-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
"monorepo-symlink-test" dependencies malicious #5669
Comments
Have seen same issue on AWS Inspector showing this CVE when using latest PM2 |
Exactly the same happening to me, AWS says to terminate :( |
I submitted issue ticket for this directly w/ resolve project: |
It's a false positive; if AWS inspector is showing you this then I would seriously discourage relying on it, since keying on the "name" field of a package.json gives you zero signal about whether files are malicious or not. |
Hmm it looks someone created this public repo which was originally infected, and your is private. Not only AWS but Google's scanner flagged this. |
The package.json inside |
the information in AWS scanner is somehow misleading. We managed to fix this vulnerability by removing the "read-installed" dependency from your prod container, which was part of the "licence-checker" lib, and that happened to the fix this issue in "resolve" package |
This is your response to every scanning tool that flags this. I think the idea is to search for known malicious packages in the most obvious place to look. One false positive does not invalidate several scanning tools. You're picking a strange hill to die on when you could simply rename it and stop having people open endless duplicate tickets. You do you though. |
@whyayala yes, that's because it's the correct response. Any false positives drastically reduce the value of a tool, because noise undermines user trust in the system. It would be far better to have false negatives than to ever have false positives. |
Both reduce value, but a false negative is far more damning to a tools value than a false positive. Especially when you are scanning for security vulnerabilities. A false negative is an attack vector, a false positive is an inconvenience. For anyone having this issue, another way to remediate it is with a post install script to remove the You can either add this line to your package.json file |
That’s not a solution; you just need to update your lockfile, and stop using any broken tools that complain about this. |
when we install pm2 it also install 5 level dependency ""monorepo-symlink-test"" which is known as malicious.
steps:
install pm2 globally
use any sca scanner in project directory or
check /usr/local/lib/node_modules/pm2/node_modules/resolve/test/resolver/multirepo/package.json
you can see "monorepo-symlink-test" there which is malicious on synk website
The text was updated successfully, but these errors were encountered: