Skip to content

chore(deps): update dependency stylelint to v15

5d890c0
Select commit
Loading
Failed to load commit list.
Open

chore(deps): update dependency stylelint to v15 #94

chore(deps): update dependency stylelint to v15
5d890c0
Select commit
Loading
Failed to load commit list.
Dev - Mend for GitHub.com / Mend Security Check succeeded Jul 1, 2025 in 6m 52s

Security Report

❗️Scan Incomplete: The scan completed with partial failure. The integration encountered issues with one or more projects in this repository, preventing their scan. The errors occurred in the following package managers: npm. Consequently, there may be gaps in the coverage of open-source dependencies used in the repository.

Scan Details Report

npm

/tmp/ws-scm/atom/script/package.json

Step Level Description Details
Preparing the project for scan ⚠Warn One or more of the installations failed Fail to run npm install:
code ERESOLVE
ERESOLVE could not resolve

While resolving: stylelint-config-standard@18.2.0
Found: stylelint@15.11.0
node_modules/stylelint
stylelint@"^15.0.0" from the root project

Could not resolve dependency:
peer stylelint@"^8.3.0

/tmp/ws-scm/atom/spec/fixtures/packages/package-with-broken-package-json/package.json

Step Level Description Details
Preparing the project for scan ⚠Warn One or more of the installations failed Fail to run npm install:
code EJSONPARSE
path /tmp/ws-scm/atom/spec/fixtures/packages/package-with-broken-package-json/package.json
JSON.parse Unexpected token "I" (0x49), "INVALID
JSON.parse " is not valid JSON while parsing 'INVALID
JSON.parse '
JSON.parse Failed to parse JSON data.
JSON.parse Note: package.json must be actual JSON, not just JavaScript.
Resolving the project ❌Error Failure to perform the resolution operation due to an issue parsing a file Invalid package.json file: /tmp/ws-scm/atom/spec/fixtures/packages/package-with-broken-package-json/package.json

✔️ 👍 You have successfully remediated 39 vulnerabilities in this branch:
Vulnerability Vulnerable Library
GHSA-xf5p-87ch-gxw2 marked-0.5.2.tgz
GHSA-8x6c-cv3v-vp6g cacheable-request-6.1.0.tgz
CVE-2020-7608 yargs-parser-10.1.0.tgz
GHSA-2pr6-76vf-7546 js-yaml-3.6.1.tgz
GHSA-6chw-6frg-f759 acorn-5.7.3.tgz
CVE-2022-25881 http-cache-semantics-4.1.0.tgz
GHSA-7fhm-mqm4-2wp7 minimist-1.1.3.tgz
CVE-2020-7598 minimist-1.1.3.tgz
CVE-2020-15366 ajv-6.5.2.tgz
CVE-2019-10747 set-value-0.4.3.tgz
CVE-2020-8116 dot-prop-4.2.0.tgz
GHSA-35jh-r3h4-6jhm lodash-4.17.10.tgz
GHSA-35jh-r3h4-6jhm lodash-4.17.15.tgz
CVE-2021-23382 postcss-5.2.18.tgz
GHSA-7fhm-mqm4-2wp7 minimist-0.0.8.tgz
CVE-2021-33623 trim-newlines-2.0.0.tgz
GHSA-f7xj-rg7h-mc87 stylelint-9.3.0.tgz
GHSA-35jh-r3h4-6jhm lodash-4.17.11.tgz
CVE-2020-7753 trim-0.0.1.tgz
CVE-2021-44906 minimist-1.1.3.tgz
GHSA-8x6c-cv3v-vp6g cacheable-request-2.1.4.tgz
CVE-2019-10747 set-value-2.0.0.tgz
GHSA-ch52-vgq2-943f marked-0.5.2.tgz
GHSA-7m7q-q53v-j47v marked-0.5.2.tgz
CVE-2021-23382 postcss-6.0.23.tgz
GHSA-8x6c-cv3v-vp6g cacheable-request-7.0.2.tgz
GHSA-8j8c-7jfh-h6hx js-yaml-3.6.1.tgz
GHSA-mjjq-c88q-qhr6 dompurify-1.0.11.tgz
GHSA-g2q5-5433-rhrf rc-1.2.8.tgz
CVE-2024-4068 braces-2.3.2.tgz
GHSA-7fhm-mqm4-2wp7 acorn-5.7.3.tgz
GHSA-7fhm-mqm4-2wp7 minimist-1.2.0.tgz
CVE-2021-23382 postcss-6.0.22.tgz
GHSA-g95f-p29q-9xw4 braces-1.8.5.tgz
GHSA-7fhm-mqm4-2wp7 minimist-0.0.10.tgz
GHSA-7wwv-vh3v-89cq highlight.js-9.16.2.tgz
CVE-2020-28469 glob-parent-3.1.0.tgz
GHSA-xf5p-87ch-gxw2 marked-0.3.19.tgz
GHSA-ch52-vgq2-943f marked-0.6.3.tgz

Base branch total remaining vulnerabilities: 193
Base branch commit: 111be51ad09d6ecd1ba1d3c039919062b3ebda69


Total libraries scanned: 2150

Scan token: 11d4cacf2b534112a69326ab19388fbe