Conversation
|
Hey! Changelogs info seems to be missing or might be in incorrect format. |
|
Unable to locate .performanceTestingBot config file |
|
This PR has Quantification details
Why proper sizing of changes matters
Optimal pull request sizes drive a better predictable PR flow as they strike a
What can I do to optimize my changes
How to interpret the change counts in git diff output
Was this comment helpful? 👍 :ok_hand: :thumbsdown: (Email) |
There was a problem hiding this comment.
Mergebase Code Green
Updated Vulnerability Report
The report below shows the state of the repository after the pull request.
Critical
| Vulnerability | Dependency | Source Path |
|---|---|---|
| CVE-2019-10744 | npm:lodash.defaults:4.2.0 | package-lock.json |
| CVE-2021-26707 | npm:merge-deep:3.0.2 | package-lock.json |
Extra High
| Vulnerability | Dependency | Source Path |
|---|---|---|
| CVE-2020-8265 | npm:@types/node:14.10.0 | package-lock.json |
High
| Vulnerability | Dependency | Source Path |
|---|---|---|
| CVE-2021-33502 | npm:@sindresorhus/is:0.14.0 | package-lock.json |
| CVE-2021-33502 | npm:@sindresorhus/is:2.1.1 | package-lock.json |
| CVE-2021-33502 | npm:@szmarczak/http-timer:1.1.2 | package-lock.json |
| CVE-2021-33502 | npm:@szmarczak/http-timer:4.0.5 | package-lock.json |
| CVE-2021-33502 | npm:@types/cacheable-request:6.0.1 | package-lock.json |
| CVE-2021-33502 | npm:@types/http-cache-semantics:4.0.0 | package-lock.json |
| CVE-2021-33502 | npm:@types/keyv:3.1.1 | package-lock.json |
| CVE-2021-22884, CVE-2021-22883, CVE-2020-8277, CVE-2020-8252, CVE-2020-8251, CVE-2020-8201 | npm:@types/node:14.10.0 | package-lock.json |
| CVE-2021-33502 | npm:@types/responselike:1.0.0 | package-lock.json |
| CVE-2021-33502 | npm:cacheable-lookup:2.0.1 | package-lock.json |
| CVE-2021-33502 | npm:cacheable-request:6.1.0 | package-lock.json |
| CVE-2021-33502 | npm:cacheable-request:7.0.1 | package-lock.json |
| CVE-2021-33502 | npm:clone-response:1.0.2 | package-lock.json |
| CVE-2021-33502 | npm:defer-to-connect:1.1.3 | package-lock.json |
| CVE-2021-33502 | npm:defer-to-connect:2.0.0 | package-lock.json |
| CVE-2020-28469 | npm:glob-parent:3.1.0 | package-lock.json |
| CVE-2020-28469 | npm:glob-parent:5.1.0 | package-lock.json |
| CVE-2020-28469 | npm:glob-parent:5.1.1 | package-lock.json |
| CVE-2021-33502 | npm:got:10.7.0 | package-lock.json |
| CVE-2021-33502 | npm:got:9.6.0 | package-lock.json |
| CVE-2021-33502 | npm:http-cache-semantics:4.0.3 | package-lock.json |
| CVE-2021-33502 | npm:keyv:3.1.0 | package-lock.json |
| CVE-2021-33502 | npm:keyv:4.0.1 | package-lock.json |
| CVE-2019-20149 | npm:kind-of:2.0.1 | package-lock.json |
| CVE-2019-20149 | npm:kind-of:3.2.2 | package-lock.json |
| CVE-2019-20149 | npm:kind-of:4.0.0 | package-lock.json |
| CVE-2019-20149 | npm:kind-of:5.1.0 | package-lock.json |
| CVE-2021-23337 | npm:lodash.assignin:4.2.0 | package-lock.json |
| CVE-2021-23337 | npm:lodash.bind:4.2.1 | package-lock.json |
| CVE-2021-23337 | npm:lodash.defaults:4.2.0 | package-lock.json |
| CVE-2021-23337 | npm:lodash.filter:4.6.0 | package-lock.json |
| CVE-2021-23337 | npm:lodash.flatten:4.4.0 | package-lock.json |
| CVE-2021-23337 | npm:lodash.foreach:4.5.0 | package-lock.json |
| CVE-2021-23337 | npm:lodash.get:4.4.2 | package-lock.json |
| CVE-2021-23337 | npm:lodash.map:4.6.0 | package-lock.json |
| CVE-2021-23337 | npm:lodash.merge:4.6.2 | package-lock.json |
| CVE-2021-23337 | npm:lodash.pick:4.4.0 | package-lock.json |
| CVE-2021-23337 | npm:lodash.reduce:4.6.0 | package-lock.json |
| CVE-2021-23337 | npm:lodash.reject:4.6.0 | package-lock.json |
| CVE-2021-23337 | npm:lodash.set:4.3.2 | package-lock.json |
| CVE-2021-23337 | npm:lodash.some:4.6.0 | package-lock.json |
| CVE-2021-23337 | npm:lodash.sortby:4.7.0 | package-lock.json |
| CVE-2021-23337 | npm:lodash.uniq:4.5.0 | package-lock.json |
| CVE-2021-23337 | npm:lodash:4.17.20 | package-lock.json |
| CVE-2021-21306 | npm:marked:1.2.9 | package-lock.json |
| CVE-2021-33502 | npm:normalize-url:1.9.1 | package-lock.json |
| CVE-2021-33502 | npm:normalize-url:4.2.0 | package-lock.json |
| CVE-2021-29469 | npm:redis-commands:1.6.0 | package-lock.json |
| CVE-2021-29469 | npm:redis-errors:1.2.0 | package-lock.json |
| CVE-2021-29469 | npm:redis-parser:3.0.0 | package-lock.json |
| CVE-2021-29469 | npm:redis:3.0.2 | package-lock.json |
| CVE-2021-33502 | npm:responselike:1.0.2 | package-lock.json |
| CVE-2021-33502 | npm:responselike:2.0.0 | package-lock.json |
| CVE-2021-27290 | npm:ssri:6.0.1 | package-lock.json |
| CVE-2021-27290 | npm:ssri:8.0.0 | package-lock.json |
| CVE-2018-7408 | npm:tar:4.4.13 | package-lock.json |
| CVE-2017-15010 | npm:tough-cookie:2.4.3 | package-lock.json |
| CVE-2020-7774 | npm:y18n:4.0.0 | package-lock.json |
Medium
| Vulnerability | Dependency | Source Path |
|---|---|---|
| CVE-2020-7598 | npm:@types/minimist:1.2.1 | package-lock.json |
| CVE-2020-8287 | npm:@types/node:14.10.0 | package-lock.json |
| CVE-2020-7608 | npm:@types/yargs-parser:13.1.0 | package-lock.json |
| CVE-2020-15366 | npm:ajv:6.11.0 | package-lock.json |
| CVE-2020-8244 | npm:bl:4.0.3 | package-lock.json |
| CVE-2021-23364 | npm:browserslist:4.16.3 | package-lock.json |
| CVE-2021-23382 | npm:colorette:1.2.1 | package-lock.json |
| CVE-2020-28498 | npm:elliptic:6.5.3 | package-lock.json |
| CVE-2021-23362 | npm:hosted-git-info:2.7.1 | package-lock.json |
| CVE-2020-28500 | npm:lodash.assignin:4.2.0 | package-lock.json |
| CVE-2020-28500 | npm:lodash.bind:4.2.1 | package-lock.json |
| CVE-2020-28500, CVE-2018-3721, CVE-2018-16487 | npm:lodash.defaults:4.2.0 | package-lock.json |
| CVE-2020-28500 | npm:lodash.filter:4.6.0 | package-lock.json |
| CVE-2020-28500 | npm:lodash.flatten:4.4.0 | package-lock.json |
| CVE-2020-28500 | npm:lodash.foreach:4.5.0 | package-lock.json |
| CVE-2020-28500 | npm:lodash.get:4.4.2 | package-lock.json |
| CVE-2020-28500 | npm:lodash.map:4.6.0 | package-lock.json |
| CVE-2020-28500 | npm:lodash.merge:4.6.2 | package-lock.json |
| CVE-2020-28500 | npm:lodash.pick:4.4.0 | package-lock.json |
| CVE-2020-28500 | npm:lodash.reduce:4.6.0 | package-lock.json |
| CVE-2020-28500 | npm:lodash.reject:4.6.0 | package-lock.json |
| CVE-2020-28500 | npm:lodash.set:4.3.2 | package-lock.json |
| CVE-2020-28500 | npm:lodash.some:4.6.0 | package-lock.json |
| CVE-2020-28500 | npm:lodash.sortby:4.7.0 | package-lock.json |
| CVE-2020-28500 | npm:lodash.uniq:4.5.0 | package-lock.json |
| CVE-2020-28500 | npm:lodash:4.17.20 | package-lock.json |
| CVE-2021-23382, CVE-2021-23368 | npm:postcss:7.0.21 | package-lock.json |
| CVE-2021-23382, CVE-2021-23368 | npm:postcss:7.0.35 | package-lock.json |
| CVE-2018-6341 | npm:scheduler:0.20.1 | package-lock.json |
| CVE-2021-32640 | npm:ws:6.2.1 | package-lock.json |
| CVE-2021-32640 | npm:ws:7.2.5 | package-lock.json |
Low
| Vulnerability | Dependency | Source Path |
|---|---|---|
| CVE-2013-7035 | npm:react-dom:17.0.1 | package-lock.json |
| CVE-2013-7035 | npm:react-is:16.13.1 | package-lock.json |
| CVE-2013-7035 | npm:react:17.0.1 | package-lock.json |
| CVE-2013-7035 | npm:scheduler:0.20.1 | package-lock.json |
|
Pull request analysis by VIZIPI Below you will find who is the most qualified team member to review your code. No other active qualified developers found to review these specific changes. You might consider involving more team members with these code segments. Potential missing files from this Pull requestNo files found with a 40% threashold :) Committed file ranks(click to expand)0.00%[.thoth.yaml] |
Automatic configuration initialization
The Kebechet app was installed on this repository but no configuration was
found. This PR contains basic configuration of runtime environments and
managers.