This site uses cookies for analytics. By continuing to browse this site, you agree to this use.
A JS Foundation Project

No vulnerable libraries

No vulnerable libraries (no-vulnerable-javascript-libraries)

no-vulnerable-javascript-libraries checks for known vulnerabilities within client-side JavaScript libraries and frameworks detected on a web site.

webhint uses Snyk’s Vulnerability DB to lookup known vulnerabilities.

Why is this important?

Making sure your website dependencies are free of known vulnerabilities is important in preventing malicious attacks such as cross-site scripting attacks that can be used to compromise web site information.

What does the hint check?

This hint uses Snyk’s Vulnerability DB and js-library-detector to check if the website is running a vulnerable version of a client-side JavaScript library or framework.

The vulnerability database is updated automatically from Snyk if the cached content is older than 24h.

Can the hint be configured?

You can configure the minimum severity to report in the .hintrc file:

{
"connector": {...},
"formatters": [...],
"hints": {
"no-vulnerable-javascript-libraries": ["error", {
"severity": "low|medium|high"
}],
...
},
...
}

The severity possible values are: low (default), medium, and high.

If you configure this hint to high, and webhint only finds low or medium vulnerabilities, no issues will be raised.

How to use this hint?

To use it you will have to install it via npm:

npm install @hint/hint-no-vulnerable-javascript-libraries

Note: You can make npm install it as a devDependency using the --save-dev parameter, or to install it globally, you can use the -g parameter. For other options see npm's documentation.

And then activate it via the .hintrc configuration file:

{
"connector": {...},
"formatters": [...],
"hints": {
"no-vulnerable-javascript-libraries": "error",
...
},
"parsers": [...],
...
}

Further Reading