-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Investigate @samrum/vite-plugin-web-extension #3
Comments
Vite is using Rollup bundler under the hood and has better DX than Webpack. |
Installation looks good to me. $ npm init @samrum/vite-plugin-web-extension@latest
@samrum/create-vite-plugin-web-extension
✔ Project name: … drhgsim
✔ Manifest version: › Manifest V2 & v3
✔ Framework: › Svelte
✔ Add TypeScript? › Yes
Scaffolding project in /home/vintprox/drhgsim...
Done. Now run:
cd drhgsim
npm install
npm run build
npm run serve:chrome
Refer to the README.md file in your project for more usage notes I would really love the combination of Svelte and TypeScript in here. |
Results of vulnerability audit: $ npm audit
# npm audit report
async <2.6.4
Severity: high
Prototype Pollution in async - https://github.com/advisories/GHSA-fwr7-v2mv-hh25
fix available via `npm audit fix --force`
Will install [email protected], which is a breaking change
node_modules/async
@devicefarmer/adbkit-monkey *
Depends on vulnerable versions of async
node_modules/@devicefarmer/adbkit-monkey
@devicefarmer/adbkit *
Depends on vulnerable versions of @devicefarmer/adbkit-monkey
Depends on vulnerable versions of node-forge
node_modules/@devicefarmer/adbkit
web-ext >=5.2.0
Depends on vulnerable versions of @devicefarmer/adbkit
node_modules/web-ext
node-forge <=1.2.1
Severity: high
Open Redirect in node-forge - https://github.com/advisories/GHSA-8fr3-hfg3-gpgp
Prototype Pollution in node-forge debug API. - https://github.com/advisories/GHSA-5rrq-pxf6-6jx5
URL parsing in node-forge could lead to undesired behavior. - https://github.com/advisories/GHSA-gf8q-jrpm-jvxq
Improper Verification of Cryptographic Signature in `node-forge` - https://github.com/advisories/GHSA-2r2c-g63r-vccr
Improper Verification of Cryptographic Signature in node-forge - https://github.com/advisories/GHSA-x4jg-mjrx-434g
Improper Verification of Cryptographic Signature in node-forge - https://github.com/advisories/GHSA-cfm4-qjh2-4765
fix available via `npm audit fix --force`
Will install [email protected], which is a breaking change
node_modules/node-forge
5 vulnerabilities (1 moderate, 4 high)
To address all issues (including breaking changes), run:
npm audit fix --force 2 packages here are installed through the outdated dependency chain. Here's the tree of things depending on old versions of $ npm list async
[email protected] /home/vintprox/rep/drhgsim
└─┬ [email protected]
├─┬ @devicefarmer/[email protected]
│ └─┬ @devicefarmer/[email protected]
│ └── [email protected]
└─┬ [email protected]
└── [email protected]
$ npm list node-forge
[email protected] /home/vintprox/rep/drhgsim
└─┬ [email protected]
└─┬ @devicefarmer/[email protected]
└── [email protected] The deal breaker here may be topmost dependency called
So, it can be safely ignored. |
You basically need to run these both in two separate terminals: $ npm run watch
$ npm run serve:firefox |
It seems to support "Manifest V2 & V3" hybrid mode (broader browser support). So far,it proved to be type-safe. |
Directory structure of the boilerplate:
|
https://github.com/samrum/vite-plugin-web-extension
I think it's a good starting point for compatible and lean Web Extension development.
The text was updated successfully, but these errors were encountered: