OpenZeppelin / contracts-wizard

Interactive smart contract generator based on OpenZeppelin Contracts.
https://wizard.openzeppelin.com
MIT License
248 stars 137 forks source link

Update lockfile #375

Closed renovate[bot] closed 1 month ago

renovate[bot] commented 3 months ago

This PR contains the following updates:

Update Change
lockFileMaintenance All locks refreshed

🔧 This Pull Request updates lock files to use the latest dependency versions.


Configuration

📅 Schedule: Branch creation - "before 4am on the first day of the month" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

â™» Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.



This PR was generated by Mend Renovate. View the repository job log.

socket-security[bot] commented 3 months ago

New and removed dependencies detected. Learn more about Socket for GitHub ↗︎

Package New capabilities Transitives Size Publisher
npm/@nomicfoundation/hardhat-toolbox@5.0.0 environment Transitive: eval, filesystem, network, shell, unsafe +434 149 MB kanej
npm/pump@3.0.2 None 0 8.76 kB mafintosh

🚮 Removed packages: npm/@openzeppelin/contracts-upgradeable@5.0.2, npm/@rollup/plugin-alias@5.1.1, npm/@rollup/plugin-commonjs@28.0.0, npm/@rollup/plugin-json@6.1.0, npm/@rollup/plugin-node-resolve@15.3.0, npm/@rollup/plugin-replace@5.0.7, npm/@rollup/plugin-typescript@11.1.6, npm/@types/file-saver@2.0.7, npm/@types/resize-observer-browser@0.1.11, npm/autoprefixer@10.4.20, npm/file-saver@2.0.5, npm/jszip@3.10.1, npm/pump@3.0.0, npm/solidity-ast@0.4.59

View full report↗︎

socket-security[bot] commented 3 months ago

🚨 Potential security issues detected. Learn more about Socket for GitHub ↗︎

To accept the risk, merge this PR and you will not be notified again.

Alert Package NoteSourceCI
High CVE npm/ws@7.4.6 🚫

View full report↗︎

Next steps

What is a CVE?

Contains a high severity Common Vulnerability and Exposure (CVE).

Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Take a deeper look at the dependency

Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support [AT] socket [DOT] dev.

Remove the package

If you happen to install a dependency that Socket reports as Known Malware you should immediately remove it and select a different dependency. For other alert types, you may may wish to investigate alternative packages or consider if there are other ways to mitigate the specific risk posed by the dependency.

Mark a package as acceptable risk

To ignore an alert, reply with a comment starting with @SocketSecurity ignore followed by a space separated list of ecosystem/package-name@version specifiers. e.g. @SocketSecurity ignore npm/foo@1.0.0 or ignore all packages with @SocketSecurity ignore-all

  • @SocketSecurity ignore npm/ws@7.4.6