-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerability in crypto-browserify #1602
Comments
@KurtPattyn The browser SDK does use crypto-browserify, but only for calculating SHA256 and MD5 hashes, which don't use random number generators. The only place where Unfortunately upgrading the version of crypto-browserify adds significant bloat to the SDK. We are looking to address this in the future. |
@chrisradek Thx. Need a way then to blacklist the module from the scanner and to avoid the use of the AWS SDK in browser environments. |
@chrisradek Another reason to move to a more recent version is the fact that |
related to this topic - there's no reason to even install (depend on) crypto-browserify, if the intention is to use |
This thread has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs and link to relevant comments in this thread. |
AWS SDK Version 2.77.0
The AWS NodeJS SDK uses crypto-browserify v1.0.9 (current version is 3.11.0) which has two known vulnerabilities.
This report was generated using owdit (https://github.com/KurtPattyn/owdit) which fetches vulnerabilities from OSSIndex (https://ossindex.net/start/npm/).
The text was updated successfully, but these errors were encountered: