About audit reportsAudit reports contain tables of information about security vulnerabilities in your project's dependencies to help you fix the vulnerability or troubleshoot further.
Vulnerability table fields SeverityThe severity of the vulnerability, determined by the impact and exploitability of the vulnerability in its most common use case.
Severity Recommended action Critical Address immediately High Address as quickly as possible Moderate Address as time allows Low Address at your discretion
DescriptionThe description of the vulnerability. For example, "Denial of service".
PackageThe name of the package that contains the vulnerability.
Patched inThe semantic version range that describes which versions contain a fix for the vulnerability.
Dependency ofThe module that the package with the vulnerability depends on.
PathThe path to the code that contains the vulnerability.
More infoA link to the security report.