Security Scan Flags High-Severity Vulnerabilities in Key Dependencies (2026-03-30)
A recent automated security scan has uncovered multiple high and moderate-severity vulnerabilities within a project's core dependencies, exposing potential denial-of-service (DoS) and prototype pollution attack vectors. The scan, dated March 30, 2026, identified critical flaws in widely used packages including `flatted` and `minimatch`, which are flagged as high-severity risks. These findings indicate that the current software supply chain contains exploitable weaknesses that could be leveraged to crash services or manipulate object prototypes.
The most severe issues involve `flatted` (version <=3.1.3), which is vulnerable to an unbounded recursion DoS attack during its `parse()` function's revive phase and is also susceptible to prototype pollution. Similarly, `minimatch` (version <=3.1.3) contains a ReDoS (Regular Expression Denial of Service) vulnerability triggered by repeated wildcards. Moderate-severity vulnerabilities were also found in `ajv` (ReDoS via `$data` option) and `brace-expansion` (a zero-step sequence bug causing process hangs and memory exhaustion).
While automated fixes are reportedly available via `npm audit fix`, the presence of these unpatched dependencies in a production-ready codebase represents a significant operational security risk. The vulnerabilities, if exploited, could lead to service instability, resource exhaustion, and potential unauthorized code execution. This scan serves as a direct warning for immediate dependency review and remediation to prevent potential exploitation from both internal and external threat actors.