chore(deps): update dependency stylelint to v15 #94
Dev - Mend for GitHub.com / Mend Security Check
succeeded
Jul 1, 2025 in 6m 52s
Security Report
❗️Scan Incomplete: The scan completed with partial failure. The integration encountered issues with one or more projects in this repository, preventing their scan. The errors occurred in the following package managers: npm. Consequently, there may be gaps in the coverage of open-source dependencies used in the repository.
Scan Details Report
npm
/tmp/ws-scm/atom/script/package.json
| Step | Level | Description | Details |
|---|---|---|---|
| Preparing the project for scan | ⚠Warn | One or more of the installations failed | Fail to run npm install: code ERESOLVE ERESOLVE could not resolve While resolving: stylelint-config-standard@18.2.0 Found: stylelint@15.11.0 node_modules/stylelint stylelint@"^15.0.0" from the root project Could not resolve dependency: peer stylelint@"^8.3.0 |
/tmp/ws-scm/atom/spec/fixtures/packages/package-with-broken-package-json/package.json
| Step | Level | Description | Details |
|---|---|---|---|
| Preparing the project for scan | ⚠Warn | One or more of the installations failed | Fail to run npm install: code EJSONPARSE path /tmp/ws-scm/atom/spec/fixtures/packages/package-with-broken-package-json/package.json JSON.parse Unexpected token "I" (0x49), "INVALID JSON.parse " is not valid JSON while parsing 'INVALID JSON.parse ' JSON.parse Failed to parse JSON data. JSON.parse Note: package.json must be actual JSON, not just JavaScript. |
| Resolving the project | ❌Error | Failure to perform the resolution operation due to an issue parsing a file | Invalid package.json file: /tmp/ws-scm/atom/spec/fixtures/packages/package-with-broken-package-json/package.json |
✔️ 👍 You have successfully remediated 39 vulnerabilities in this branch:
| Vulnerability | Vulnerable Library |
|---|---|
| GHSA-xf5p-87ch-gxw2 | marked-0.5.2.tgz |
| GHSA-8x6c-cv3v-vp6g | cacheable-request-6.1.0.tgz |
| CVE-2020-7608 | yargs-parser-10.1.0.tgz |
| GHSA-2pr6-76vf-7546 | js-yaml-3.6.1.tgz |
| GHSA-6chw-6frg-f759 | acorn-5.7.3.tgz |
| CVE-2022-25881 | http-cache-semantics-4.1.0.tgz |
| GHSA-7fhm-mqm4-2wp7 | minimist-1.1.3.tgz |
| CVE-2020-7598 | minimist-1.1.3.tgz |
| CVE-2020-15366 | ajv-6.5.2.tgz |
| CVE-2019-10747 | set-value-0.4.3.tgz |
| CVE-2020-8116 | dot-prop-4.2.0.tgz |
| GHSA-35jh-r3h4-6jhm | lodash-4.17.10.tgz |
| GHSA-35jh-r3h4-6jhm | lodash-4.17.15.tgz |
| CVE-2021-23382 | postcss-5.2.18.tgz |
| GHSA-7fhm-mqm4-2wp7 | minimist-0.0.8.tgz |
| CVE-2021-33623 | trim-newlines-2.0.0.tgz |
| GHSA-f7xj-rg7h-mc87 | stylelint-9.3.0.tgz |
| GHSA-35jh-r3h4-6jhm | lodash-4.17.11.tgz |
| CVE-2020-7753 | trim-0.0.1.tgz |
| CVE-2021-44906 | minimist-1.1.3.tgz |
| GHSA-8x6c-cv3v-vp6g | cacheable-request-2.1.4.tgz |
| CVE-2019-10747 | set-value-2.0.0.tgz |
| GHSA-ch52-vgq2-943f | marked-0.5.2.tgz |
| GHSA-7m7q-q53v-j47v | marked-0.5.2.tgz |
| CVE-2021-23382 | postcss-6.0.23.tgz |
| GHSA-8x6c-cv3v-vp6g | cacheable-request-7.0.2.tgz |
| GHSA-8j8c-7jfh-h6hx | js-yaml-3.6.1.tgz |
| GHSA-mjjq-c88q-qhr6 | dompurify-1.0.11.tgz |
| GHSA-g2q5-5433-rhrf | rc-1.2.8.tgz |
| CVE-2024-4068 | braces-2.3.2.tgz |
| GHSA-7fhm-mqm4-2wp7 | acorn-5.7.3.tgz |
| GHSA-7fhm-mqm4-2wp7 | minimist-1.2.0.tgz |
| CVE-2021-23382 | postcss-6.0.22.tgz |
| GHSA-g95f-p29q-9xw4 | braces-1.8.5.tgz |
| GHSA-7fhm-mqm4-2wp7 | minimist-0.0.10.tgz |
| GHSA-7wwv-vh3v-89cq | highlight.js-9.16.2.tgz |
| CVE-2020-28469 | glob-parent-3.1.0.tgz |
| GHSA-xf5p-87ch-gxw2 | marked-0.3.19.tgz |
| GHSA-ch52-vgq2-943f | marked-0.6.3.tgz |
Base branch total remaining vulnerabilities: 193
Base branch commit: 111be51ad09d6ecd1ba1d3c039919062b3ebda69
Total libraries scanned: 2150
Scan token: 11d4cacf2b534112a69326ab19388fbe
Loading