@apidevtools/swagger-parser
1
Versions
—
License
No
Install Scripts
Missing
Provenance
Supply chain provenance
Status for the latest visible version.
No SLSA provenance
npm registry signatures
gitHead linked
Without SLSA provenance there is no cryptographic link between this tarball and the public source — the axios compromise (March 2026) relied on exactly this gap.
Maintainers
jamesmessingerphilsturgeon
Keywords
swaggeropenapiopen-apijsonyamlparseparservalidatevalidatorvalidationspecspecificationschemareferencedereference
Accepted risks
Findings the reviewer chose to accept rather than block on.
| Source | Rule | Reason | Accepted by | When |
|---|---|---|---|---|
| provenance | no-provenance | AI (provenance): Package predates widespread Sigstore adoption; no provenance is expected for packages of this age and is not a security concern here. | ai | |
| dependencies | unvetted-dep:@apidevtools/openapi-schemas | AI (dependencies): First-party @apidevtools org dependency by the same maintainer; expected and legitimate for this Swagger/OpenAPI parser. | ai | |
| dependencies | unvetted-dep:@apidevtools/swagger-methods | AI (dependencies): First-party @apidevtools org dependency by the same maintainer; expected and legitimate for this Swagger/OpenAPI parser. | ai |
Versions (showing 1 of 1)
| Version | Deps | Published |
|---|---|---|
| 10.0.3 | 6 / 20 |
v10.0.3
1 finding
LOW
No provenance attestation
provenance
Package was published without Sigstore provenance. Only ~12% of npm packages have provenance, so this is common but not ideal.