Line `return str.replace(/([$])/, "\\$");` in `bluebird` causes `js/incomplete-sanitization` CodeQL `High` security vulnerability. ref: https://github.com/mgrybyk-org/html-trend-report-action/security/code-scanning/1 It would be nice to drop the bluebird completely https://github.com/Keyang/node-csvtojson/issues/339