refactor(chore): fix audit vulnerability and added trivy scan #6
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Issue - #5
This pull request introduces a new security workflow and updates dependency management in the project. The main changes are the addition of a Trivy vulnerability scanning workflow for pull requests and improvements in dependency configuration, including the removal of an unused package and a targeted override for a transitive dependency.
Security and CI/CD Improvements:
.github/workflows/trivy.ymlto automatically run Trivy vulnerability scans on pull requests targeting themainbranch, enhancing security checks in the CI pipeline.Dependency Management:
underscore.deepclonepackage frompackage.jsondependencies, helping to reduce potential security risks and maintenance overhead.overridessection inpackage.jsonto force theform-datadependency used by@cypress/requestto version2.5.4, ensuring compatibility and potentially addressing known issues or vulnerabilities.