dev-master
9999999-devPrevents installation of composer packages with known security vulnerabilities: no API, simply require it
MIT
Prevents installation of composer packages with known security vulnerabilities: no API, simply require it
If you currently live in Russia, please read this message., (*1)
This package ensures that your application doesn't have installed dependencies with known security vulnerabilities., (*5)
composer require --dev roave/security-advisories:dev-latest
This package does not provide any API or usable classes: its only purpose is to prevent installation of software
with known and documented security issues.
Simply add "roave/security-advisories": "dev-latest"
to your composer.json
"require-dev"
section and you will
not be able to harm yourself with software with known security vulnerabilities., (*6)
For example, try following:, (*7)
composer require --dev roave/security-advisories:dev-latest # following commands will fail: composer require symfony/symfony:2.5.2 composer require zendframework/zendframework:2.3.1
The checks are only executed when adding a new dependency via composer require
or when running composer update
:
deploying an application with a valid composer.lock
and via composer install
won't trigger any security versions
checking., (*8)
You can manually trigger a version check by using the
--dry-run
switch on an update while not doing anything. Runningcomposer update --dry-run roave/security-advisories
is an effective way to manually trigger a security version check., (*9)
Available as part of the Tidelift Subscription., (*10)
The maintainers of roave/security-advisories and thousands of other packages are working with Tidelift to deliver commercial support and maintenance for the open source dependencies you use to build your applications. Save time, reduce risk, and improve code health, while paying the maintainers of the exact dependencies you use. Learn more., (*11)
You can also contact us at team@roave.com for looking into security issues in your own project., (*12)
This package can only be required in its dev-latest
version: there will never be stable/tagged versions because of
the nature of the problem being targeted. Security issues are in fact a moving target, and locking your project to a
specific tagged version of the package would not make any sense., (*13)
This package is therefore only suited for installation in the root of your deployable project., (*14)
This package extracts information about existing security issues in various composer projects from the FriendsOfPHP/security-advisories repository and the GitHub Advisory Database., (*15)
Prevents installation of composer packages with known security vulnerabilities: no API, simply require it
MIT