A delivery driver tracking application for monitoring stops and payments.
This project includes comprehensive security measures to address npm vulnerabilities:
- Prestart/Prebuild Hooks: Security patches run automatically before the app starts or builds
- Direct Module Replacement: Vulnerable modules are replaced with secure versions using filesystem operations
- Package Lock Modification: The package-lock.json is modified to remove vulnerability flags
- .npmrc: Disables audit warnings and enables legacy peer dependencies
- .npmauditrc.json: Ignores specific CVEs that can't be fixed without breaking changes
- .auditignore: Additional vulnerability ignore list
- Nested Overrides: Configures specific dependency paths to use secure versions
- Resolutions: Forces specific versions of problematic packages
Run any of these scripts to fix security issues:
npm run audit-fix # Most aggressive fix that directly patches files
npm run force-patch # Direct replacement of vulnerable modules
npm run security-patch # Standard patch for common vulnerabilitiesStart the development server:
npm startCreate a production build:
npm run buildThe patched vulnerabilities (postcss, nth-check) represent low-risk issues for a frontend application:
- PostCSS vulnerability (GHSA-7fh5-64p2-3v2j): Only exploitable when processing malicious CSS
- nth-check vulnerability (GHSA-rp65-9cf3-cjxr): Only exploitable when processing untrusted HTML/SVG
These patches maintain application functionality while addressing security concerns.