WardPearce / paaster

Paaster is a secure and user-friendly pastebin application that prioritizes privacy and simplicity. With end-to-end encryption and paste history, Paaster ensures that your pasted code remains confidential and accessible.
https://paaster.io
GNU Affero General Public License v3.0
453 stars 18 forks source link

chore(deps-dev): bump @sveltejs/kit from 2.7.0 to 2.7.4 in /frontend #689

Closed dependabot[bot] closed 1 week ago

dependabot[bot] commented 1 week ago

Bumps @sveltejs/kit from 2.7.0 to 2.7.4.

Release notes

Sourced from @​sveltejs/kit's releases.

@​sveltejs/kit@​2.7.4

Patch Changes

  • fix: ensure element is focused after subsequent clicks of the same hash link (#12866)

  • fix: avoid preload if event default was prevented for touchstart and mousedown events (#12887)

  • fix: avoid reloading behaviour for hash links with data-sveltekit-reload if the hash is on the same page (#12866)

@​sveltejs/kit@​2.7.3

Patch Changes

  • fix: include importer in illegal import error message (#12820)

  • fix: don't try reading assets directly that aren't present (#12876)

  • fix: decode non-latin characters when previewing prerendered pages (#12874)

  • fix: better error message when a Result is returned from a form action (#12829)

  • docs: update URLs for new svelte.dev site (#12857)

@​sveltejs/kit@​2.7.2

Patch Changes

  • fix: use absolute links in JSDoc comments (#12718)

@​sveltejs/kit@​2.7.1

Patch Changes

  • chore: upgrade to sirv 3.0 (#12796)

  • fix: warn when form action responses are lost because SSR is off (#12063)

Changelog

Sourced from @​sveltejs/kit's changelog.

2.7.4

Patch Changes

  • fix: ensure element is focused after subsequent clicks of the same hash link (#12866)

  • fix: avoid preload if event default was prevented for touchstart and mousedown events (#12887)

  • fix: avoid reloading behaviour for hash links with data-sveltekit-reload if the hash is on the same page (#12866)

2.7.3

Patch Changes

  • fix: include importer in illegal import error message (#12820)

  • fix: don't try reading assets directly that aren't present (#12876)

  • fix: decode non-latin characters when previewing prerendered pages (#12874)

  • fix: better error message when a Result is returned from a form action (#12829)

  • docs: update URLs for new svelte.dev site (#12857)

2.7.2

Patch Changes

  • fix: use absolute links in JSDoc comments (#12718)

2.7.1

Patch Changes

  • chore: upgrade to sirv 3.0 (#12796)

  • fix: warn when form action responses are lost because SSR is off (#12063)

Commits


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
vercel[bot] commented 1 week ago

The latest updates on your projects. Learn more about Vercel for Git ↗︎

Name Status Preview Comments Updated (UTC)
paaster ✅ Ready (Inspect) Visit Preview 💬 Add feedback Nov 4, 2024 9:22am
socket-security[bot] commented 1 week ago

New and removed dependencies detected. Learn more about Socket for GitHub ↗︎

Package New capabilities Transitives Size Publisher
npm/@sveltejs/kit@2.7.4 environment, eval Transitive: filesystem +18 1.57 MB svelte-admin
pypi/dnspython@2.6.1 environment, eval, filesystem, network, shell, unsafe 0 1.78 MB rthalley
pypi/exceptiongroup@1.1.3 environment, eval 0 115 kB
pypi/faker@25.0.1 environment, eval, unsafe 0 8.55 MB curella.org, joke2k
pypi/frozenlist@1.4.0 environment, filesystem, unsafe 0 946 kB Andrew.Svetlov, mj, webknjaz
pypi/h11@0.14.0 environment, eval, filesystem, network, shell 0 339 kB njs, pgjones
pypi/httpcore@1.0.5 environment, network 0 490 kB tomchristie
pypi/httpx@0.27.0 environment, filesystem, network, unsafe 0 645 kB florimondmanca, tomchristie, yeraydiazdiaz
pypi/idna@3.7 filesystem, network 0 1.1 MB kjd
pypi/iniconfig@2.0.0 filesystem 0 15.4 kB hpk, ronny
pypi/jmespath@1.0.1 environment, eval, filesystem 0 108 kB aws, jamesls
pypi/litestar@2.12.1 None 0 0 B
pypi/markdown-it-py@3.0.0 eval, filesystem, shell 0 264 kB cjsewell, ebp-bot
pypi/mdurl@0.1.2 None 0 25.7 kB hukkin
pypi/motor-types@1.0.0b4 None 0 77.5 kB Lord-Zero
pypi/motor@3.6.0 None 0 0 B
pypi/msgspec@0.18.6 None 0 531 kB jcrist

🚮 Removed packages: npm/@sveltejs/kit@2.7.0

View full report↗︎

socket-security[bot] commented 1 week ago

🚨 Potential security issues detected. Learn more about Socket for GitHub ↗︎

To accept the risk, merge this PR and you will not be notified again.

Alert Package NoteSourceCI
AI-detected potential code anomaly pypi/jmespath@1.0.1
  • Notes: The code contains multiple potential security risks, including unauthorized file writes, command injection, information leakage, and code injection. It should be reviewed and modified to ensure proper input validation, sanitization, and secure handling of user input. The presence of 'eval' raises concerns about the safety and security of the code.
  • Confidence: 0.80
  • Severity: 0.70
🚫
AI-detected potential code anomaly pypi/frozenlist@1.4.0
  • Notes: The code contains multiple potential security risks, including unauthorized file writes, command injection, information leakage, and code injection. It should be reviewed and modified to ensure proper input validation, sanitization, and secure handling of user input. The presence of 'eval' raises concerns about the safety and security of the code.
  • Confidence: 0.80
  • Severity: 0.70
🚫
Network access pypi/h11@0.14.0 🚫
AI-detected potential code anomaly pypi/h11@0.14.0
  • Notes: The code contains multiple potential security risks, including unauthorized file writes, command injection, information leakage, and code injection. It should be reviewed and modified to ensure proper input validation, sanitization, and secure handling of user input. The presence of 'eval' raises concerns about the safety and security of the code.
  • Confidence: 0.80
  • Severity: 0.70
🚫
Network access pypi/h11@0.14.0 🚫
Shell access pypi/h11@0.14.0 🚫
Shell access pypi/markdown-it-py@3.0.0 🚫
Native code pypi/msgspec@0.18.6 🚫
Native code pypi/msgspec@0.18.6 🚫
Native code pypi/msgspec@0.18.6 🚫
Native code pypi/msgspec@0.18.6 🚫
Native code pypi/msgspec@0.18.6 🚫
Native code pypi/msgspec@0.18.6 🚫
Native code pypi/msgspec@0.18.6 🚫
Native code pypi/msgspec@0.18.6 🚫
Native code pypi/msgspec@0.18.6 🚫
Native code pypi/msgspec@0.18.6 🚫
Native code pypi/msgspec@0.18.6 🚫
Native code pypi/msgspec@0.18.6 🚫
Native code pypi/msgspec@0.18.6 🚫
Native code pypi/msgspec@0.18.6 🚫
Native code pypi/msgspec@0.18.6 🚫
Native code pypi/msgspec@0.18.6 🚫
Native code pypi/msgspec@0.18.6 🚫
Native code pypi/msgspec@0.18.6 🚫
Native code pypi/msgspec@0.18.6 🚫
Network access pypi/dnspython@2.6.1 🚫
Network access pypi/dnspython@2.6.1 🚫
Shell access pypi/dnspython@2.6.1 🚫
Network access pypi/httpcore@1.0.5 🚫
Network access pypi/httpcore@1.0.5 🚫
Network access pypi/idna@3.7 🚫
AI-detected potential code anomaly pypi/faker@25.0.1
  • Notes: The code contains multiple potential security risks, including unauthorized file writes, command injection, information leakage, and code injection. It should be reviewed and modified to ensure proper input validation, sanitization, and secure handling of user input. The presence of 'eval' raises concerns about the safety and security of the code.
  • Confidence: 0.80
  • Severity: 0.70
🚫
Network access pypi/httpx@0.27.0 🚫
Install scripts npm/@sveltejs/kit@2.7.4
  • Install script: postinstall
  • Source: node postinstall.js
🚫

View full report↗︎

Next steps

What is an AI-detected potential code anomaly?

AI has identified unusual behaviors that may pose a security risk.

An AI system found a low-risk anomaly in this package. It may still be fine to use, but you should check that it is safe before proceeding.

What is network access?

This module accesses the network.

Packages should remove all network access that is functionally unnecessary. Consumers should audit network access to ensure legitimate use.

What is shell access?

This module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.

Packages should avoid accessing the shell which can reduce portability, and make it easier for malicious shell access to be introduced.

Why is native code a concern?

Contains native code (e.g., compiled binaries or shared libraries). Including native code can obscure malicious behavior.

Verify that the inclusion of native code is expected and necessary for this package's functionality. If it is unnecessary or unexpected, consider using alternative packages without native code to mitigate potential risks.

What is an install script?

Install scripts are run when the package is installed. The majority of malware in npm is hidden in install scripts.

Packages should not be running non-essential scripts during install and there are often solutions to problems people solve with install scripts that can be run at publish time instead.

Take a deeper look at the dependency

Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support [AT] socket [DOT] dev.

Remove the package

If you happen to install a dependency that Socket reports as Known Malware you should immediately remove it and select a different dependency. For other alert types, you may may wish to investigate alternative packages or consider if there are other ways to mitigate the specific risk posed by the dependency.

Mark a package as acceptable risk

To ignore an alert, reply with a comment starting with @SocketSecurity ignore followed by a space separated list of ecosystem/package-name@version specifiers. e.g. @SocketSecurity ignore npm/foo@1.0.0 or ignore all packages with @SocketSecurity ignore-all

  • @SocketSecurity ignore pypi/jmespath@1.0.1
  • @SocketSecurity ignore pypi/frozenlist@1.4.0
  • @SocketSecurity ignore pypi/h11@0.14.0
  • @SocketSecurity ignore pypi/markdown-it-py@3.0.0
  • @SocketSecurity ignore pypi/msgspec@0.18.6
  • @SocketSecurity ignore pypi/dnspython@2.6.1
  • @SocketSecurity ignore pypi/httpcore@1.0.5
  • @SocketSecurity ignore pypi/idna@3.7
  • @SocketSecurity ignore pypi/faker@25.0.1
  • @SocketSecurity ignore pypi/httpx@0.27.0
  • @SocketSecurity ignore npm/@sveltejs/kit@2.7.4
dependabot[bot] commented 1 week ago

Superseded by #696.