Skip to content

fix(deps): upgrade dependencies to fix security vulnerabilities (STF-446)#608

Closed
Yapeswan wants to merge 2 commits intochangesets:mainfrom
swan-io:stf-446/fix-vuln
Closed

fix(deps): upgrade dependencies to fix security vulnerabilities (STF-446)#608
Yapeswan wants to merge 2 commits intochangesets:mainfrom
swan-io:stf-446/fix-vuln

Conversation

@Yapeswan
Copy link
Copy Markdown

Summary

  • Upgrades jest, @changesets/cli, @actions/core, @actions/github, @changesets/read, and husky to latest compatible versions
  • Fixes CVE-2024-21538 (HIGH 7.7 — cross-spawn via @changesets/read), CVE-2024-4068 (HIGH 7.5 — braces via jest), CVE-2026-1526/2229 (HIGH — @actions/core/github)

References

Test plan

  • CI passes

Addresses CVE-2024-21538 (cross-spawn via @changesets/read), CVE-2024-4068
(braces via jest), and related HIGH severity findings from Wiz.

Fixes: https://linear.app/swan/issue/STF-446
@changeset-bot
Copy link
Copy Markdown

changeset-bot bot commented Apr 17, 2026

⚠️ No Changeset found

Latest commit: 4dc7afc

Merging this PR will not cause a version bump for any packages. If these changes should not result in a new version, you're good to go. If these changes should result in a version bump, you need to add a changeset.

This PR includes no changesets

When changesets are added to this PR, you'll see the packages that this PR includes changesets for and the associated semver types

Click here to learn what changesets are, and how to add one.

Click here if you're a maintainer who wants to add a changeset to this PR

@socket-security
Copy link
Copy Markdown

@socket-security
Copy link
Copy Markdown

Warning

Review the following alerts detected in dependencies.

According to your organization's Security Policy, it is recommended to resolve "Warn" alerts. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Warn Critical
Critical CVE: Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code in npm @babel/traverse

CVE: GHSA-67hx-6x53-jw92 Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code (CRITICAL)

Affected versions: < 7.23.2; >= 8.0.0-alpha.0 < 8.0.0-alpha.4

Patched version: 7.23.2

From: ?npm/@babel/preset-env@7.21.5npm/@babel/traverse@7.21.5

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@babel/traverse@7.21.5. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

@Yapeswan Yapeswan closed this Apr 17, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant