Skip to content
Discussion options

You must be logged in to vote

Thanks for opening this issue @MattIPv4, I am actually surprised by the initial PR that was opened, because for security updates Dependabot's default behavior is to update to the lowest version that fixes the vulnerability, and that is compatible with the existing dependencies.

When I try to replay the update, that's also what I'm seeing:

    ± package.json
    ~~~
    19c19
    <     "node-fetch": "^2.6.1",
    ---
    >     "node-fetch": "^2.6.7",
    ~~~

I am not quite sure why an update was opened for v3.x 🤔 I will dig into things further, but this definitely isn't the default behavior.

Edit: Ok, I have a theory on what happened:

We use GitHub's advisory DB as the source of truth for…

Replies: 2 comments 2 replies

Comment options

You must be logged in to vote
1 reply
@jurre
Comment options

Answer selected by jurre
Comment options

You must be logged in to vote
1 reply
@jurre
Comment options

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Dependabot Automatically update dependencies to keep your project secure and up to date Code Security Build security into your GitHub workflow with features to keep your codebase secure Product Feedback Share your thoughts and suggestions on GitHub features and improvements
3 participants