Closed alma-renovate-bot[bot] closed 1 month ago
⏳E2E tests are currently running. ➡️ You can follow their progression here.
❌ E2E tests have failed. ➡️ You can find the results here.
⏳E2E tests are currently running. ➡️ You can follow their progression here.
❌ E2E tests have failed. ➡️ You can find the results here.
⏳E2E tests are currently running. ➡️ You can follow their progression here.
❌ E2E tests have failed. ➡️ You can find the results here.
⏳E2E tests are currently running. ➡️ You can follow their progression here.
✅ E2E tests have been successfully completed. ➡️ You can find the results here.
⏳E2E tests are currently running. ➡️ You can follow their progression here.
✅ E2E tests have been successfully completed. ➡️ You can find the results here.
⏳E2E tests are currently running. ➡️ You can follow their progression here.
✅ E2E tests have been successfully completed. ➡️ You can find the results here.
⏳E2E tests are currently running. ➡️ You can follow their progression here.
✅ E2E tests have been successfully completed. ➡️ You can find the results here.
⏳E2E tests are currently running. ➡️ You can follow their progression here.
❌ E2E tests have failed. ➡️ You can find the results here.
⏳E2E tests are currently running. ➡️ You can follow their progression here.
Issues
0 New issues
0 Accepted issues
Measures
0 Security Hotspots
0.0% Coverage on New Code
0.0% Duplication on New Code
⏳E2E tests are currently running. ➡️ You can follow their progression here.
❌ E2E tests have failed. ➡️ You can find the results here.
This PR contains the following updates:
v3.27.0
->v3.29.0
v1.73.0
->v1.87.0
Note: The
pre-commit
manager in Renovate is not supported by thepre-commit
maintainers or community. Please do not report any problems there, instead create a Discussion in the Renovate repository if you have any questions.Release Notes
commitizen-tools/commitizen (commitizen-tools/commitizen)
### [`v3.29.0`](https://redirect.github.com/commitizen-tools/commitizen/blob/HEAD/CHANGELOG.md#v3290-2024-08-11) [Compare Source](https://redirect.github.com/commitizen-tools/commitizen/compare/v3.28.0...v3.29.0) ##### Feat - **bump**: add functionality to write the next version to stdout ### [`v3.28.0`](https://redirect.github.com/commitizen-tools/commitizen/blob/HEAD/CHANGELOG.md#v3280-2024-07-17) [Compare Source](https://redirect.github.com/commitizen-tools/commitizen/compare/v3.27.0...v3.28.0) ##### Feat - add argument to limit length of commit message in checksreturntocorp/semgrep (returntocorp/semgrep)
### [`v1.87.0`](https://redirect.github.com/semgrep/semgrep/releases/tag/v1.87.0) [Compare Source](https://redirect.github.com/returntocorp/semgrep/compare/v1.86.0...v1.87.0) #### [1.87.0](https://redirect.github.com/returntocorp/semgrep/releases/tag/v1.87.0) - 2024-09-13 ##### Added - Semgrep now infers more accurate type information for class fields in TypeScript. This improves taint tracking for dependency injection in TypeScript, such as in the following example: export class AppController { private readonly abstractedService: AbstractedService; constructor(abstractedService: AbstractedService) { this.abstractedService = abstractedService; } async taintTest() { const src = taintedSource(); await this.abstractedService.sinkInHere(src); } } ``` (code-7591) - Semgrep's interfile analysis (available with the Pro Engine) now ships with information about Python's standard library, improving its ability to resolve names and types in Python code and therefore its ability to produce findings. (py-libdefs) - Added support for comparing Golang pre-release versions. With this, strict core versions, pseudo-versions and pre-release versions can all be compared to each other. (sc-1739) ##### Changed - If there is an OOM error during interfile dataflow analysis (`--pro`) Semgrep will now try to recover from it and continue the interfile analysis without falling back immediately to intrafile analysis. This allows using `--max-memory` with `--pro` in a more effective way. (flow-81) - Consolidates lockfile parsing logic to happen once, at the beginning of the scan. This consolidated parsing now considers both changed and unchanged lockfiles during all steps of diff scans. ([gh-2051](https://redirect.github.com/returntocorp/semgrep/issues/2051)) ##### Fixed - pro: taint-mode: Restore missing taint findings after having improved index- sensitivity: def foo(t): x = third_party_func(t) return x def test1(): t = ("ok", taint) y = foo(t) sink(y) # now it's found! (code-7486) - The Semgrep proprietary engine added a new entropy analyzer `entropy_v2` that supports strictness options. ([gh-1641](https://redirect.github.com/returntocorp/semgrep/issues/1641)) ### [`v1.86.0`](https://redirect.github.com/semgrep/semgrep/releases/tag/v1.86.0) [Compare Source](https://redirect.github.com/returntocorp/semgrep/compare/v1.85.0...v1.86.0) #### [1.86.0](https://redirect.github.com/returntocorp/semgrep/releases/tag/v1.86.0) - 2024-09-04 ##### Added - The taint analysis can now track method invocations on variables of an interface type, when there is a single implementation. For example, the tainted input vulnerability can now be detected in the following code: ```java public interface MovieService { String vulnerableInjection(String input); } @Service public class MovieServiceImpl implements MovieService { @Override public String vulnerableInjection(String input) { return sink(input); } } @RestController("/") public class SpringController { @Autowired private MovieService movieService; @GetMapping("/pwn") public String pwnTest(@RequestParam("input") String taintedInput) { return movieService.vulnerableInjection(taintedInput); } } ``` When there are multiple implementations, the taint analysis will not follow any of them. We will add handling of cases with multiple implementations in upcoming updates. (code-7434) - Uses of values imported via ECMAScript `default` imports (e.g., `import example from 'mod';`) can now be matched by qualified name patterns (e.g., `mod.default`). (code-7463) - Pro: taint-mode: Allow (experimental) control taint to propagate through `return`s. Now this taint rule: pattern-sources: - control: true pattern: taint() pattern-sinks: - pattern: sink() It is able to find this: def foo(): taint() def test(): foo() sink() # now it is found! (code-7490) - A new flag --max-log-list-entries allows to control the maximum number of entries that will be shown in the log (e.g., list of rule ids, list of skipped files). A zero or negative value disables this filter. The previous hardcoded limit was at 100 (and now becomes a default value). (max_log_list_entries) ##### Changed - Semgrep will now log memory-related warnings/errors when run in `--debug` mode, without the need to set `SEMGREP_LOG_SRCS=process_limits`. (logging) ##### Fixed - Fixed inter-file constant propagation to prevent some definitions from being incorrectly identified as constant, when they are modified in other parts of the codebase. (code-6793) - pro: taint-mode: Fixed bug in taint signature instantiation that could cause an update to a field in a nested object to not be tracked. For example, in the code below, Semgrep knew that `Nested.update` updates the `fld` attribute of a `Nested` object` . But due to this bug, Semgrep would not know that `Wrapper.update`updated the`fld`attribute of the`nested`object attribute in a`Wrapper\` object. public class Nested { private String fld; public void update(String str) { fld = str; } // ... } public class Wrapper { private Nested nested; public void update(String str) { this.nested.update(str); } // ... } (code-7499) - Fixed incorrect range matching parametrized type expressions in Julia ([gh-10467](https://redirect.github.com/returntocorp/semgrep/issues/10467)) - Fixed an edge case that could lead to a failure to name or type imported Python symbols during interfile analysis. (py-imports) - Fix overly-aggressive match deduplication that could, under certain circumstances, lead to findings being closed and reopened in the app. (saf-1465) - Fixed regex-fix numbered capture groups, where it used to be the case that a `replacement:` regex with numbered capture groups like `\1\2\3` would effectivly be the same as `\1\1\1`. After the fix: ```python ``` ### src.py 12345 ```yaml pattern: $X fix-regex: regex: (1)(2)(3)(4)(5) replacement: \5\4\3\2\1 actually results in the fix ````python 54321 ``` (saf-1497) ```` ### [`v1.85.0`](https://redirect.github.com/semgrep/semgrep/releases/tag/v1.85.0) [Compare Source](https://redirect.github.com/returntocorp/semgrep/compare/v1.84.1...v1.85.0) #### [1.85.0](https://redirect.github.com/returntocorp/semgrep/releases/tag/v1.85.0) - 2024-08-15 ##### Added - Semgrep now recognizes files ending with the extention `.tfvars` as terraform files (saf-1481) ##### Changed - The use of --debug will not generate anymore profiling information. Use --time instead. (debug) - Updated link to the Supply Chain findings page on Semgrep AppSec Platform to filter to the specific repository and ref the findings are detected on. (secw-2395) ##### Fixed - Fixed an error with julia list comprehentions where the pattern: [$A for $B in $C] would match ```julia [x for y in z] ``` However we would only get one binding \[$A/x] Behavior after fix: we get three bindings \[$A/x,$B/y,$C/z] (saf-1480) ### [`v1.84.1`](https://redirect.github.com/semgrep/semgrep/releases/tag/v1.84.1) [Compare Source](https://redirect.github.com/returntocorp/semgrep/compare/v1.84.0...v1.84.1) #### [1.84.1](https://redirect.github.com/returntocorp/semgrep/releases/tag/v1.84.1) - 2024-08-07 No significant changes. ### [`v1.84.0`](https://redirect.github.com/semgrep/semgrep/releases/tag/v1.84.0) [Compare Source](https://redirect.github.com/returntocorp/semgrep/compare/v1.83.0...v1.84.0) #### [1.84.0](https://redirect.github.com/returntocorp/semgrep/releases/tag/v1.84.0) - 2024-08-06 ##### Changed - We switch from magenta to yellow when highlighting matches with the medium or warning severity. We now use magenta for cricical severity to be consistent with other tools such as npm. (color) ##### Fixed - Workaround deadlock when interfile is run with j>1 and tracing is enabled. (saf-1157) - FixedConfiguration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR has been generated by Renovate Bot.