Skip to content

Conversation

@fusmanii
Copy link
Contributor

No description provided.

Signed-off-by: Faisal Usmani <faisal.of.usmani@gmail.com>
@socket-security
Copy link

Review the following changes in direct dependencies. Learn more about Socket for GitHub.

Diff Package Supply Chain
Security
Vulnerability Quality Maintenance License
Added@​nomicfoundation/​solidity-analyzer-darwin-arm64@​0.1.01001003678100
Added@​nomicfoundation/​solidity-analyzer-darwin-x64@​0.1.01001003678100
Added@​nomicfoundation/​solidity-analyzer-freebsd-x64@​0.1.0911003678100
Added@​nomicfoundation/​solidity-analyzer-linux-arm64-gnu@​0.1.01001003678100
Added@​nomicfoundation/​solidity-analyzer-linux-arm64-musl@​0.1.01001003678100
Added@​nomicfoundation/​solidity-analyzer-linux-x64-gnu@​0.1.01001003678100
Added@​nomicfoundation/​solidity-analyzer-linux-x64-musl@​0.1.01001003678100
Added@​nomicfoundation/​solidity-analyzer-win32-arm64-msvc@​0.1.0911003678100
Added@​nomicfoundation/​solidity-analyzer-win32-ia32-msvc@​0.1.0911003678100
Added@​nomicfoundation/​solidity-analyzer-win32-x64-msvc@​0.1.01001003678100
Added@​matterlabs/​zksync-contracts@​0.2.4751003688100
Addedarray-buffer-byte-length@​1.0.0671007552100
Addedaggregate-error@​3.1.0671008652100
Addedarray.prototype.flat@​1.2.5671009252100
Addedarray.prototype.reduce@​1.0.5671009152100
Addedarray-includes@​3.1.4671009953100
Addedconstant-case@​2.0.01001005478100
Addedboolbase@​1.0.01001005577100
Addedbabel-helper-optimise-call-expression@​6.24.11001005681100
Addedcamel-case@​3.0.01001005678100
Addedbabel-helper-get-function-arity@​6.24.11001005781100
Added@​types/​parse-json@​4.0.01001005878100
Addedat-least-node@​1.0.01001006177100
Addedbabel-helper-regex@​6.26.01001006181100
Addedcopy-descriptor@​0.1.11001006377100
Addedbabel-helper-builder-binary-assignment-operator-visitor@​6.24.11001006381100
Addedbabel-helper-call-delegate@​6.24.11001006481100
Addedbabel-helper-hoist-variables@​6.24.11001006481100
Addedbabel-helper-explode-assignable-expression@​6.24.11001006581100
Added@​types/​mkdirp@​0.5.21001006578100
Added@​types/​responselike@​1.0.01001006577100
Added@​resolver-engine/​imports-fs@​0.3.3100100667970
See 281 more rows in the dashboard

View full report

@socket-security
Copy link

Warning

Review the following alerts detected in dependencies.

According to your organization's Security Policy, it is recommended to resolve "Warn" alerts. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Warn Critical
@openzeppelin/contracts@4.1.0 has a Critical CVE.

CVE: GHSA-fg47-3c2x-m2wr TimelockController vulnerability in OpenZeppelin Contracts (CRITICAL)

Affected versions: >= 4.0.0 < 4.3.1; >= 3.3.0 < 3.4.2

Patched version: 4.3.1

From: yarn.locknpm/@across-protocol/contracts@0.1.4npm/@openzeppelin/contracts@4.1.0

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@openzeppelin/contracts@4.1.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
@openzeppelin/contracts@4.1.0 has a Critical CVE.

CVE: GHSA-5vp3-v4hc-gx76 UUPSUpgradeable vulnerability in @openzeppelin/contracts (CRITICAL)

Affected versions: >= 4.1.0 < 4.3.2

Patched version: 4.3.2

From: yarn.locknpm/@across-protocol/contracts@0.1.4npm/@openzeppelin/contracts@4.1.0

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@openzeppelin/contracts@4.1.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
babel-traverse@6.26.0 has a Critical CVE.

CVE: GHSA-67hx-6x53-jw92 Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code (CRITICAL)

Affected versions: >= 0

Patched version: No patched versions

From: yarn.locknpm/babel-plugin-transform-es2015-classes@6.24.1npm/babel-traverse@6.26.0

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/babel-traverse@6.26.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
@matterlabs/hardhat-zksync-telemetry@1.1.1 has a Git dependency.

Dependency: @matterlabs/zksync-telemetry-js@git+https://github.com/matter-labs/zksync-telemetry-js.git#2fd9edbe6b9a5e0c2caeda4b04dd5631d7546a11

Location: Package overview

From: yarn.locknpm/@matterlabs/hardhat-zksync-telemetry@1.1.1

ℹ Read more on: This package | This alert | What are git dependencies?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Publish the git dependency to npm or a private package repository and consume it from there.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@matterlabs/hardhat-zksync-telemetry@1.1.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

@fusmanii fusmanii merged commit d7d559e into master Sep 16, 2025
10 checks passed
@fusmanii fusmanii deleted the faisal/version-bump branch September 16, 2025 01:47
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants