Skip to content

Dependencies

Kinsend.io is based on Open Source software and uses a number of dependencies. These dependencies are managed using npm and are listed in the package.json files of the respective repositories.

We should aim to keep these dependencies up-to-date and to fix any identified vulnerabilities with priority.

List of Dependencies

Vulnerabilities in Dependencies

Vulnerabilities in dependencies should be tracked and fixed as soon as possible.

When you build the code using npm install, the npm audit command will be run automatically and will report any vulnerabilities it finds. You can also run npm audit manually at any time.

If your changes introduce new vulnerabilities, you will see a warning when you run npm install:

found 1 vulnerability (1 low) in 1 scanned package
  1 vulnerability requires manual review. See the full report for details.

You can then run npm audit to see the details of the vulnerability and how to fix it.

Dependency Updates Via @dependabot

We use Dependabot to automatically update dependencies. Dependabot will create a pull request with the updated dependency and will run the tests.

If such automated pull requests are created and look good, they should be reviewed and merged as soon as possible, as we don't want to accumulate technical debt for this.