 4.3,
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
          },
          "range": "<2.9.13"
        }
      ],
      "effects": [],
      "range": "<2.9.13",
      "nodes": [
        "node_modules/vite"
      ],
      "fixAvailable": {
        "name": "vite",
        "version": "2.9.15",
        "isSemVerMajor": false
      }
    }
  },
  "metadata": {
    "vulnerabilities": {
      "info": 0,
      "low": 1,
      "moderate": 13,
      "high": 13,
      "critical": 0,
      "total": 27
    },
    "dependencies": {
      "prod": 736,
      "dev": 2586,
      "optional": 46,
      "peer": 64,
      "peerOptional": 0,
      "total": 3321
    }
  }
}

--- end ---
$ /usr/bin/npm audit --json --legacy-peer-deps
--- stdout ---
{
  "auditReportVersion": 2,
  "vulnerabilities": {
    "@netlify/build": {
      "name": "@netlify/build",
      "severity": "high",
      "isDirect": false,
      "via": [
        "@netlify/cache-utils",
        "@netlify/functions-utils",
        "got",
        "update-notifier"
      ],
      "effects": [
        "netlify-cli"
      ],
      "range": ">=0.1.31",
      "nodes": [
        "node_modules/netlify-cli/node_modules/@netlify/build"
      ],
      "fixAvailable": true
    },
    "@netlify/cache-utils": {
      "name": "@netlify/cache-utils",
      "severity": "high",
      "isDirect": false,
      "via": [
        "cpy"
      ],
      "effects": [
        "@netlify/build"
      ],
      "range": "*",
      "nodes": [
        "node_modules/netlify-cli/node_modules/@netlify/cache-utils"
      ],
      "fixAvailable": true
    },
    "@netlify/functions-utils": {
      "name": "@netlify/functions-utils",
      "severity": "high",
      "isDirect": false,
      "via": [
        "cpy"
      ],
      "effects": [
        "@netlify/build"
      ],
      "range": "*",
      "nodes": [
        "node_modules/netlify-cli/node_modules/@netlify/functions-utils"
      ],
      "fixAvailable": true
    },
    "all-node-versions": {
      "name": "all-node-versions",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        "fetch-node-website"
      ],
      "effects": [
        "node-version-alias",
        "normalize-node-version"
      ],
      "range": "2.0.0 - 8.0.0",
      "nodes": [
        "node_modules/netlify-cli/node_modules/all-node-versions"
      ],
      "fixAvailable": true
    },
    "cpy": {
      "name": "cpy",
      "severity": "high",
      "isDirect": false,
      "via": [
        "globby"
      ],
      "effects": [
        "@netlify/cache-utils",
        "@netlify/functions-utils"
      ],
      "range": "7.0.0 - 8.1.2",
      "nodes": [
        "node_modules/netlify-cli/node_modules/cpy"
      ],
      "fixAvailable": true
    },
    "decode-uri-component": {
      "name": "decode-uri-component",
      "severity": "low",
      "isDirect": false,
      "via": [
        {
          "source": 1087979,
          "name": "decode-uri-component",
          "dependency": "decode-uri-component",
          "title": "decode-uri-component vulnerable to Denial of Service (DoS)",
          "url": "https://github.com/advisories/GHSA-w573-4hg7-7wgq",
          "severity": "low",
          "cwe": [
            "CWE-20"
          ],
          "cvss": {
            "score": 0,
            "vectorString": null
          },
          "range": "<0.2.1"
        }
      ],
      "effects": [],
      "range": "<0.2.1",
      "nodes": [
        "node_modules/netlify-cli/node_modules/decode-uri-component"
      ],
      "fixAvailable": true
    },
    "download": {
      "name": "download",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        "got"
      ],
      "effects": [
        "gh-release-fetch"
      ],
      "range": ">=4.0.0",
      "nodes": [
        "node_modules/netlify-cli/node_modules/download"
      ],
      "fixAvailable": true
    },
    "fast-glob": {
      "name": "fast-glob",
      "severity": "high",
      "isDirect": false,
      "via": [
        "glob-parent"
      ],
      "effects": [
        "globby"
      ],
      "range": "<=2.2.7",
      "nodes": [
        "node_modules/netlify-cli/node_modules/cpy/node_modules/fast-glob"
      ],
      "fixAvailable": true
    },
    "fetch-node-website": {
      "name": "fetch-node-website",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        "got"
      ],
      "effects": [
        "all-node-versions"
      ],
      "range": "2.0.0 - 5.0.3",
      "nodes": [
        "node_modules/netlify-cli/node_modules/fetch-node-website"
      ],
      "fixAvailable": true
    },
    "formidable": {
      "name": "formidable",
      "severity": "high",
      "isDirect": false,
      "via": [
        "qs"
      ],
      "effects": [],
      "range": "2.0.0-canary.20200129.2 - 2.0.1",
      "nodes": [
        "node_modules/netlify-cli/node_modules/formidable"
      ],
      "fixAvailable": true
    },
    "gh-release-fetch": {
      "name": "gh-release-fetch",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        "download"
      ],
      "effects": [
        "netlify-cli"
      ],
      "range": "*",
      "nodes": [
        "node_modules/netlify-cli/node_modules/gh-release-fetch"
      ],
      "fixAvailable": true
    },
    "glob-parent": {
      "name": "glob-parent",
      "severity": "high",
      "isDirect": false,
      "via": [
        {
          "source": 1088261,
          "name": "glob-parent",
          "dependency": "glob-parent",
          "title": "glob-parent before 5.1.2 vulnerable to Regular Expression Denial of Service in enclosure regex",
          "url": "https://github.com/advisories/GHSA-ww39-953v-wcq6",
          "severity": "high",
          "cwe": [
            "CWE-400"
          ],
          "cvss": {
            "score": 7.5,
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
          },
          "range": "<5.1.2"
        }
      ],
      "effects": [
        "fast-glob"
      ],
      "range": "<5.1.2",
      "nodes": [
        "node_modules/netlify-cli/node_modules/cpy/node_modules/glob-parent"
      ],
      "fixAvailable": true
    },
    "globby": {
      "name": "globby",
      "severity": "high",
      "isDirect": false,
      "via": [
        "fast-glob"
      ],
      "effects": [
        "cpy"
      ],
      "range": "8.0.0 - 9.2.0",
      "nodes": [
        "node_modules/netlify-cli/node_modules/cpy/node_modules/globby"
      ],
      "fixAvailable": true
    },
    "got": {
      "name": "got",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        {
          "source": 1088468,
          "name": "got",
          "dependency": "got",
          "title": "Got allows a redirect to a UNIX socket",
          "url": "https://github.com/advisories/GHSA-pfrx-2q88-qq97",
          "severity": "moderate",
          "cwe": [],
          "cvss": {
            "score": 5.3,
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
          },
          "range": "<11.8.5"
        }
      ],
      "effects": [
        "@netlify/build",
        "download",
        "fetch-node-website",
        "package-json"
      ],
      "range": "<11.8.5",
      "nodes": [
        "node_modules/netlify-cli/node_modules/@netlify/build/node_modules/got",
        "node_modules/netlify-cli/node_modules/download/node_modules/got",
        "node_modules/netlify-cli/node_modules/fetch-node-website/node_modules/got",
        "node_modules/netlify-cli/node_modules/package-json/node_modules/got"
      ],
      "fixAvailable": true
    },
    "json5": {
      "name": "json5",
      "severity": "high",
      "isDirect": false,
      "via": [
        {
          "source": 1088341,
          "name": "json5",
          "dependency": "json5",
          "title": "Prototype Pollution in JSON5 via Parse Method",
          "url": "https://github.com/advisories/GHSA-9c47-m6qq-7p4h",
          "severity": "high",
          "cwe": [
            "CWE-1321"
          ],
          "cvss": {
            "score": 7.1,
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H"
          },
          "range": "<1.0.2"
        },
        {
          "source": 1088342,
          "name": "json5",
          "dependency": "json5",
          "title": "Prototype Pollution in JSON5 via Parse Method",
          "url": "https://github.com/advisories/GHSA-9c47-m6qq-7p4h",
          "severity": "high",
          "cwe": [
            "CWE-1321"
          ],
          "cvss": {
            "score": 7.1,
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H"
          },
          "range": ">=2.0.0 <2.2.2"
        }
      ],
      "effects": [],
      "range": "<1.0.2 || >=2.0.0 <2.2.2",
      "nodes": [
        "node_modules/json5",
        "node_modules/netlify-cli/node_modules/json5",
        "node_modules/netlify-cli/node_modules/tsconfig-paths/node_modules/json5"
      ],
      "fixAvailable": true
    },
    "jsonwebtoken": {
      "name": "jsonwebtoken",
      "severity": "high",
      "isDirect": false,
      "via": [
        {
          "source": 1085321,
          "name": "jsonwebtoken",
          "dependency": "jsonwebtoken",
          "title": "jsonwebtoken's insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC",
          "url": "https://github.com/advisories/GHSA-hjrf-2m68-5959",
          "severity": "moderate",
          "cwe": [
            "CWE-287",
            "CWE-1259"
          ],
          "cvss": {
            "score": 5,
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"
          },
          "range": "<=8.5.1"
        },
        {
          "source": 1085403,
          "name": "jsonwebtoken",
          "dependency": "jsonwebtoken",
          "title": "jsonwebtoken unrestricted key type could lead to legacy keys usage ",
          "url": "https://github.com/advisories/GHSA-8cf7-32gw-wr33",
          "severity": "moderate",
          "cwe": [
            "CWE-327"
          ],
          "cvss": {
            "score": 0,
            "vectorString": null
          },
          "range": "<=8.5.1"
        },
        {
          "source": 1087848,
          "name": "jsonwebtoken",
          "dependency": "jsonwebtoken",
          "title": "jsonwebtoken vulnerable to signature validation bypass due to insecure default algorithm in jwt.verify()",
          "url": "https://github.com/advisories/GHSA-qwph-4952-7xr6",
          "severity": "moderate",
          "cwe": [
            "CWE-287",
            "CWE-327"
          ],
          "cvss": {
            "score": 6.4,
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L"
          },
          "range": "<9.0.0"
        },
        {
          "source": 1088370,
          "name": "jsonwebtoken",
          "dependency": "jsonwebtoken",
          "title": "jsonwebtoken has insecure input validation in jwt.verify function",
          "url": "https://github.com/advisories/GHSA-27h2-hvpr-p74q",
          "severity": "high",
          "cwe": [
            "CWE-20"
          ],
          "cvss": {
            "score": 7.6,
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L"
          },
          "range": "<=8.5.1"
        }
      ],
      "effects": [
        "netlify-cli",
        "verdaccio"
      ],
      "range": "<=8.5.1",
      "nodes": [
        "node_modules/netlify-cli/node_modules/jsonwebtoken"
      ],
      "fixAvailable": true
    },
    "latest-version": {
      "name": "latest-version",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        "package-json"
      ],
      "effects": [
        "update-notifier"
      ],
      "range": "0.2.0 - 5.1.0",
      "nodes": [
        "node_modules/netlify-cli/node_modules/latest-version"
      ],
      "fixAvailable": true
    },
    "luxon": {
      "name": "luxon",
      "severity": "high",
      "isDirect": false,
      "via": [
        {
          "source": 1087862,
          "name": "luxon",
          "dependency": "luxon",
          "title": "Luxon Inefficient Regular Expression Complexity vulnerability",
          "url": "https://github.com/advisories/GHSA-3xq5-wjfh-ppjc",
          "severity": "high",
          "cwe": [
            "CWE-1333"
          ],
          "cvss": {
            "score": 7.5,
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
          },
          "range": ">=3.0.0 <3.2.1"
        }
      ],
      "effects": [],
      "range": "3.0.0 - 3.2.0",
      "nodes": [
        "node_modules/netlify-cli/node_modules/luxon"
      ],
      "fixAvailable": true
    },
    "netlify-cli": {
      "name": "netlify-cli",
      "severity": "moderate",
      "isDirect": true,
      "via": [
        "@netlify/build",
        "gh-release-fetch",
        "jsonwebtoken",
        "node-version-alias"
      ],
      "effects": [],
      "range": ">=2.13.0",
      "nodes": [
        "node_modules/netlify-cli"
      ],
      "fixAvailable": true
    },
    "node-version-alias": {
      "name": "node-version-alias",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        "all-node-versions",
        "normalize-node-version"
      ],
      "effects": [
        "netlify-cli"
      ],
      "range": "<=1.0.1",
      "nodes": [
        "node_modules/netlify-cli/node_modules/node-version-alias"
      ],
      "fixAvailable": true
    },
    "normalize-node-version": {
      "name": "normalize-node-version",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        "all-node-versions"
      ],
      "effects": [],
      "range": "2.0.0 - 10.0.0",
      "nodes": [
        "node_modules/netlify-cli/node_modules/normalize-node-version"
      ],
      "fixAvailable": true
    },
    "package-json": {
      "name": "package-json",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        "got"
      ],
      "effects": [
        "latest-version"
      ],
      "range": "<=6.5.0",
      "nodes": [
        "node_modules/netlify-cli/node_modules/package-json"
      ],
      "fixAvailable": true
    },
    "qs": {
      "name": "qs",
      "severity": "high",
      "isDirect": false,
      "via": [
        {
          "source": 1088643,
          "name": "qs",
          "dependency": "qs",
          "title": "qs vulnerable to Prototype Pollution",
          "url": "https://github.com/advisories/GHSA-hrpp-h998-j3pp",
          "severity": "high",
          "cwe": [
            "CWE-1321"
          ],
          "cvss": {
            "score": 7.5,
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
          },
          "range": ">=6.9.0 <6.9.7"
        }
      ],
      "effects": [
        "formidable"
      ],
      "range": "6.9.0 - 6.9.6",
      "nodes": [
        "node_modules/netlify-cli/node_modules/formidable/node_modules/qs"
      ],
      "fixAvailable": true
    },
    "terser": {
      "name": "terser",
      "severity": "high",
      "isDirect": false,
      "via": [
        {
          "source": 1088439,
          "name": "terser",
          "dependency": "terser",
          "title": "Terser insecure use of regular expressions before v4.8.1 and v5.14.2 leads to ReDoS",
          "url": "https://github.com/advisories/GHSA-4wf5-vphf-c2xc",
          "severity": "high",
          "cwe": [],
          "cvss": {
            "score": 7.5,
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
          },
          "range": ">=5.0.0 <5.14.2"
        }
      ],
      "effects": [],
      "range": "5.0.0 - 5.14.1",
      "nodes": [
        "node_modules/terser"
      ],
      "fixAvailable": true
    },
    "update-notifier": {
      "name": "update-notifier",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        "latest-version"
      ],
      "effects": [
        "@netlify/build"
      ],
      "range": "0.2.0 - 5.1.0",
      "nodes": [
        "node_modules/netlify-cli/node_modules/@netlify/build/node_modules/update-notifier"
      ],
      "fixAvailable": true
    },
    "verdaccio": {
      "name": "verdaccio",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        "jsonwebtoken"
      ],
      "effects": [],
      "range": "2.2.7-r - 5.18.0",
      "nodes": [
        "node_modules/netlify-cli/node_modules/verdaccio"
      ],
      "fixAvailable": true
    },
    "vite": {
      "name": "vite",
      "severity": "moderate",
      "isDirect": true,
      "via": [
        {
          "source": 1088406,
          "name": "vite",
          "dependency": "vite",
          "title": "Vitejs Vite before v2.9.13 vulnerable to directory traversal via crafted URL to victim's service",
          "url": "https://github.com/advisories/GHSA-mv48-hcvh-8jj8",
          "severity": "moderate",
          "cwe": [
            "CWE-22"
          ],
          "cvss": {
            "score": 4.3,
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
          },
          "range": "<2.9.13"
        }
      ],
      "effects": [],
      "range": "<2.9.13",
      "nodes": [
        "node_modules/vite"
      ],
      "fixAvailable": {
        "name": "vite",
        "version": "2.9.15",
        "isSemVerMajor": false
      }
    }
  },
  "metadata": {
    "vulnerabilities": {
      "info": 0,
      "low": 1,
      "moderate": 13,
      "high": 13,
      "critical": 0,
      "total": 27
    },
    "dependencies": {
      "prod": 736,
      "dev": 2586,
      "optional": 46,
      "peer": 64,
      "peerOptional": 0,
      "total": 3321
    }
  }
}

--- end ---
Attempting to npm audit fix
$ /usr/bin/npm audit fix --dry-run --only=dev --json --legacy-peer-deps
--- stderr ---
npm WARN invalid config only="dev" set in command line options
npm WARN invalid config Must be one of: null, prod, production
--- stdout ---
{
  "added": 1165,
  "removed": 0,
  "changed": 0,
  "audited": 2657,
  "funding": 283,
  "audit": {
    "auditReportVersion": 2,
    "vulnerabilities": {
      "@netlify/build": {
        "name": "@netlify/build",
        "severity": "high",
        "isDirect": false,
        "via": [
          "@netlify/cache-utils",
          "@netlify/functions-utils",
          "got",
          "update-notifier"
        ],
        "effects": [
          "netlify-cli"
        ],
        "range": ">=0.1.31",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "@netlify/cache-utils": {
        "name": "@netlify/cache-utils",
        "severity": "high",
        "isDirect": false,
        "via": [
          "cpy"
        ],
        "effects": [
          "@netlify/build"
        ],
        "range": "*",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "@netlify/functions-utils": {
        "name": "@netlify/functions-utils",
        "severity": "high",
        "isDirect": false,
        "via": [
          "cpy"
        ],
        "effects": [
          "@netlify/build"
        ],
        "range": "*",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "all-node-versions": {
        "name": "all-node-versions",
        "severity": "moderate",
        "isDirect": false,
        "via": [
          "fetch-node-website"
        ],
        "effects": [
          "node-version-alias",
          "normalize-node-version"
        ],
        "range": "2.0.0 - 8.0.0",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "cpy": {
        "name": "cpy",
        "severity": "high",
        "isDirect": false,
        "via": [
          "globby"
        ],
        "effects": [
          "@netlify/cache-utils",
          "@netlify/functions-utils"
        ],
        "range": "7.0.0 - 8.1.2",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "decode-uri-component": {
        "name": "decode-uri-component",
        "severity": "low",
        "isDirect": false,
        "via": [
          {
            "source": 1087979,
            "name": "decode-uri-component",
            "dependency": "decode-uri-component",
            "title": "decode-uri-component vulnerable to Denial of Service (DoS)",
            "url": "https://github.com/advisories/GHSA-w573-4hg7-7wgq",
            "severity": "low",
            "cwe": [
              "CWE-20"
            ],
            "cvss": {
              "score": 0,
              "vectorString": null
            },
            "range": "<0.2.1"
          }
        ],
        "effects": [],
        "range": "<0.2.1",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "download": {
        "name": "download",
        "severity": "moderate",
        "isDirect": false,
        "via": [
          "got"
        ],
        "effects": [
          "gh-release-fetch"
        ],
        "range": ">=4.0.0",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "fast-glob": {
        "name": "fast-glob",
        "severity": "high",
        "isDirect": false,
        "via": [
          "glob-parent"
        ],
        "effects": [
          "globby"
        ],
        "range": "<=2.2.7",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "fetch-node-website": {
        "name": "fetch-node-website",
        "severity": "moderate",
        "isDirect": false,
        "via": [
          "got"
        ],
        "effects": [
          "all-node-versions"
        ],
        "range": "2.0.0 - 5.0.3",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "formidable": {
        "name": "formidable",
        "severity": "high",
        "isDirect": false,
        "via": [
          "qs"
        ],
        "effects": [],
        "range": "2.0.0-canary.20200129.2 - 2.0.1",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "gh-release-fetch": {
        "name": "gh-release-fetch",
        "severity": "moderate",
        "isDirect": false,
        "via": [
          "download"
        ],
        "effects": [
          "netlify-cli"
        ],
        "range": "*",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "glob-parent": {
        "name": "glob-parent",
        "severity": "high",
        "isDirect": false,
        "via": [
          {
            "source": 1088261,
            "name": "glob-parent",
            "dependency": "glob-parent",
            "title": "glob-parent before 5.1.2 vulnerable to Regular Expression Denial of Service in enclosure regex",
            "url": "https://github.com/advisories/GHSA-ww39-953v-wcq6",
            "severity": "high",
            "cwe": [
              "CWE-400"
            ],
            "cvss": {
              "score": 7.5,
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
            },
            "range": "<5.1.2"
          }
        ],
        "effects": [
          "fast-glob"
        ],
        "range": "<5.1.2",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "globby": {
        "name": "globby",
        "severity": "high",
        "isDirect": false,
        "via": [
          "fast-glob"
        ],
        "effects": [
          "cpy"
        ],
        "range": "8.0.0 - 9.2.0",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "got": {
        "name": "got",
        "severity": "moderate",
        "isDirect": true,
        "via": [
          {
            "source": 1088468,
            "name": "got",
            "dependency": "got",
            "title": "Got allows a redirect to a UNIX socket",
            "url": "https://github.com/advisories/GHSA-pfrx-2q88-qq97",
            "severity": "moderate",
            "cwe": [],
            "cvss": {
              "score": 5.3,
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
            },
            "range": "<11.8.5"
          }
        ],
        "effects": [
          "@netlify/build",
          "download",
          "fetch-node-website",
          "package-json"
        ],
        "range": "<11.8.5",
        "nodes": [
          "",
          "",
          "node_modules/got",
          "node_modules/got"
        ],
        "fixAvailable": true
      },
      "json5": {
        "name": "json5",
        "severity": "high",
        "isDirect": true,
        "via": [
          {
            "source": 1088341,
            "name": "json5",
            "dependency": "json5",
            "title": "Prototype Pollution in JSON5 via Parse Method",
            "url": "https://github.com/advisories/GHSA-9c47-m6qq-7p4h",
            "severity": "high",
            "cwe": [
              "CWE-1321"
            ],
            "cvss": {
              "score": 7.1,
              "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H"
            },
            "range": "<1.0.2"
          },
          {
            "source": 1088342,
            "name": "json5",
            "dependency": "json5",
            "title": "Prototype Pollution in JSON5 via Parse Method",
            "url": "https://github.com/advisories/GHSA-9c47-m6qq-7p4h",
            "severity": "high",
            "cwe": [
              "CWE-1321"
            ],
            "cvss": {
              "score": 7.1,
              "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H"
            },
            "range": ">=2.0.0 <2.2.2"
          }
        ],
        "effects": [],
        "range": "<1.0.2 || >=2.0.0 <2.2.2",
        "nodes": [
          "",
          "",
          "node_modules/json5"
        ],
        "fixAvailable": true
      },
      "jsonwebtoken": {
        "name": "jsonwebtoken",
        "severity": "high",
        "isDirect": false,
        "via": [
          {
            "source": 1085321,
            "name": "jsonwebtoken",
            "dependency": "jsonwebtoken",
            "title": "jsonwebtoken's insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC",
            "url": "https://github.com/advisories/GHSA-hjrf-2m68-5959",
            "severity": "moderate",
            "cwe": [
              "CWE-287",
              "CWE-1259"
            ],
            "cvss": {
              "score": 5,
              "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"
            },
            "range": "<=8.5.1"
          },
          {
            "source": 1085403,
            "name": "jsonwebtoken",
            "dependency": "jsonwebtoken",
            "title": "jsonwebtoken unrestricted key type could lead to legacy keys usage ",
            "url": "https://github.com/advisories/GHSA-8cf7-32gw-wr33",
            "severity": "moderate",
            "cwe": [
              "CWE-327"
            ],
            "cvss": {
              "score": 0,
              "vectorString": null
            },
            "range": "<=8.5.1"
          },
          {
            "source": 1087848,
            "name": "jsonwebtoken",
            "dependency": "jsonwebtoken",
            "title": "jsonwebtoken vulnerable to signature validation bypass due to insecure default algorithm in jwt.verify()",
            "url": "https://github.com/advisories/GHSA-qwph-4952-7xr6",
            "severity": "moderate",
            "cwe": [
              "CWE-287",
              "CWE-327"
            ],
            "cvss": {
              "score": 6.4,
              "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L"
            },
            "range": "<9.0.0"
          },
          {
            "source": 1088370,
            "name": "jsonwebtoken",
            "dependency": "jsonwebtoken",
            "title": "jsonwebtoken has insecure input validation in jwt.verify function",
            "url": "https://github.com/advisories/GHSA-27h2-hvpr-p74q",
            "severity": "high",
            "cwe": [
              "CWE-20"
            ],
            "cvss": {
              "score": 7.6,
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L"
            },
            "range": "<=8.5.1"
          }
        ],
        "effects": [
          "netlify-cli",
          "verdaccio"
        ],
        "range": "<=8.5.1",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "latest-version": {
        "name": "latest-version",
        "severity": "moderate",
        "isDirect": false,
        "via": [
          "package-json"
        ],
        "effects": [
          "update-notifier"
        ],
        "range": "0.2.0 - 5.1.0",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "luxon": {
        "name": "luxon",
        "severity": "high",
        "isDirect": false,
        "via": [
          {
            "source": 1087862,
            "name": "luxon",
            "dependency": "luxon",
            "title": "Luxon Inefficient Regular Expression Complexity vulnerability",
            "url": "https://github.com/advisories/GHSA-3xq5-wjfh-ppjc",
            "severity": "high",
            "cwe": [
              "CWE-1333"
            ],
            "cvss": {
              "score": 7.5,
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
            },
            "range": ">=3.0.0 <3.2.1"
          }
        ],
        "effects": [],
        "range": "3.0.0 - 3.2.0",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "netlify-cli": {
        "name": "netlify-cli",
        "severity": "moderate",
        "isDirect": false,
        "via": [
          "@netlify/build",
          "gh-release-fetch",
          "jsonwebtoken",
          "node-version-alias"
        ],
        "effects": [],
        "range": ">=2.13.0",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "node-version-alias": {
        "name": "node-version-alias",
        "severity": "moderate",
        "isDirect": false,
        "via": [
          "all-node-versions",
          "normalize-node-version"
        ],
        "effects": [
          "netlify-cli"
        ],
        "range": "<=1.0.1",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "normalize-node-version": {
        "name": "normalize-node-version",
        "severity": "moderate",
        "isDirect": false,
        "via": [
          "all-node-versions"
        ],
        "effects": [],
        "range": "2.0.0 - 10.0.0",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "package-json": {
        "name": "package-json",
        "severity": "moderate",
        "isDirect": false,
        "via": [
          "got"
        ],
        "effects": [
          "latest-version"
        ],
        "range": "<=6.5.0",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "qs": {
        "name": "qs",
        "severity": "high",
        "isDirect": true,
        "via": [
          {
            "source": 1088643,
            "name": "qs",
            "dependency": "qs",
            "title": "qs vulnerable to Prototype Pollution",
            "url": "https://github.com/advisories/GHSA-hrpp-h998-j3pp",
            "severity": "high",
            "cwe": [
              "CWE-1321"
            ],
            "cvss": {
              "score": 7.5,
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
            },
            "range": ">=6.9.0 <6.9.7"
          }
        ],
        "effects": [
          "formidable"
        ],
        "range": "6.9.0 - 6.9.6",
        "nodes": [
          "node_modules/qs"
        ],
        "fixAvailable": true
      },
      "terser": {
        "name": "terser",
        "severity": "high",
        "isDirect": false,
        "via": [
          {
            "source": 1088439,
            "name": "terser",
            "dependency": "terser",
            "title": "Terser insecure use of regular expressions before v4.8.1 and v5.14.2 leads to ReDoS",
            "url": "https://github.com/advisories/GHSA-4wf5-vphf-c2xc",
            "severity": "high",
            "cwe": [],
            "cvss": {
              "score": 7.5,
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
            },
            "range": ">=5.0.0 <5.14.2"
          }
        ],
        "effects": [],
        "range": "5.0.0 - 5.14.1",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "update-notifier": {
        "name": "update-notifier",
        "severity": "moderate",
        "isDirect": false,
        "via": [
          "latest-version"
        ],
        "effects": [
          "@netlify/build"
        ],
        "range": "0.2.0 - 5.1.0",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "verdaccio": {
        "name": "verdaccio",
        "severity": "moderate",
        "isDirect": false,
        "via": [
          "jsonwebtoken"
        ],
        "effects": [],
        "range": "2.2.7-r - 5.18.0",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "vite": {
        "name": "vite",
        "severity": "moderate",
        "isDirect": true,
        "via": [
          {
            "source": 1088406,
            "name": "vite",
            "dependency": "vite",
            "title": "Vitejs Vite before v2.9.13 vulnerable to directory traversal via crafted URL to victim's service",
            "url": "https://github.com/advisories/GHSA-mv48-hcvh-8jj8",
            "severity": "moderate",
            "cwe": [
              "CWE-22"
            ],
            "cvss": {
              "score": 4.3,
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
            },
            "range": "<2.9.13"
          }
        ],
        "effects": [],
        "range": "<2.9.13",
        "nodes": [
          "node_modules/vite"
        ],
        "fixAvailable": {
          "name": "vite",
          "version": "2.9.15",
          "isSemVerMajor": false
        }
      }
    },
    "metadata": {
      "vulnerabilities": {
        "info": 0,
        "low": 1,
        "moderate": 13,
        "high": 13,
        "critical": 0,
        "total": 27
      },
      "dependencies": {
        "prod": 96,
        "dev": 2561,
        "optional": 39,
        "peer": 0,
        "peerOptional": 0,
        "total": 2656
      }
    }
  }
}

--- end ---
{"added": 1165, "removed": 0, "changed": 0, "audited": 2657, "funding": 283, "audit": {"auditReportVersion": 2, "vulnerabilities": {"@netlify/build": {"name": "@netlify/build", "severity": "high", "isDirect": false, "via": ["@netlify/cache-utils", "@netlify/functions-utils", "got", "update-notifier"], "effects": ["netlify-cli"], "range": ">=0.1.31", "nodes": [""], "fixAvailable": true}, "@netlify/cache-utils": {"name": "@netlify/cache-utils", "severity": "high", "isDirect": false, "via": ["cpy"], "effects": ["@netlify/build"], "range": "*", "nodes": [""], "fixAvailable": true}, "@netlify/functions-utils": {"name": "@netlify/functions-utils", "severity": "high", "isDirect": false, "via": ["cpy"], "effects": ["@netlify/build"], "range": "*", "nodes": [""], "fixAvailable": true}, "all-node-versions": {"name": "all-node-versions", "severity": "moderate", "isDirect": false, "via": ["fetch-node-website"], "effects": ["node-version-alias", "normalize-node-version"], "range": "2.0.0 - 8.0.0", "nodes": [""], "fixAvailable": true}, "cpy": {"name": "cpy", "severity": "high", "isDirect": false, "via": ["globby"], "effects": ["@netlify/cache-utils", "@netlify/functions-utils"], "range": "7.0.0 - 8.1.2", "nodes": [""], "fixAvailable": true}, "decode-uri-component": {"name": "decode-uri-component", "severity": "low", "isDirect": false, "via": [{"source": 1087979, "name": "decode-uri-component", "dependency": "decode-uri-component", "title": "decode-uri-component vulnerable to Denial of Service (DoS)", "url": "https://github.com/advisories/GHSA-w573-4hg7-7wgq", "severity": "low", "cwe": ["CWE-20"], "cvss": {"score": 0, "vectorString": null}, "range": "<0.2.1"}], "effects": [], "range": "<0.2.1", "nodes": [""], "fixAvailable": true}, "download": {"name": "download", "severity": "moderate", "isDirect": false, "via": ["got"], "effects": ["gh-release-fetch"], "range": ">=4.0.0", "nodes": [""], "fixAvailable": true}, "fast-glob": {"name": "fast-glob", "severity": "high", "isDirect": false, "via": ["glob-parent"], "effects": ["globby"], "range": "<=2.2.7", "nodes": [""], "fixAvailable": true}, "fetch-node-website": {"name": "fetch-node-website", "severity": "moderate", "isDirect": false, "via": ["got"], "effects": ["all-node-versions"], "range": "2.0.0 - 5.0.3", "nodes": [""], "fixAvailable": true}, "formidable": {"name": "formidable", "severity": "high", "isDirect": false, "via": ["qs"], "effects": [], "range": "2.0.0-canary.20200129.2 - 2.0.1", "nodes": [""], "fixAvailable": true}, "gh-release-fetch": {"name": "gh-release-fetch", "severity": "moderate", "isDirect": false, "via": ["download"], "effects": ["netlify-cli"], "range": "*", "nodes": [""], "fixAvailable": true}, "glob-parent": {"name": "glob-parent", "severity": "high", "isDirect": false, "via": [{"source": 1088261, "name": "glob-parent", "dependency": "glob-parent", "title": "glob-parent before 5.1.2 vulnerable to Regular Expression Denial of Service in enclosure regex", "url": "https://github.com/advisories/GHSA-ww39-953v-wcq6", "severity": "high", "cwe": ["CWE-400"], "cvss": {"score": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "range": "<5.1.2"}], "effects": ["fast-glob"], "range": "<5.1.2", "nodes": [""], "fixAvailable": true}, "globby": {"name": "globby", "severity": "high", "isDirect": false, "via": ["fast-glob"], "effects": ["cpy"], "range": "8.0.0 - 9.2.0", "nodes": [""], "fixAvailable": true}, "got": {"name": "got", "severity": "moderate", "isDirect": true, "via": [{"source": 1088468, "name": "got", "dependency": "got", "title": "Got allows a redirect to a UNIX socket", "url": "https://github.com/advisories/GHSA-pfrx-2q88-qq97", "severity": "moderate", "cwe": [], "cvss": {"score": 5.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}, "range": "<11.8.5"}], "effects": ["@netlify/build", "download", "fetch-node-website", "package-json"], "range": "<11.8.5", "nodes": ["", "", "node_modules/got", "node_modules/got"], "fixAvailable": true}, "json5": {"name": "json5", "severity": "high", "isDirect": true, "via": [{"source": 1088341, "name": "json5", "dependency": "json5", "title": "Prototype Pollution in JSON5 via Parse Method", "url": "https://github.com/advisories/GHSA-9c47-m6qq-7p4h", "severity": "high", "cwe": ["CWE-1321"], "cvss": {"score": 7.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H"}, "range": "<1.0.2"}, {"source": 1088342, "name": "json5", "dependency": "json5", "title": "Prototype Pollution in JSON5 via Parse Method", "url": "https://github.com/advisories/GHSA-9c47-m6qq-7p4h", "severity": "high", "cwe": ["CWE-1321"], "cvss": {"score": 7.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H"}, "range": ">=2.0.0 <2.2.2"}], "effects": [], "range": "<1.0.2 || >=2.0.0 <2.2.2", "nodes": ["", "", "node_modules/json5"], "fixAvailable": true}, "jsonwebtoken": {"name": "jsonwebtoken", "severity": "high", "isDirect": false, "via": [{"source": 1085321, "name": "jsonwebtoken", "dependency": "jsonwebtoken", "title": "jsonwebtoken's insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC", "url": "https://github.com/advisories/GHSA-hjrf-2m68-5959", "severity": "moderate", "cwe": ["CWE-287", "CWE-1259"], "cvss": {"score": 5, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}, "range": "<=8.5.1"}, {"source": 1085403, "name": "jsonwebtoken", "dependency": "jsonwebtoken", "title": "jsonwebtoken unrestricted key type could lead to legacy keys usage ", "url": "https://github.com/advisories/GHSA-8cf7-32gw-wr33", "severity": "moderate", "cwe": ["CWE-327"], "cvss": {"score": 0, "vectorString": null}, "range": "<=8.5.1"}, {"source": 1087848, "name": "jsonwebtoken", "dependency": "jsonwebtoken", "title": "jsonwebtoken vulnerable to signature validation bypass due to insecure default algorithm in jwt.verify()", "url": "https://github.com/advisories/GHSA-qwph-4952-7xr6", "severity": "moderate", "cwe": ["CWE-287", "CWE-327"], "cvss": {"score": 6.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L"}, "range": "<9.0.0"}, {"source": 1088370, "name": "jsonwebtoken", "dependency": "jsonwebtoken", "title": "jsonwebtoken has insecure input validation in jwt.verify function", "url": "https://github.com/advisories/GHSA-27h2-hvpr-p74q", "severity": "high", "cwe": ["CWE-20"], "cvss": {"score": 7.6, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L"}, "range": "<=8.5.1"}], "effects": ["netlify-cli", "verdaccio"], "range": "<=8.5.1", "nodes": [""], "fixAvailable": true}, "latest-version": {"name": "latest-version", "severity": "moderate", "isDirect": false, "via": ["package-json"], "effects": ["update-notifier"], "range": "0.2.0 - 5.1.0", "nodes": [""], "fixAvailable": true}, "luxon": {"name": "luxon", "severity": "high", "isDirect": false, "via": [{"source": 1087862, "name": "luxon", "dependency": "luxon", "title": "Luxon Inefficient Regular Expression Complexity vulnerability", "url": "https://github.com/advisories/GHSA-3xq5-wjfh-ppjc", "severity": "high", "cwe": ["CWE-1333"], "cvss": {"score": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "range": ">=3.0.0 <3.2.1"}], "effects": [], "range": "3.0.0 - 3.2.0", "nodes": [""], "fixAvailable": true}, "netlify-cli": {"name": "netlify-cli", "severity": "moderate", "isDirect": false, "via": ["@netlify/build", "gh-release-fetch", "jsonwebtoken", "node-version-alias"], "effects": [], "range": ">=2.13.0", "nodes": [""], "fixAvailable": true}, "node-version-alias": {"name": "node-version-alias", "severity": "moderate", "isDirect": false, "via": ["all-node-versions", "normalize-node-version"], "effects": ["netlify-cli"], "range": "<=1.0.1", "nodes": [""], "fixAvailable": true}, "normalize-node-version": {"name": "normalize-node-version", "severity": "moderate", "isDirect": false, "via": ["all-node-versions"], "effects": [], "range": "2.0.0 - 10.0.0", "nodes": [""], "fixAvailable": true}, "package-json": {"name": "package-json", "severity": "moderate", "isDirect": false, "via": ["got"], "effects": ["latest-version"], "range": "<=6.5.0", "nodes": [""], "fixAvailable": true}, "qs": {"name": "qs", "severity": "high", "isDirect": true, "via": [{"source": 1088643, "name": "qs", "dependency": "qs", "title": "qs vulnerable to Prototype Pollution", "url": "https://github.com/advisories/GHSA-hrpp-h998-j3pp", "severity": "high", "cwe": ["CWE-1321"], "cvss": {"score": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "range": ">=6.9.0 <6.9.7"}], "effects": ["formidable"], "range": "6.9.0 - 6.9.6", "nodes": ["node_modules/qs"], "fixAvailable": true}, "terser": {"name": "terser", "severity": "high", "isDirect": false, "via": [{"source": 1088439, "name": "terser", "dependency": "terser", "title": "Terser insecure use of regular expressions before v4.8.1 and v5.14.2 leads to ReDoS", "url": "https://github.com/advisories/GHSA-4wf5-vphf-c2xc", "severity": "high", "cwe": [], "cvss": {"score": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "range": ">=5.0.0 <5.14.2"}], "effects": [], "range": "5.0.0 - 5.14.1", "nodes": [""], "fixAvailable": true}, "update-notifier": {"name": "update-notifier", "severity": "moderate", "isDirect": false, "via": ["latest-version"], "effects": ["@netlify/build"], "range": "0.2.0 - 5.1.0", "nodes": [""], "fixAvailable": true}, "verdaccio": {"name": "verdaccio", "severity": "moderate", "isDirect": false, "via": ["jsonwebtoken"], "effects": [], "range": "2.2.7-r - 5.18.0", "nodes": [""], "fixAvailable": true}, "vite": {"name": "vite", "severity": "moderate", "isDirect": true, "via": [{"source": 1088406, "name": "vite", "dependency": "vite", "title": "Vitejs Vite before v2.9.13 vulnerable to directory traversal via crafted URL to victim's service", "url": "https://github.com/advisories/GHSA-mv48-hcvh-8jj8", "severity": "moderate", "cwe": ["CWE-22"], "cvss": {"score": 4.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}, "range": "<2.9.13"}], "effects": [], "range": "<2.9.13", "nodes": ["node_modules/vite"], "fixAvailable": {"name": "vite", "version": "2.9.15", "isSemVerMajor": false}}}, "metadata": {"vulnerabilities": {"info": 0, "low": 1, "moderate": 13, "high": 13, "critical": 0, "total": 27}, "dependencies": {"prod": 96, "dev": 2561, "optional": 39, "peer": 0, "peerOptional": 0, "total": 2656}}}}
{}
Upgrading n:vite from ~2.8.6 -> 2.9.15
$ /usr/bin/npm audit fix --only=dev --legacy-peer-deps
--- stderr ---
npm WARN invalid config only="dev" set in command line options
npm WARN invalid config Must be one of: null, prod, production
npm WARN deprecated source-map-url@0.4.1: See https://github.com/lydell/source-map-url#deprecated
npm WARN deprecated urix@0.1.0: Please see https://github.com/lydell/urix#deprecated
npm WARN deprecated har-validator@5.1.5: this library is no longer supported
npm WARN deprecated resolve-url@0.2.1: https://github.com/lydell/resolve-url#deprecated
npm WARN deprecated source-map-resolve@0.5.3: See https://github.com/lydell/source-map-resolve#deprecated
npm WARN deprecated querystring@0.2.0: The querystring API is considered Legacy. new code should use the URLSearchParams API instead.
npm WARN deprecated statsd-client@0.4.7: Package no longer supported. Contact Support at https://www.npmjs.com/support for more info.
npm WARN deprecated uuid@3.4.0: Please upgrade  to version 7 or higher.  Older versions may use Math.random() in certain circumstances, which is known to be problematic.  See https://v8.dev/blog/math-random for details.
npm WARN deprecated request@2.88.0: request has been deprecated, see https://github.com/request/request/issues/3142
npm WARN deprecated w3c-hr-time@1.0.2: Use your platform's native performance.now() and performance.timeOrigin.
npm WARN deprecated querystring@0.2.1: The querystring API is considered Legacy. new code should use the URLSearchParams API instead.
npm WARN deprecated @types/rdf-js@4.0.2: This is a stub types definition. rdf-js provides its own type definitions, so you do not need this installed.
npm WARN deprecated sourcemap-codec@1.4.8: Please use @jridgewell/sourcemap-codec instead
npm WARN deprecated core-js@2.6.12: core-js@<3.4 is no longer maintained and not recommended for usage due to the number of issues. Because of the V8 engine whims, feature detection in old core-js versions could cause a slowdown up to 100x even if nothing is polyfilled. Please, upgrade your dependencies to the actual version of core-js.
--- stdout ---

added 3298 packages, and audited 3299 packages in 1m

283 packages are looking for funding
  run `npm fund` for details

# npm audit report

decode-uri-component  <0.2.1
decode-uri-component vulnerable to Denial of Service (DoS) - https://github.com/advisories/GHSA-w573-4hg7-7wgq
fix available via `npm audit fix`
node_modules/netlify-cli/node_modules/decode-uri-component

glob-parent  <5.1.2
Severity: high
glob-parent before 5.1.2 vulnerable to Regular Expression Denial of Service in enclosure regex - https://github.com/advisories/GHSA-ww39-953v-wcq6
fix available via `npm audit fix --force`
Will install netlify-cli@2.37.0, which is a breaking change
node_modules/netlify-cli/node_modules/cpy/node_modules/glob-parent
  fast-glob  <=2.2.7
  Depends on vulnerable versions of glob-parent
  node_modules/netlify-cli/node_modules/cpy/node_modules/fast-glob
    globby  8.0.0 - 9.2.0
    Depends on vulnerable versions of fast-glob
    node_modules/netlify-cli/node_modules/cpy/node_modules/globby
      cpy  7.0.0 - 8.1.2
      Depends on vulnerable versions of globby
      node_modules/netlify-cli/node_modules/cpy
        @netlify/cache-utils  *
        Depends on vulnerable versions of cpy
        node_modules/netlify-cli/node_modules/@netlify/cache-utils
          @netlify/build  >=0.1.31
          Depends on vulnerable versions of @netlify/cache-utils
          Depends on vulnerable versions of @netlify/functions-utils
          Depends on vulnerable versions of got
          Depends on vulnerable versions of update-notifier
          node_modules/netlify-cli/node_modules/@netlify/build
            netlify-cli  >=2.13.0
            Depends on vulnerable versions of @netlify/build
            Depends on vulnerable versions of gh-release-fetch
            Depends on vulnerable versions of node-version-alias
            node_modules/netlify-cli
        @netlify/functions-utils  *
        Depends on vulnerable versions of cpy
        node_modules/netlify-cli/node_modules/@netlify/functions-utils

got  <11.8.5
Severity: moderate
Got allows a redirect to a UNIX socket - https://github.com/advisories/GHSA-pfrx-2q88-qq97
fix available via `npm audit fix --force`
Will install netlify-cli@2.37.0, which is a breaking change
node_modules/netlify-cli/node_modules/@netlify/build/node_modules/got
node_modules/netlify-cli/node_modules/download/node_modules/got
node_modules/netlify-cli/node_modules/fetch-node-website/node_modules/got
node_modules/netlify-cli/node_modules/package-json/node_modules/got
  download  >=4.0.0
  Depends on vulnerable versions of got
  node_modules/netlify-cli/node_modules/download
    gh-release-fetch  *
    Depends on vulnerable versions of download
    node_modules/netlify-cli/node_modules/gh-release-fetch
  fetch-node-website  2.0.0 - 5.0.3
  Depends on vulnerable versions of got
  node_modules/netlify-cli/node_modules/fetch-node-website
    all-node-versions  2.0.0 - 8.0.0
    Depends on vulnerable versions of fetch-node-website
    node_modules/netlify-cli/node_modules/all-node-versions
      node-version-alias  <=1.0.1
      Depends on vulnerable versions of all-node-versions
      Depends on vulnerable versions of normalize-node-version
      node_modules/netlify-cli/node_modules/node-version-alias
      normalize-node-version  2.0.0 - 10.0.0
      Depends on vulnerable versions of all-node-versions
      node_modules/netlify-cli/node_modules/normalize-node-version
  package-json  <=6.5.0
  Depends on vulnerable versions of got
  node_modules/netlify-cli/node_modules/package-json
    latest-version  0.2.0 - 5.1.0
    Depends on vulnerable versions of package-json
    node_modules/netlify-cli/node_modules/latest-version
      update-notifier  0.2.0 - 5.1.0
      Depends on vulnerable versions of latest-version
      node_modules/netlify-cli/node_modules/@netlify/build/node_modules/update-notifier

json5  <1.0.2 || >=2.0.0 <2.2.2
Severity: high
Prototype Pollution in JSON5 via Parse Method - https://github.com/advisories/GHSA-9c47-m6qq-7p4h
Prototype Pollution in JSON5 via Parse Method - https://github.com/advisories/GHSA-9c47-m6qq-7p4h
fix available via `npm audit fix`
node_modules/netlify-cli/node_modules/json5
node_modules/netlify-cli/node_modules/tsconfig-paths/node_modules/json5

jsonwebtoken  <=8.5.1
Severity: high
jsonwebtoken's insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC - https://github.com/advisories/GHSA-hjrf-2m68-5959
jsonwebtoken unrestricted key type could lead to legacy keys usage  - https://github.com/advisories/GHSA-8cf7-32gw-wr33
jsonwebtoken vulnerable to signature validation bypass due to insecure default algorithm in jwt.verify() - https://github.com/advisories/GHSA-qwph-4952-7xr6
jsonwebtoken has insecure input validation in jwt.verify function - https://github.com/advisories/GHSA-27h2-hvpr-p74q
fix available via `npm audit fix`
node_modules/netlify-cli/node_modules/verdaccio/node_modules/jsonwebtoken
  verdaccio  2.2.7-r - 5.18.0
  Depends on vulnerable versions of jsonwebtoken
  node_modules/netlify-cli/node_modules/verdaccio

luxon  3.0.0 - 3.2.0
Severity: high
Luxon Inefficient Regular Expression Complexity vulnerability - https://github.com/advisories/GHSA-3xq5-wjfh-ppjc
fix available via `npm audit fix`
node_modules/netlify-cli/node_modules/luxon

23 vulnerabilities (1 low, 12 moderate, 10 high)

To address issues that do not require attention, run:
  npm audit fix

To address all issues (including breaking changes), run:
  npm audit fix --force

--- end ---
$ package-lock-lint package-lock.json
--- stdout ---
Checking package-lock.json

--- end ---
Verifying that tests still pass
$ /usr/bin/npm ci
--- stderr ---
npm ERR! code EUSAGE
npm ERR! 
npm ERR! `npm ci` can only install packages when your package.json and package-lock.json or npm-shrinkwrap.json are in sync. Please update your lock file with `npm install` before continuing.
npm ERR! 
npm ERR! Missing: webpack@5.75.0 from lock file
npm ERR! Missing: postcss-html@1.5.0 from lock file
npm ERR! Missing: htmlparser2@8.0.1 from lock file
npm ERR! Missing: js-tokens@8.0.1 from lock file
npm ERR! Missing: domelementtype@2.3.0 from lock file
npm ERR! Missing: domhandler@5.0.3 from lock file
npm ERR! Missing: domutils@3.0.1 from lock file
npm ERR! Missing: entities@4.4.0 from lock file
npm ERR! Missing: dom-serializer@2.0.0 from lock file
npm ERR! Missing: @types/eslint-scope@3.7.4 from lock file
npm ERR! Missing: @types/estree@0.0.51 from lock file
npm ERR! Missing: @webassemblyjs/ast@1.11.1 from lock file
npm ERR! Missing: @webassemblyjs/wasm-edit@1.11.1 from lock file
npm ERR! Missing: @webassemblyjs/wasm-parser@1.11.1 from lock file
npm ERR! Missing: acorn-import-assertions@1.8.0 from lock file
npm ERR! Missing: chrome-trace-event@1.0.3 from lock file
npm ERR! Missing: enhanced-resolve@5.12.0 from lock file
npm ERR! Missing: es-module-lexer@0.9.3 from lock file
npm ERR! Missing: events@3.3.0 from lock file
npm ERR! Missing: glob-to-regexp@0.4.1 from lock file
npm ERR! Missing: loader-runner@4.3.0 from lock file
npm ERR! Missing: schema-utils@3.1.1 from lock file
npm ERR! Missing: tapable@2.2.1 from lock file
npm ERR! Missing: terser-webpack-plugin@5.3.6 from lock file
npm ERR! Missing: watchpack@2.4.0 from lock file
npm ERR! Missing: webpack-sources@3.2.3 from lock file
npm ERR! Missing: @types/eslint@8.4.10 from lock file
npm ERR! Missing: @webassemblyjs/helper-numbers@1.11.1 from lock file
npm ERR! Missing: @webassemblyjs/helper-wasm-bytecode@1.11.1 from lock file
npm ERR! Missing: @webassemblyjs/floating-point-hex-parser@1.11.1 from lock file
npm ERR! Missing: @webassemblyjs/helper-api-error@1.11.1 from lock file
npm ERR! Missing: @xtuc/long@4.2.2 from lock file
npm ERR! Missing: @webassemblyjs/helper-buffer@1.11.1 from lock file
npm ERR! Missing: @webassemblyjs/helper-wasm-section@1.11.1 from lock file
npm ERR! Missing: @webassemblyjs/wasm-gen@1.11.1 from lock file
npm ERR! Missing: @webassemblyjs/wasm-opt@1.11.1 from lock file
npm ERR! Missing: @webassemblyjs/wast-printer@1.11.1 from lock file
npm ERR! Missing: @webassemblyjs/ieee754@1.11.1 from lock file
npm ERR! Missing: @webassemblyjs/leb128@1.11.1 from lock file
npm ERR! Missing: @webassemblyjs/utf8@1.11.1 from lock file
npm ERR! Missing: @xtuc/ieee754@1.2.0 from lock file
npm ERR! Missing: ajv-keywords@3.5.2 from lock file
npm ERR! Missing: jest-worker@27.5.1 from lock file
npm ERR! Missing: serialize-javascript@6.0.1 from lock file
npm ERR! Missing: terser@5.16.1 from lock file
npm ERR! Missing: randombytes@2.1.0 from lock file
npm ERR! Missing: @jridgewell/source-map@0.3.2 from lock file
npm ERR! Missing: commander@2.20.3 from lock file
npm ERR! Missing: source-map-support@0.5.21 from lock file
npm ERR! Missing: @jridgewell/gen-mapping@0.3.2 from lock file
npm ERR! Missing: supports-color@8.1.1 from lock file
npm ERR! Missing: has-flag@4.0.0 from lock file
npm ERR! Missing: source-map@0.6.1 from lock file
npm ERR! 
npm ERR! Clean install a project
npm ERR! 
npm ERR! Usage:
npm ERR! npm ci
npm ERR! 
npm ERR! Options:
npm ERR! [--no-audit] [--foreground-scripts] [--ignore-scripts]
npm ERR! [--script-shell <script-shell>]
npm ERR! 
npm ERR! aliases: clean-install, ic, install-clean, isntall-clean
npm ERR! 
npm ERR! Run "npm help ci" for more info

npm ERR! A complete log of this run can be found in:
npm ERR!     /cache/_logs/2023-01-19T13_38_55_516Z-debug-0.log
--- stdout ---

--- end ---
Traceback (most recent call last):
  File "/venv/lib/python3.9/site-packages/runner-0.1.0-py3.9.egg/runner/__init__.py", line 1400, in main
    libup.run(args.repo, args.output, args.branch)
  File "/venv/lib/python3.9/site-packages/runner-0.1.0-py3.9.egg/runner/__init__.py", line 1344, in run
    self.npm_audit_fix(new_npm_audit)
  File "/venv/lib/python3.9/site-packages/runner-0.1.0-py3.9.egg/runner/__init__.py", line 241, in npm_audit_fix
    self.check_call(['npm', 'ci'])
  File "/venv/lib/python3.9/site-packages/runner-0.1.0-py3.9.egg/runner/shell2.py", line 54, in check_call
    res.check_returncode()
  File "/usr/lib/python3.9/subprocess.py", line 460, in check_returncode
    raise CalledProcessError(self.returncode, self.args, self.stdout,
subprocess.CalledProcessError: Command '['/usr/bin/npm', 'ci']' returned non-zero exit status 1.
Source code is licensed under the AGPL.