stellar / stellar-disbursement-platform-backend

Stellar Disbursement Platform Backend
Apache License 2.0
37 stars 22 forks source link

Bump golang.org/x/crypto from 0.25.0 to 0.26.0 in the minor-and-patch group #386

Closed dependabot[bot] closed 3 months ago

dependabot[bot] commented 3 months ago

Bumps the minor-and-patch group with 1 update: golang.org/x/crypto.

Updates golang.org/x/crypto from 0.25.0 to 0.26.0

Commits
  • 5bcd010 go.mod: update golang.org/x dependencies
  • 3375612 ssh: add support for unpadded RSA signatures
  • bb80217 ssh: don't use dsa keys in integration tests
  • 6879722 ssh: remove go 1.21+ dependency on slices
  • e983fa2 sha3: Avo port of keccakf_amd64.s
  • 80fd972 LICENSE: update per Google Legal
  • f2bc3a6 x509roots/fallback/internal/goissue52287: delete
  • d66d9c3 x509roots/fallback: update bundle
  • See full diff in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore major version` will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself) - `@dependabot ignore minor version` will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself) - `@dependabot ignore ` will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) - `@dependabot unignore ` will remove all of the ignore conditions of the specified dependency - `@dependabot unignore ` will remove the ignore condition of the specified dependency and ignore conditions
socket-security[bot] commented 3 months ago

New and removed dependencies detected. Learn more about Socket for GitHub ↗︎

Package New capabilities Transitives Size Publisher
golang/golang.org/x/crypto@v0.26.0 environment, filesystem, network, shell, unsafe 0 3.92 MB

🚮 Removed packages: golang/golang.org/x/crypto@v0.25.0

View full report↗︎

socket-security[bot] commented 3 months ago

🚨 Potential security issues detected. Learn more about Socket for GitHub ↗︎

To accept the risk, merge this PR and you will not be notified again.

Alert Package NoteCI
Network access golang/golang.org/x/crypto@v0.26.0 🚫
Filesystem access golang/golang.org/x/crypto@v0.26.0 🚫
Filesystem access golang/golang.org/x/sync@v0.8.0 🚫
Network access golang/golang.org/x/sync@v0.8.0 🚫
Network access golang/golang.org/x/sys@v0.23.0 🚫
Filesystem access golang/golang.org/x/sys@v0.23.0 🚫
Filesystem access golang/golang.org/x/term@v0.23.0 🚫
Filesystem access golang/golang.org/x/text@v0.17.0 🚫
Network access golang/golang.org/x/text@v0.17.0 🚫

View full report↗︎

Next steps

What is network access?

This module accesses the network.

Packages should remove all network access that is functionally unnecessary. Consumers should audit network access to ensure legitimate use.

What is filesystem access?

Accesses the file system, and could potentially read sensitive data.

If a package must read the file system, clarify what it will read and ensure it reads only what it claims to. If appropriate, packages can leave file system access to consumers and operate on data passed to it instead.

Take a deeper look at the dependency

Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support [AT] socket [DOT] dev.

Remove the package

If you happen to install a dependency that Socket reports as Known Malware you should immediately remove it and select a different dependency. For other alert types, you may may wish to investigate alternative packages or consider if there are other ways to mitigate the specific risk posed by the dependency.

Mark a package as acceptable risk

To ignore an alert, reply with a comment starting with @SocketSecurity ignore followed by a space separated list of ecosystem/package-name@version specifiers. e.g. @SocketSecurity ignore npm/foo@1.0.0 or ignore all packages with @SocketSecurity ignore-all

  • @SocketSecurity ignore golang/golang.org/x/crypto@v0.26.0
  • @SocketSecurity ignore golang/golang.org/x/sync@v0.8.0
  • @SocketSecurity ignore golang/golang.org/x/sys@v0.23.0
  • @SocketSecurity ignore golang/golang.org/x/term@v0.23.0
  • @SocketSecurity ignore golang/golang.org/x/text@v0.17.0
dependabot[bot] commented 3 months ago

Looks like golang.org/x/crypto is updatable in another way, so this is no longer needed.