Skip to content

chore(deps): monitor transitive security alerts in better-auth dependency tree #1503

@ggfevans

Description

@ggfevans

Summary

Three Dependabot alerts (high severity) exist for transitive dependencies pulled in by better-auth. None are exploitable in our codebase — documented here for tracking until upstream patches.

Alerts

# Package CVE Severity Parent Dep Why Not Exploitable
47 effect@3.18.4 CVE-2026-32887 High @prisma/config (peer dep) Dev-only tooling, never loaded at runtime. No AsyncLocalStorage or RPC usage.
48 kysely@0.28.11 CVE-2026-33468 High @better-auth/kysely-adapter Better Auth runs in stateless mode (no DB). Zero kysely imports in source.
49 kysely@0.28.11 CVE-2026-33442 High @better-auth/kysely-adapter Same as above. Also MySQL-specific — no MySQL in project.

Action Items

  • Monitor better-auth releases for dependency bumps that resolve these
  • Dismiss Dependabot alerts once upstream patches land
  • If we ever add a database layer, re-evaluate kysely usage and prefer type-safe query builders

Context

  • Better Auth is configured for stateless mode (cookie-only sessions, no database backend)
  • kysely CVEs are MySQL-specific; we have no MySQL
  • effect is only present as a peer dep of @prisma/config, loaded during CLI operations only
  • Assessment performed 2026-03-22

Metadata

Metadata

Assignees

No one assigned

    Type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions