serverless-step-functions
serverless-step-functions copied to clipboard
Upgrade @serverless/utils package to address vulnerable [email protected]
This is a Feature Proposal
Description
Currently, the @serverless/utils package is using [email protected], which has been identified as vulnerable to malicious regular expressions. This vulnerability could potentially lead to security issues in our project. To ensure the security and stability of our project, I propose upgrading the @serverless/utils package to a more recent and secure version.
Proposed Solution To address the vulnerability, we should upgrade the @serverless/utils package to a version that no longer relies on [email protected]. It is essential to take this step to safeguard the project and its users from any potential security threats.
Additional Context The vulnerability in [email protected] has been documented and discussed in detail in the following link: Vulnerability Explanation.
By upgrading the @serverless/utils package, we can prevent potential attackers from exploiting this vulnerability, ensuring a more secure and reliable experience for users.
Thank you.