Skip to content

Conversation

@bmalumphy
Copy link
Contributor

No description provided.

@github-actions
Copy link
Contributor

🟢 Test Coverage Report - sdks/js/DittoChatCore

Overall Coverage: 92.42%

Metric Coverage Status
🟢 Lines 93.78% green
🟢 Statements 93.78% green
🟢 Functions 95.83% green
🟢 Branches 86.31% green

📊 View Detailed Coverage Report

ℹ️ Coverage Thresholds
  • 🟢 Excellent (≥ 80%)
  • 🟡 Good (60-79%)
  • 🟠 Fair (40-59%)
  • 🔴 Poor (< 40%)

@github-actions
Copy link
Contributor

🟢 Test Coverage Report - sdks/js/DittoChatUI

Overall Coverage: 91.11%

Metric Coverage Status
🟢 Lines 92.53% green
🟢 Statements 92.53% green
🟢 Functions 90.56% green
🟢 Branches 88.8% green

📊 View Detailed Coverage Report

ℹ️ Coverage Thresholds
  • 🟢 Excellent (≥ 80%)
  • 🟡 Good (60-79%)
  • 🟠 Fair (40-59%)
  • 🔴 Poor (< 40%)

@github-actions
Copy link
Contributor

⚠️ OWASP Dependency Check - sdks/js/DittoChatCore

Medium severity vulnerabilities detected

Severity Count
🔴 Critical 0
🟠 High 0
🟡 Medium 1
🔵 Low 0
Total 1

📋 Vulnerability Details

  • CVE-2025-64718 (MEDIUM) in js-yaml:3.14.2
    • Description: js-yaml is a JavaScript YAML parser and dumper. In js-yaml 4.1.0 and below, it's possible for an attacker to modify the prototype of the result of a parsed yaml document via prototype pollution ( proto ). All users who parse untrusted yaml documents may be impacted. The problem is patched in js-yaml 4.1.1. Users can protect against this kind of attack on the server by using node --disable-proto=delete or deno (in Deno, pollution protection is on by default).
    • CVSS: 5.3

📊 View Full HTML Report

ℹ️ How to fix vulnerabilities
  1. Update vulnerable dependencies to patched versions
  2. Run npm audit fix or npm audit fix --force
  3. Check for alternative packages if updates aren't available
  4. Review and update your package.json and package-lock.json

private val gson: Gson,
private val usersCollection: String,
private val chatRetentionPolicy: ChatRetentionPolicy
private val gson: Gson = Gson(),
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

do we want to be using GSON. I think we are using kotlin serialization for forge? Just a question not sure which is the right direction

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@shamari-ditto can confirm but I can make it to where we use w/e. This was just what we used historically. Not difficult to change.

@github-actions
Copy link
Contributor

⚠️ OWASP Dependency Check - sdks/js/DittoChatUI

Medium severity vulnerabilities detected

Severity Count
🔴 Critical 0
🟠 High 0
🟡 Medium 1
🔵 Low 0
Total 1

📋 Vulnerability Details

  • CVE-2025-64718 (MEDIUM) in js-yaml:3.14.2
    • Description: js-yaml is a JavaScript YAML parser and dumper. In js-yaml 4.1.0 and below, it's possible for an attacker to modify the prototype of the result of a parsed yaml document via prototype pollution ( proto ). All users who parse untrusted yaml documents may be impacted. The problem is patched in js-yaml 4.1.1. Users can protect against this kind of attack on the server by using node --disable-proto=delete or deno (in Deno, pollution protection is on by default).
    • CVSS: 5.3

📊 View Full HTML Report

ℹ️ How to fix vulnerabilities
  1. Update vulnerable dependencies to patched versions
  2. Run npm audit fix or npm audit fix --force
  3. Check for alternative packages if updates aren't available
  4. Review and update your package.json and package-lock.json

…om:getditto/DittoChatPackage into feature/APP-951-New-Architecture-for-Ditto
@github-actions
Copy link
Contributor

github-actions bot commented Dec 15, 2025

🟢 Test Coverage Report - @dittolive/ditto-chat-core

Overall Coverage: 88.31%

Metric Coverage Status
🟢 Lines 87.35% green
🟢 Statements 87.35% green
🟢 Functions 92.45% green
🟢 Branches 86.1% green

📊 View Detailed Coverage Report

ℹ️ Coverage Thresholds
  • 🟢 Excellent (≥ 80%)
  • 🟡 Good (60-79%)
  • 🟠 Fair (40-59%)
  • 🔴 Poor (< 40%)

@github-actions
Copy link
Contributor

github-actions bot commented Dec 15, 2025

🟢 Test Coverage Report - @dittolive/ditto-chat-ui

Overall Coverage: 89.68%

Metric Coverage Status
🟢 Lines 92.05% green
🟢 Statements 92.05% green
🟢 Functions 85.98% green
🟢 Branches 88.64% green

📊 View Detailed Coverage Report

ℹ️ Coverage Thresholds
  • 🟢 Excellent (≥ 80%)
  • 🟡 Good (60-79%)
  • 🟠 Fair (40-59%)
  • 🔴 Poor (< 40%)

@github-actions
Copy link
Contributor

github-actions bot commented Dec 15, 2025

⚠️ OWASP Dependency Check - @dittolive/ditto-chat-core

Medium severity vulnerabilities detected

Severity Count
🔴 Critical 0
🟠 High 0
🟡 Medium 1
🔵 Low 0
Total 1

📋 Vulnerability Details

  • CVE-2025-64718 (MEDIUM) in js-yaml:3.14.2
    • Description: js-yaml is a JavaScript YAML parser and dumper. In js-yaml 4.1.0 and below, it's possible for an attacker to modify the prototype of the result of a parsed yaml document via prototype pollution ( proto ). All users who parse untrusted yaml documents may be impacted. The problem is patched in js-yaml 4.1.1. Users can protect against this kind of attack on the server by using node --disable-proto=delete or deno (in Deno, pollution protection is on by default).
    • CVSS: 5.3

📊 View Full HTML Report

ℹ️ How to fix vulnerabilities
  1. Update vulnerable dependencies to patched versions
  2. Run npm audit fix or npm audit fix --force in the root directory
  3. Check for alternative packages if updates aren't available
  4. Review and update your package.json and package-lock.json

@github-actions
Copy link
Contributor

github-actions bot commented Dec 15, 2025

⚠️ OWASP Dependency Check - @dittolive/ditto-chat-ui

Medium severity vulnerabilities detected

Severity Count
🔴 Critical 0
🟠 High 0
🟡 Medium 1
🔵 Low 0
Total 1

📋 Vulnerability Details

  • CVE-2025-64718 (MEDIUM) in js-yaml:3.14.2
    • Description: js-yaml is a JavaScript YAML parser and dumper. In js-yaml 4.1.0 and below, it's possible for an attacker to modify the prototype of the result of a parsed yaml document via prototype pollution ( proto ). All users who parse untrusted yaml documents may be impacted. The problem is patched in js-yaml 4.1.1. Users can protect against this kind of attack on the server by using node --disable-proto=delete or deno (in Deno, pollution protection is on by default).
    • CVSS: 5.3

📊 View Full HTML Report

ℹ️ How to fix vulnerabilities
  1. Update vulnerable dependencies to patched versions
  2. Run npm audit fix or npm audit fix --force in the root directory
  3. Check for alternative packages if updates aren't available
  4. Review and update your package.json and package-lock.json

@ErikEverson
Copy link
Collaborator

ErikEverson commented Dec 18, 2025

@bmalumphy Might just see if there are new version of some of the stuff in the web library so we can remove the CVE's
Update: NVM #88 fixes this already so don't worry about it

@bmalumphy bmalumphy merged commit 386ecc2 into main Jan 5, 2026
5 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants