You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This is one of the first three pull requests with dependency updates we've sent your way. We tried to start with a few easy patch-level updates. Hopefully your tests will pass and you can merge this pull request without too much risk. This should give you an idea how Depfu works in general.
After you merge your first pull request, we'll send you a few more. We'll never open more than seven PRs at the same time so you're not getting overwhelmed with updates.
Let us know if you have any questions. Thanks so much for giving Depfu a try!
🚨 Your current dependencies have known security vulnerabilities 🚨
This dependency update fixes known security vulnerabilities. Please see the details below and assess their impact carefully. We recommend to merge and deploy this as soon as possible!
Here is everything you need to know about this upgrade. Please take a good look at what changed and the test results before merging this pull request.
There is a Stack Overflow vulnerability in eslint before 9.26.0 when serializing objects with circular references in eslint/lib/shared/serialization.js. The exploit is triggered via the RuleTester.run() method, which validates test cases and checks for duplicates. During validation, the internal function checkDuplicateTestCase() is called, which in turn uses the isSerializable() function for serialization checks. When a circular reference object is passed in, isSerializable() enters infinite recursion, ultimately causing a Stack Overflow.
Affected versions of acorn are vulnerable to Regular Expression Denial of Service.
A regex in the form of /[x-\ud800]/u causes the parser to enter an infinite loop.
The string is not valid UTF16 which usually results in it being sanitized before reaching the parser.
If an application processes untrusted input and passes it directly to acorn,
attackers may leverage the vulnerability leading to Denial of Service.
Affected versions of acorn are vulnerable to Regular Expression Denial of Service.
A regex in the form of /[x-\ud800]/u causes the parser to enter an infinite loop.
The string is not valid UTF16 which usually results in it being sanitized before reaching the parser.
If an application processes untrusted input and passes it directly to acorn,
attackers may leverage the vulnerability leading to Denial of Service.
Depfu will automatically keep this PR conflict-free, as long as you don't add any commits to this branch yourself. You can also trigger a rebase manually by commenting with @depfu rebase.
All Depfu comment commands
@depfu rebase
Rebases against your default branch and redoes this update
@depfu recreate
Recreates this PR, overwriting any edits that you've made to it
@depfu merge
Merges this PR once your tests are passing and conflicts are resolved
@depfu cancel merge
Cancels automatic merging of this PR
@depfu close
Closes this PR and deletes the branch
@depfu reopen
Restores the branch and reopens this PR (if it's closed)
@depfu pause
Ignores all future updates for this dependency and closes this PR
@depfu pause [minor|major]
Ignores all future minor/major updates for this dependency and closes this PR
@depfu resume
Future versions of this dependency will create PRs again (leaves this PR as is)
Merging this PR will not cause a version bump for any packages. If these changes should not result in a new version, you're good to go. If these changes should result in a version bump, you need to add a changeset.
Next steps: Take a moment to review the security alert
above. Review the linked package source code to understand the potential
risk. Ensure the package is not malicious before proceeding. If you're
unsure how to proceed, reach out to your security team or ask the Socket
team for help at support@socket.dev.
Suggestion: Find a package that does not violate your license policy or adjust your policy to allow this package's license.
Mark the package as acceptable risk. To ignore this alert only
in this pull request, reply with the comment
@SocketSecurity ignore npm/argparse@2.0.1. You can
also ignore all packages with @SocketSecurity ignore-all.
To ignore an alert for all future pull requests, use Socket's Dashboard to
change the triage state of this alert.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Welcome to Depfu 👋
This is one of the first three pull requests with dependency updates we've sent your way. We tried to start with a few easy patch-level updates. Hopefully your tests will pass and you can merge this pull request without too much risk. This should give you an idea how Depfu works in general.
After you merge your first pull request, we'll send you a few more. We'll never open more than seven PRs at the same time so you're not getting overwhelmed with updates.
Let us know if you have any questions. Thanks so much for giving Depfu a try!
🚨 Your current dependencies have known security vulnerabilities 🚨
This dependency update fixes known security vulnerabilities. Please see the details below and assess their impact carefully. We recommend to merge and deploy this as soon as possible!
Here is everything you need to know about this upgrade. Please take a good look at what changed and the test results before merging this pull request.
What changed?
✳️ eslint (5.4.0 → 9.39.2) · Repo · Changelog
Security Advisories 🚨
🚨 eslint has a Stack Overflow when serializing objects with circular references
Release Notes
Too many releases to show here. View the full release notes.
Commits
See the full diff on Github. The new version differs by 7 commits:
9.39.2Build: changelog update for 9.39.2chore: upgrade to `@eslint/js@9.39.2` (#20394)chore: package.json update for @eslint/js releasefix: warn when `eslint-env` configuration comments are found (#20381)build: add .scss files entry to knip (#20391)ci: add `v9.x-dev` branch (#20382)✳️ minimatch (3.0.5 → 3.1.2) · Repo · Changelog
Commits
See the full diff on Github. The new version differs by 13 commits:
3.1.2fix: trim pattern3.1.1fix: treat nocase:true as always having magic3.1.0Add 'allowWindowsEscape' optionadd publishConfig for v3 publishes3.0.6[fix] revert all breaking syntax changesdocument, expose, and test 'partial:true' optionci: tests and makeworkfull test coverage, adding tests, deleting dead codeCredit @yetingli for the regexp improvementSorry, we couldn't find anything useful about this release.
Security Advisories 🚨
🚨 Regular Expression Denial of Service in Acorn
🚨 Regular Expression Denial of Service in Acorn
Commits
See the full diff on Github. The new version differs by more commits than we can show here.
Release Notes
5.2.0
Does any of this look wrong? Please let us know.
Sorry, we couldn't find anything useful about this release.
Release Notes
4.0.0
3.4.3
3.4.2
3.4.1
3.4.0
3.3.0
3.2.0
3.1.0
3.0.0
2.1.0
Does any of this look wrong? Please let us know.
Release Notes
Too many releases to show here. View the full release notes.
Sorry, we couldn't find anything useful about this release.
Commits
See the full diff on Github. The new version differs by 7 commits:
Version 4.3.0Updated `estraverse`. Added tests for optional chaining support (#22)Version 4.2.1Remove support for Node.js versions < 4add package-lock.json to .npmignorefix spelling error in READMEMore fix for README.mdRelease Notes
8.0.0
7.0.2
7.0.1
7.0.0
6.0.1 (from changelog)
6.0.0 (from changelog)
Does any of this look wrong? Please let us know.
Release Notes
4.0.1
4.0.0
3.2.0
3.1.1
Does any of this look wrong? Please let us know.
Commits
See the full diff on Github. The new version differs by 39 commits:
3.3.3ruf/linted Python + dev-dependencies updatesexplicit files in package.json3.3.2Fix #81 - Removed published __pycache__ from npm3.3.1Fixed another typo on TS definition3.3.0Fixed types and TS logo in npmRemoved jsr.json from npm3.2.13Fixed typo in JSDoc TS3.2.12Last attempt to fix jsr.ioStill trying to fix jsr.io publishing3.2.11Improved TS typesBumped jsr.io too3.2.10Trying this jsr thingUpdated dev-dependenciesUpdated all dev/dependenciesMerge pull request #71 from WebReflection/python3.2.9Added Python version of the very same thing3.2.8Merge pull request #70 from WebReflection/issue-69Fix #69 - Make `$value` an explicit class fieldRemoved a disturbingly unnecessary early returnMerge pull request #63 from WebReflection/dependabot/npm_and_yarn/json5-2.2.3Bump json5 from 2.2.1 to 2.2.33.2.7Updated dev-dependenciesMerge pull request #60 from Fdawgs/patch-1Reduce published package size3.2.6Fix #58 + updated dev dependencies + exported flatted/esmMerge pull request #55 from WebReflection/dependabot/npm_and_yarn/minimist-1.2.6Bump minimist from 1.2.5 to 1.2.6Release Notes
5.3.0
5.2.4
5.2.0
5.1.9
5.1.5
5.1.1
5.1.0
Does any of this look wrong? Please let us know.
Commits
See the full diff on Github. The new version differs by more commits than we can show here.
Commits
See the full diff on Github. The new version differs by 8 commits:
4.0.3fix: Improve performance (#15)chore(ci): Switch to GitHub Actions for CI (#16)4.0.24.1.1Merge pull request #14 from Trott/perffix: improve performanceCreate FUNDING.yml🆕 @eslint-community/eslint-utils (added, 4.9.1)
🆕 @eslint-community/regexpp (added, 4.12.2)
🆕 @eslint/config-array (added, 0.21.1)
🆕 @eslint/config-helpers (added, 0.4.2)
🆕 @eslint/core (added, 0.17.0)
🆕 @eslint/eslintrc (added, 3.3.3)
🆕 @eslint/js (added, 9.39.2)
🆕 @eslint/object-schema (added, 2.1.7)
🆕 @eslint/plugin-kit (added, 0.4.1)
🆕 @humanfs/core (added, 0.19.1)
🆕 @humanfs/node (added, 0.16.7)
🆕 @humanwhocodes/module-importer (added, 1.0.1)
🆕 @humanwhocodes/retry (added, 0.4.3)
🆕 word-wrap (added, 1.2.5)
🗑️ ajv-keywords (removed)
🗑️ caller-path (removed)
🗑️ callsites (removed)
🗑️ circular-json (removed)
🗑️ doctrine (removed)
🗑️ eslint-utils (removed)
🗑️ functional-red-black-tree (removed)
🗑️ inquirer (removed)
🗑️ is-resolvable (removed)
🗑️ pluralize (removed)
🗑️ progress (removed)
🗑️ regexpp (removed)
🗑️ require-uncached (removed)
🗑️ resolve-from (removed)
🗑️ rxjs (removed)
🗑️ slice-ansi (removed)
🗑️ symbol-observable (removed)
🗑️ table (removed)
🗑️ text-table (removed)
🗑️ write (removed)
Depfu will automatically keep this PR conflict-free, as long as you don't add any commits to this branch yourself. You can also trigger a rebase manually by commenting with
@depfu rebase.All Depfu comment commands