Skip to content

Conversation

fusmanii
Copy link
Contributor

No description provided.

Signed-off-by: Faisal Usmani <[email protected]>
@fusmanii fusmanii force-pushed the faisal/udpate-readme branch from adffb7b to 04e0be3 Compare August 27, 2025 21:06
Signed-off-by: Faisal Usmani <[email protected]>
Copy link

Review the following changes in direct dependencies. Learn more about Socket for GitHub.

Diff Package Supply Chain
Security
Vulnerability Quality Maintenance License
Added@​nomicfoundation/​solidity-analyzer-darwin-arm64@​0.1.01001003678100
Added@​nomicfoundation/​solidity-analyzer-darwin-x64@​0.1.01001003678100
Added@​nomicfoundation/​solidity-analyzer-freebsd-x64@​0.1.0911003678100
Added@​nomicfoundation/​solidity-analyzer-linux-arm64-gnu@​0.1.01001003678100
Added@​nomicfoundation/​solidity-analyzer-linux-arm64-musl@​0.1.01001003678100
Added@​nomicfoundation/​solidity-analyzer-linux-x64-gnu@​0.1.01001003678100
Added@​nomicfoundation/​solidity-analyzer-linux-x64-musl@​0.1.01001003678100
Added@​nomicfoundation/​solidity-analyzer-win32-arm64-msvc@​0.1.0911003678100
Added@​nomicfoundation/​solidity-analyzer-win32-ia32-msvc@​0.1.0911003678100
Added@​nomicfoundation/​solidity-analyzer-win32-x64-msvc@​0.1.01001003678100
Added@​matterlabs/​zksync-contracts@​0.2.4751003688100
Addedarray-buffer-byte-length@​1.0.0671007351100
Addedconstant-case@​2.0.01001005176100
Addedaggregate-error@​3.1.0671008551100
Addedarray.prototype.flat@​1.2.5671009152100
Addedarray.prototype.reduce@​1.0.5671009052100
Addedarray-includes@​3.1.4671009952100
Addedboolbase@​1.0.01001005276100
Addedbabel-helper-optimise-call-expression@​6.24.11001005380100
Addedcamel-case@​3.0.01001005376100
Addedbabel-helper-get-function-arity@​6.24.11001005480100
Added@​types/​parse-json@​4.0.01001005577100
Addedat-least-node@​1.0.01001005876100
Addedbabel-helper-regex@​6.26.01001005980100
Addedcopy-descriptor@​0.1.11001006076100
Addedbabel-helper-builder-binary-assignment-operator-visitor@​6.24.11001006180100
Addedbabel-helper-call-delegate@​6.24.11001006280100
Addedbabel-helper-hoist-variables@​6.24.11001006280100
Addedbabel-helper-explode-assignable-expression@​6.24.11001006280100
Added@​types/​mkdirp@​0.5.21001006276100
Added@​types/​responselike@​1.0.01001006376100
Added@​resolver-engine/​imports-fs@​0.3.3100100637870
See 281 more rows in the dashboard

View full report

Copy link

Warning

Review the following alerts detected in dependencies.

According to your organization's Security Policy, it is recommended to resolve "Warn" alerts. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Warn Critical
@openzeppelin/[email protected] has a Critical CVE.

CVE: GHSA-fg47-3c2x-m2wr TimelockController vulnerability in OpenZeppelin Contracts (CRITICAL)

Affected versions: >= 4.0.0 < 4.3.1; >= 3.3.0 < 3.4.2

Patched version: 4.3.1

From: yarn.locknpm/@across-protocol/[email protected]npm/@openzeppelin/[email protected]

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@openzeppelin/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
@openzeppelin/[email protected] has a Critical CVE.

CVE: GHSA-5vp3-v4hc-gx76 UUPSUpgradeable vulnerability in @openzeppelin/contracts (CRITICAL)

Affected versions: >= 4.1.0 < 4.3.2

Patched version: 4.3.2

From: yarn.locknpm/@across-protocol/[email protected]npm/@openzeppelin/[email protected]

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@openzeppelin/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
[email protected] has a Critical CVE.

CVE: GHSA-67hx-6x53-jw92 Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code (CRITICAL)

Affected versions: >= 0

Patched version: No patched versions

From: yarn.locknpm/[email protected]npm/[email protected]

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
@matterlabs/[email protected] has a Git dependency.

Dependency: @matterlabs/zksync-telemetry-js@git+https://github.com/matter-labs/zksync-telemetry-js.git#2fd9edbe6b9a5e0c2caeda4b04dd5631d7546a11

Location: Package overview

From: yarn.locknpm/@matterlabs/[email protected]

ℹ Read more on: This package | This alert | What are git dependencies?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Publish the git dependency to npm or a private package repository and consume it from there.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@matterlabs/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

@fusmanii fusmanii merged commit 7a4ecc2 into master Sep 4, 2025
10 checks passed
@fusmanii fusmanii deleted the faisal/udpate-readme branch September 4, 2025 14:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants