Download the “OWASP Juice Shop” project source code and extract the zip file.Browse to http://npm.broofa.com.Find the “package.json” file in the Juice Shop source code and upload the file to the tool for analysis.
Observe the generated dependencies tree for this application. Note that there may be more than one path to a particular dependency; there are different levels of dependencies for a module to work. Use this dependencies tree as a sample and discuss how having multiple levels and paths of dependencies can affect the security of an application. Also, what do you think about remediation challenges in an application with a complex dependencies tree similar to this example?
write your analysis,/ Not more than One page/