-
-
Notifications
You must be signed in to change notification settings - Fork 26.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Archive the repository if the project is dead. #13393
Comments
It seems alarmingly uncommunicated that CRA is unmaintained - the README.md makes no mention of it, indeed I only noticed the issue due to a message re At the very least, the README should make the project's lack of active maintenance clear (or, if I've just missed it, clear front and centre). |
Yeah, I also noticed this after doing
It seems this message was added here. Wonder where they got the information. |
CRA has been dead for a long time. Issues were bounced off with some bots marking it as stale or just force closing it without any resolution because thats how they felt doing it. This repo should be marked as not maintained anymore for sure. Anyone thinking of creating new project with CRA should reconsider it for sure and use something like Vite instead. |
hi @violet4, the project works fine for me. I don't mind if there is not a new release every week. unless it breaks and nobody fixes it, why archive it? maybe some day someone wants to take over maintenance. if we archive before that, the project's death will be a self-fulfilling prophecy. |
@pseidemann fresh install 8 vulnerabilities, 6 high |
hi @violet4, just note that these vulnerabilities are probably not very critical, since the code you generate with this "tool" is running in the browser only. so ultimately your browser decides if using your app is safe. |
this ticket is titled "Archive the repository if the project is dead." but i personally never made a claim that it should be archived. i wish CRA were more upfront about its current limitations, especially considering that it's put out by a very large organization (fb/meta) which has many smart developers. it's incredibly disorienting to use a tool by fb/meta with 879 contributors, 1.7k issues, 464 PRs that makes no mention of its current lack of maintenance, which then spits vulnerability messages on a fresh install.
as a newbie to NPM+React on a work project over a year ago, not realizing there are alternatives to CRA (not even knowing what CRA itself truly is), i reluctantly ignored the messages hoping "these vulnerabilities are probably not very critical," but even now, don't know how i would go about analyzing that claim, besides going through each dependency individually.
plenty of code "looks safe" from the browser perspective but has vulnerabilities. sure, the browser has XSS protections, but that's only one class of issues that the browser tries to protect against. vulnerabilities can be incredibly complex/nuanced and result in major issues even though the code "looks safe" to execute. every user who browses the web is taking a risk every time they visit a page, click a link, etc. so.. it's 100% the browser's responsibility to protect users? browsers work very hard at security but why should a developer knowingly (or unknowingly, in the case of a newbie CRA user) risk including vulnerabilities in their software? it sounds like you made a conscious decision to claim willful ignorance at vulnerability warnings, which may be fine for you, your workflow, your project/job type, use case, attack surface, etc.. but why encourage others to do the same or assume it shouldn't matter for others? if i want to spin up a cute little react project in 10 seconds flat and security doesn't matter as i create the nth todo app, sure i might use CRA, but i want to know the caveats upfront before i begin. otherwise i feel misled and then feel distrust. there's no hint at the current state of the project on the website https://create-react-app.dev/ , in the repo, etc. |
it pretty much is (but obviously cannot do that 100% of the time). the browser cannot trust websites (and your CRA app), otherwise attackers will exploit. CRA only creates a static HTML/JS/CSS bundle which will be served to the browser.
the browser actually doesn't protect against xss. it only protects against cross-origin requests (to some degree). react has some good xss preventions but you can still write unsafe code with some effort (using innerHTML/dangerouslySetInnerHTML etc.). xss unfortunately can still happen if all your deps are not vulnerable according to npm. often it is a programming error by the developer. |
Not sure if this discussion is relevant. Is the project maintained or not? If not, it would be nice if this was mentioned in the README. |
Archive the repository if the project is dead.
The text was updated successfully, but these errors were encountered: