Skip to content

chore(deps): lock file maintenance (docs/package.json)#626

Open
renovate[bot] wants to merge 1 commit into
masterfrom
renovate/lock-file-maintenance-docs/package.json
Open

chore(deps): lock file maintenance (docs/package.json)#626
renovate[bot] wants to merge 1 commit into
masterfrom
renovate/lock-file-maintenance-docs/package.json

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Nov 20, 2023

This PR contains the following updates:

Update Change
lockFileMaintenance All locks refreshed

🔧 This Pull Request updates lock files to use the latest dependency versions.


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • "before 4am on monday"
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot added the dependencies Pull requests that update a dependency file label Nov 20, 2023
@codecov
Copy link
Copy Markdown

codecov Bot commented Nov 20, 2023

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 100.00%. Comparing base (056307d) to head (fdb4d7d).

Additional details and impacted files
@@            Coverage Diff            @@
##            master      #626   +/-   ##
=========================================
  Coverage   100.00%   100.00%           
=========================================
  Files            2         2           
  Lines           36        36           
  Branches         9         9           
=========================================
  Hits            36        36           

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

@renovate renovate Bot force-pushed the renovate/lock-file-maintenance-docs/package.json branch 2 times, most recently from 34d2fb8 to 0d78319 Compare August 13, 2025 13:04
@renovate renovate Bot force-pushed the renovate/lock-file-maintenance-docs/package.json branch from 0d78319 to 41d0ca7 Compare August 19, 2025 12:02
@renovate renovate Bot force-pushed the renovate/lock-file-maintenance-docs/package.json branch from 41d0ca7 to 286e2e1 Compare August 31, 2025 12:02
@renovate renovate Bot force-pushed the renovate/lock-file-maintenance-docs/package.json branch from 286e2e1 to 61014fa Compare September 25, 2025 17:28
@renovate renovate Bot force-pushed the renovate/lock-file-maintenance-docs/package.json branch from 61014fa to e35bd1d Compare October 21, 2025 19:42
@renovate renovate Bot force-pushed the renovate/lock-file-maintenance-docs/package.json branch from e35bd1d to fb4db9c Compare November 10, 2025 21:52
@renovate renovate Bot force-pushed the renovate/lock-file-maintenance-docs/package.json branch from fb4db9c to 26a15c6 Compare November 18, 2025 23:09
@renovate renovate Bot force-pushed the renovate/lock-file-maintenance-docs/package.json branch from 26a15c6 to 87547ee Compare December 3, 2025 16:39
@renovate renovate Bot force-pushed the renovate/lock-file-maintenance-docs/package.json branch from 87547ee to 74a1f4a Compare December 31, 2025 18:42
@renovate renovate Bot force-pushed the renovate/lock-file-maintenance-docs/package.json branch from 74a1f4a to 99668e6 Compare January 8, 2026 20:48
@renovate renovate Bot force-pushed the renovate/lock-file-maintenance-docs/package.json branch 2 times, most recently from 379afc6 to 8d4c68c Compare January 23, 2026 21:10
@renovate renovate Bot force-pushed the renovate/lock-file-maintenance-docs/package.json branch from 8d4c68c to 7844bd1 Compare February 2, 2026 16:16
@renovate renovate Bot force-pushed the renovate/lock-file-maintenance-docs/package.json branch 2 times, most recently from 650bbb4 to 2fe6e52 Compare February 17, 2026 17:55
@renovate renovate Bot force-pushed the renovate/lock-file-maintenance-docs/package.json branch from 2fe6e52 to 0f461dd Compare March 5, 2026 16:52
@renovate renovate Bot force-pushed the renovate/lock-file-maintenance-docs/package.json branch from 0f461dd to ecac22f Compare March 13, 2026 13:25
@renovate renovate Bot force-pushed the renovate/lock-file-maintenance-docs/package.json branch 2 times, most recently from 601bd6f to 8dc2b10 Compare April 1, 2026 15:53
@renovate renovate Bot force-pushed the renovate/lock-file-maintenance-docs/package.json branch from 8dc2b10 to d57fd57 Compare April 8, 2026 16:06
@renovate renovate Bot force-pushed the renovate/lock-file-maintenance-docs/package.json branch from d57fd57 to 0925932 Compare April 29, 2026 17:08
@socket-security
Copy link
Copy Markdown

socket-security Bot commented Apr 29, 2026

Warning

Review the following alerts detected in dependencies.

According to your organization's Security Policy, it is recommended to resolve "Warn" alerts. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Warn Critical
Critical CVE: npm cipher-base is missing type checks, leading to hash rewind and passing on crafted data

CVE: GHSA-cpq7-6gpm-g9rc cipher-base is missing type checks, leading to hash rewind and passing on crafted data (CRITICAL)

Affected versions: < 1.0.5

Patched version: 1.0.5

From: ?npm/cipher-base@1.0.4

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/cipher-base@1.0.4. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
Critical CVE: Elliptic's private key extraction in ECDSA upon signing a malformed input (e.g. a string)

CVE: GHSA-vjh7-7g9h-fjfh Elliptic's private key extraction in ECDSA upon signing a malformed input (e.g. a string) (CRITICAL)

Affected versions: < 6.6.1

Patched version: 6.6.1

From: ?npm/elliptic@6.5.4

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/elliptic@6.5.4. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
Critical CVE: npm form-data uses unsafe random function in form-data for choosing boundary

CVE: GHSA-fjxv-7rqg-78g4 form-data uses unsafe random function in form-data for choosing boundary (CRITICAL)

Affected versions: < 2.5.4; >= 3.0.0 < 3.0.4; >= 4.0.0 < 4.0.4

Patched version: 4.0.4

From: ?npm/form-data@4.0.0

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/form-data@4.0.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
Critical CVE: Handlebars.js has JavaScript Injection via AST Type Confusion

CVE: GHSA-2w6w-674q-4c4q Handlebars.js has JavaScript Injection via AST Type Confusion (CRITICAL)

Affected versions: >= 4.0.0 < 4.7.9

Patched version: 4.7.9

From: ?npm/handlebars@4.7.8

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/handlebars@4.7.8. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
Obfuscated code: npm entities is 91.0% likely obfuscated

Confidence: 0.91

Location: Package overview

From: ?npm/entities@4.5.0

ℹ Read more on: This package | This alert | What is obfuscated code?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should not obfuscate their code. Consider not using packages with obfuscated code.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/entities@4.5.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

@renovate renovate Bot force-pushed the renovate/lock-file-maintenance-docs/package.json branch from 0925932 to fdb4d7d Compare May 12, 2026 13:34
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants