@commitlint/cli versions 3.0.2 and 3.0.1 are both command-line interface tools designed to lint commit messages, ensuring they adhere to established conventions. This promotes a cleaner project history and facilitates automated analysis. Examining the differences reveals subtle but important updates for developers.
Version 3.0.2, released shortly after 3.0.1 on July 11, 2017, includes a dependency @commitlint/core at version 3.0.2. This suggests a corresponding update in the core linting logic and rules upon which the CLI relies. Additionally, @commitlint/utils has been bumped from version 3.0.0 to 3.0.2 in the devDependencies, possibly indicating improvements or bug fixes in the utility functions used during development and testing of the CLI itself.
Developers upgrading to 3.0.2 should be aware that the core linting rules and development utilities have been updated. While the primary dependencies like meow, chalk, lodash, get-stdin, and babel-polyfill remain consistent, the changes in core and utils could impact the linting behavior or development workflow. It's recommended to review the changelogs for @commitlint/core and @commitlint/utils version 3.0.2 to understand specific changes and potential compatibility considerations before upgrading. These tools help developers set up commitlint quickly and ensure their commit message conventions align with project standards and team preferences.
All the vulnerabilities related to the version 3.0.2 of the package
Uncontrolled Resource Consumption in trim-newlines
@rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end()
method.
Command Injection in lodash
lodash
versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
dot-prop Prototype Pollution vulnerability
Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.