chore: pin prettier-related packages to prevent malicious package installation #1241
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Background
A recent npm phishing campaign led to the compromise of several prettier tooling packages. The attack involved:
Affected malicious versions:
eslint-config-prettier
: 8.10.1, 9.1.1, 10.1.6, 10.1.7eslint-plugin-prettier
: 4.2.2, 4.2.3Changes
✅ Our versions were already safe, but this PR adds extra protection by pinning exact versions:
prettier
:^3.0.3
→3.0.3
(was never compromised)eslint-config-prettier
:^10.1.1
→10.1.5
(pinned to last known safe version)eslint-plugin-prettier
:^5.5.1
→5.5.1
(already safe, now pinned)prettier-plugin-organize-imports
:^4.1.0
→4.1.0
(pinned for consistency)Security Impact
References
Verification