Skip to content

Conversation

@aditiharini
Copy link
Contributor

@aditiharini aditiharini commented Sep 30, 2025

Why is this change needed?

Release packages for storage lending.

Merge Checklist

Choose all relevant options below by adding an x now or at any time before submitting for review


PR-Codex overview

This PR focuses on updating the version of several packages in the farcaster ecosystem to 0.18.8 for @farcaster/core, 0.15.8 for @farcaster/hub-nodejs, and 0.11.6 for @farcaster/hub-web. It also introduces a new feature related to storage lending.

Detailed summary

  • Updated @farcaster/core version from 0.18.7 to 0.18.8.
  • Updated @farcaster/hub-nodejs version from 0.15.7 to 0.15.8.
  • Updated @farcaster/hub-web version from 0.11.5 to 0.11.6.
  • Updated @farcaster/shuttle version from 0.9.2 to 0.9.3.
  • Added feature: support for storage lending (commit 206eb72f).

✨ Ask PR-Codex anything about this PR by commenting with /codex {your question}

@changeset-bot
Copy link

changeset-bot bot commented Sep 30, 2025

⚠️ No Changeset found

Latest commit: ed9edad

Merging this PR will not cause a version bump for any packages. If these changes should not result in a new version, you're good to go. If these changes should result in a version bump, you need to add a changeset.

This PR includes no changesets

When changesets are added to this PR, you'll see the packages that this PR includes changesets for and the associated semver types

Click here to learn what changesets are, and how to add one.

Click here if you're a maintainer who wants to add a changeset to this PR

@aditiharini aditiharini added the t-chore Miscellaneous improvements label Sep 30, 2025
@socket-security
Copy link

Review the following changes in direct dependencies. Learn more about Socket for GitHub.

Diff Package Supply Chain
Security
Vulnerability Quality Maintenance License
Addednpm/​sha.js@​2.4.11100258482100
Addednpm/​elliptic@​6.6.01002510080100
Addednpm/​@​parcel/​watcher-android-arm64@​2.4.11001003979100
Addednpm/​@​parcel/​watcher-darwin-arm64@​2.4.11001003979100
Addednpm/​@​parcel/​watcher-darwin-x64@​2.4.11001003979100
Addednpm/​@​parcel/​watcher-freebsd-x64@​2.4.11001003979100
Addednpm/​@​parcel/​watcher-linux-arm-glibc@​2.4.11001003979100
Addednpm/​@​parcel/​watcher-linux-arm64-glibc@​2.4.11001003979100
Addednpm/​@​parcel/​watcher-linux-arm64-musl@​2.4.11001003979100
Addednpm/​@​parcel/​watcher-linux-x64-glibc@​2.4.11001003979100
Addednpm/​@​parcel/​watcher-linux-x64-musl@​2.4.11001003979100
Addednpm/​@​parcel/​watcher-win32-arm64@​2.4.11001003979100
Addednpm/​@​parcel/​watcher-win32-ia32@​2.4.11001003979100
Addednpm/​@​parcel/​watcher-win32-x64@​2.4.11001003979100
Addednpm/​@​nomicfoundation/​solidity-analyzer-darwin-arm64@​0.1.11001003977100
Addednpm/​@​nomicfoundation/​solidity-analyzer-darwin-x64@​0.1.11001003977100
Addednpm/​@​nomicfoundation/​solidity-analyzer-freebsd-x64@​0.1.1881003977100
Addednpm/​@​nomicfoundation/​solidity-analyzer-linux-arm64-gnu@​0.1.11001003977100
Addednpm/​@​nomicfoundation/​solidity-analyzer-linux-arm64-musl@​0.1.11001003977100
Addednpm/​@​nomicfoundation/​solidity-analyzer-linux-x64-gnu@​0.1.11001003977100
Addednpm/​@​nomicfoundation/​solidity-analyzer-linux-x64-musl@​0.1.11001003977100
Addednpm/​@​nomicfoundation/​solidity-analyzer-win32-arm64-msvc@​0.1.1881003977100
Addednpm/​@​nomicfoundation/​solidity-analyzer-win32-ia32-msvc@​0.1.1881003977100
Addednpm/​@​nomicfoundation/​solidity-analyzer-win32-x64-msvc@​0.1.11001003977100
Updatednpm/​has@​1.0.3 ⏵ 1.0.467 +110065 +452100
Addednpm/​isarray@​1.0.0671008452100
Addednpm/​is-arguments@​1.1.1671008152100
Addednpm/​is-generator-function@​1.0.10671007957100
Updatednpm/​is-typed-array@​1.1.10 ⏵ 1.1.1267 +11009054100
Addednpm/​json-rpc-random-id@​1.0.11001005577100
Addednpm/​strict-uri-encode@​2.0.01001006277100
Addednpm/​@​walletconnect/​events@​1.0.1991006281100
See 325 more rows in the dashboard

View full report

@socket-security
Copy link

Warning

Review the following alerts detected in dependencies.

According to your organization's Security Policy, it is recommended to resolve "Warn" alerts. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Warn Critical
npm/[email protected] has a Critical CVE.

CVE: GHSA-vjh7-7g9h-fjfh Elliptic's private key extraction in ECDSA upon signing a malformed input (e.g. a string) (CRITICAL)

Affected versions: < 6.6.1

Patched version: 6.6.1

From: packages/hub-nodejs/examples/contract-signatures/yarn.locknpm/[email protected]

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
npm/[email protected] has a Critical CVE.

CVE: GHSA-95m3-7q98-8xr5 sha.js is missing type checks leading to hash rewind and passing on crafted data (CRITICAL)

Affected versions: < 2.4.12

Patched version: 2.4.12

From: packages/hub-nodejs/examples/contract-signatures/yarn.locknpm/[email protected]

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

@aditiharini aditiharini merged commit 872a38b into main Sep 30, 2025
6 checks passed
@aditiharini aditiharini deleted the release branch September 30, 2025 02:53
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

t-chore Miscellaneous improvements

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants