Skip to content

fix(deps): update module github.com/brave-intl/bat-go to v0.5.1 #261

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Apr 15, 2025

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
github.com/brave-intl/bat-go v0.1.0 -> v0.5.1 age adoption passing confidence

Release Notes

brave-intl/bat-go (github.com/brave-intl/bat-go)

v0.5.1: dec prod

Compare Source

v0.5.0: oct 2021 prod

Compare Source

v0.4.0

Compare Source

Minor releases.

v0.3.0: bat-go v0.3.0 release

Compare Source

v0.2.0

Compare Source

v0.1.2: updated app error handler

Compare Source

v0.1.1: Release 0.1.1

Compare Source

Split out utils


Configuration

📅 Schedule: Branch creation - "* * * * 2-4" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested a review from jwadolowski as a code owner April 15, 2025 06:46
Copy link

socket-security bot commented Apr 15, 2025

Caution

Review the following alerts detected in dependencies.

According to your organization's Security Policy, you must resolve all "Block" alerts before proceeding. It is recommended to resolve "Warn" alerts too. Learn more about Socket for GitHub.

Action Severity Alert (click for details)
Block Critical
github.com/gin-gonic/[email protected] has a Critical CVE.

CVE: GHSA-869c-j7wc-8jqv Gin mishandles a wildcard at the end of an origin string (CRITICAL)

Affected versions: < 1.6.0

Patched version: 1.6.0

From: ?golang/github.com/gin-gonic/[email protected]

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/gin-gonic/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Critical
github.com/hashicorp/[email protected] has a Critical CVE.

CVE: GHSA-7cgv-v83v-rr87 HashiCorp Vault vulnerable to incorrect metadata access (CRITICAL)

Affected versions: >= 1.8.0, < 1.9.9

Patched version: 1.9.9

From: ?golang/github.com/hashicorp/[email protected]

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/hashicorp/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Critical
github.com/labstack/echo/[email protected] has a Critical CVE.

CVE: GHSA-crxj-hrmp-4rwf Labstack Echo Open Redirect vulnerability (CRITICAL)

Affected versions: < 4.9.0

Patched version: 4.9.0

From: ?golang/github.com/labstack/echo/[email protected]

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/labstack/echo/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Critical
github.com/Masterminds/[email protected] has a Critical CVE.

CVE: GHSA-3839-6r69-m497 GoUtils's randomly-generated alphanumeric strings contain significantly less entropy than expected (CRITICAL)

Affected versions: < 1.1.1

Patched version: 1.1.1

From: ?golang/github.com/Masterminds/[email protected]

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/Masterminds/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Critical
github.com/nats-io/[email protected] has a Critical CVE.

CVE: GHSA-62mh-w5cv-p88c nats-io/jwt not enforcing checking of Import token permissions (CRITICAL)

Affected versions: <= 1.2.2

Patched version: No patched versions

From: ?golang/github.com/nats-io/[email protected]

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/nats-io/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Critical
github.com/nats-io/[email protected] has a Critical CVE.

CVE: GHSA-4w5x-x539-ppf5 Incorrect handling of credential expiry by /nats-io/nats-server (CRITICAL)

Affected versions: < 1.1.0

Patched version: 1.1.0

From: ?golang/github.com/nats-io/[email protected]

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/nats-io/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Critical
github.com/nats-io/nats-server/[email protected] has a Critical CVE.

CVE: GHSA-4w5x-x539-ppf5 Incorrect handling of credential expiry by /nats-io/nats-server (CRITICAL)

Affected versions: < 2.1.9

Patched version: 2.1.9

From: ?golang/github.com/nats-io/nats-server/[email protected]

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/nats-io/nats-server/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
github.com/containerd/[email protected] has a High CVE.

CVE: GHSA-crp2-qrr5-8pq7 containerd CRI plugin: Insecure handling of image volumes (HIGH)

Affected versions: < 1.4.13

Patched version: 1.4.13

From: ?golang/github.com/containerd/[email protected]

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/containerd/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
github.com/dgrijalva/[email protected]+incompatible has a High CVE.

CVE: GHSA-w73w-5m7g-f7qc Authorization bypass in github.com/dgrijalva/jwt-go (HIGH)

Affected versions: >= 0.0.0-20150717181359-44718f8a89b0, <= 3.2.0

Patched version: No patched versions

From: ?golang/github.com/dgrijalva/[email protected]+incompatible

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/dgrijalva/[email protected]+incompatible. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
github.com/docker/[email protected]+incompatible has a High CVE.

CVE: GHSA-hqxw-f8mx-cpmw distribution catalog API endpoint can lead to OOM via malicious user input (HIGH)

Affected versions: < 2.8.2-beta.1

Patched version: 2.8.2-beta.1

From: ?golang/github.com/docker/[email protected]+incompatible

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/docker/[email protected]+incompatible. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
github.com/gin-gonic/[email protected] has a High CVE.

CVE: GHSA-h395-qcrw-5vmq Inconsistent Interpretation of HTTP Requests in github.com/gin-gonic/gin (HIGH)

Affected versions: < 1.7.7

Patched version: 1.7.7

From: ?golang/github.com/gin-gonic/[email protected]

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/gin-gonic/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
github.com/gin-gonic/[email protected] has a High CVE.

CVE: GHSA-6vm3-jj99-7229 Gin's default logger allows unsanitized input that can allow remote attackers to inject arbitrary log lines (HIGH)

Affected versions: < 1.6.0

Patched version: 1.6.0

From: ?golang/github.com/gin-gonic/[email protected]

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/gin-gonic/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
github.com/gogo/[email protected] has a High CVE.

CVE: GHSA-c3h9-896r-86jm Improper Input Validation in GoGo Protobuf (HIGH)

Affected versions: < 1.3.2

Patched version: 1.3.2

From: ?golang/github.com/gogo/[email protected]

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/gogo/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
github.com/hashicorp/[email protected] has a High CVE.

CVE: GHSA-8449-7gc2-pwrp HashiCorp Consul Template could reveal Vault secret contents in error messages (HIGH)

Affected versions: < 0.27.3

Patched version: 0.27.3

From: ?golang/github.com/hashicorp/[email protected]

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/hashicorp/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
github.com/hashicorp/[email protected] has a High CVE.

CVE: GHSA-wpfp-cm49-9m9q HashiCorp go-slug Vulnerable to Zip Slip Attack (HIGH)

Affected versions: < 0.16.3

Patched version: 0.16.3

From: ?golang/github.com/hashicorp/[email protected]

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/hashicorp/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
github.com/hashicorp/[email protected] has a High CVE.

CVE: GHSA-2g5j-5x95-r6hr Unsafe tar unpacking in HashiCorp go-slug (HIGH)

Affected versions: < 0.5.0

Patched version: 0.5.0

From: ?golang/github.com/hashicorp/[email protected]

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/hashicorp/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
github.com/hashicorp/[email protected] has a High CVE.

CVE: GHSA-wmg5-g953-qqfw Hashicorp Vault Fails to Verify if Approle SecretID Belongs to Role During a Destroy Operation (HIGH)

Affected versions: < 1.10.11

Patched version: 1.10.11

From: ?golang/github.com/hashicorp/[email protected]

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/hashicorp/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
github.com/hashicorp/[email protected] has a High CVE.

CVE: GHSA-g233-2p4r-3q7v Hashicorp Vault vulnerable to denial of service through memory exhaustion (HIGH)

Affected versions: >= 1.2.0, < 1.18.1

Patched version: 1.18.1

From: ?golang/github.com/hashicorp/[email protected]

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/hashicorp/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
github.com/hashicorp/[email protected] has a High CVE.

CVE: GHSA-4qhc-v8r6-8vwm HashiCorp Vault Missing Release of Memory after Effective Lifetime vulnerability (HIGH)

Affected versions: < 1.13.10

Patched version: 1.13.10

From: ?golang/github.com/hashicorp/[email protected]

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/hashicorp/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
github.com/hashicorp/[email protected] has a High CVE.

CVE: GHSA-rr8j-7w34-xp5j Vault Community Edition privilege escalation vulnerability (HIGH)

Affected versions: < 1.18.0

Patched version: 1.18.0

From: ?golang/github.com/hashicorp/[email protected]

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/hashicorp/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
github.com/hashicorp/[email protected] has a High CVE.

CVE: GHSA-86c6-3g63-5w64 Hashicorp Vault Incorrect Permission Assignment for Critical Resource vulnerability (HIGH)

Affected versions: < 1.13.0

Patched version: 1.13.0

From: ?golang/github.com/hashicorp/[email protected]

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/hashicorp/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
github.com/hashicorp/[email protected] has a High CVE.

CVE: GHSA-r3w7-mfpm-c2vw Incorrect TLS certificate auth method in Vault (HIGH)

Affected versions: < 1.14.10

Patched version: 1.14.10

From: ?golang/github.com/hashicorp/[email protected]

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/hashicorp/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

See 66 more rows in the dashboard

View full report

@renovate renovate bot force-pushed the renovate/github-com-brave-intl-bat-go-0-x branch 2 times, most recently from 51286c1 to ca6f78b Compare April 17, 2025 09:03
@renovate renovate bot force-pushed the renovate/github-com-brave-intl-bat-go-0-x branch 2 times, most recently from 8962356 to d6fee92 Compare April 30, 2025 12:55
@jwadolowski
Copy link
Contributor

#81 (comment)

@renovate renovate bot force-pushed the renovate/github-com-brave-intl-bat-go-0-x branch from d6fee92 to f2ea79d Compare May 9, 2025 08:47
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant