Skip to content

Update ui deps sync (major)#685

Open
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/major-ui-deps-sync
Open

Update ui deps sync (major)#685
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/major-ui-deps-sync

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Oct 6, 2025

ℹ️ Note

This PR body was truncated due to platform limits.

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
@rollup/plugin-alias (source) ^5.1.1^6.0.0 age adoption passing confidence
@rollup/plugin-commonjs (source) ^28.0.8^29.0.2 age adoption passing confidence
ava (source) ^6.4.1^8.0.0 age adoption passing confidence
openai 5.23.26.36.0 age adoption passing confidence
openai 5.23.26.36.0 age adoption passing confidence
svelte-check ^3.8.6^4.4.8 age adoption passing confidence
svelte-preprocess ^5.1.4^6.0.3 age adoption passing confidence
tailwindcss (source) ^3.4.18^4.2.4 age adoption passing confidence
typescript (source) ^5.9.3^6.0.3 age adoption passing confidence

Release Notes

rollup/plugins (@​rollup/plugin-alias)

v6.0.0

2025-10-28

Breaking Changes
  • feat!: ESM only. Update Node and Rollup minimum versions (#​1926)
rollup/plugins (@​rollup/plugin-commonjs)

v29.0.2

2026-03-06

Bugfixes
  • commonjs: conditional exports (#​1952)

v29.0.1

2026-03-05

Bugfixes
  • commonjs: correctly replaces shorthand "global" property in object (#​1957)

v29.0.0

2025-10-30

Breaking Changes

v28.0.9

2025-10-24

Bugfixes
  • fix: handle node: builtins with strictRequires: auto (#​1930)
avajs/ava (ava)

v8.0.0

Compare Source

Breaking Changes

AVA now expects Node.js 22.20, 24.12 or newer.

Internally AVA is now fully ESM. This is possible now that Node.js supports loading ES modules using require() calls and simplifies AVA's types and internals.

If you use AVA from a CommonJS project you'll have to update your imports:

-const test = require('ava');
+const {default: test} = require('ava');

We expect an increasing number of projects to be ESM only. As per the above, CommonJS is still supported, but we don't expect cjs extensions to be used. The default file extensions are now js and mjs. Specify extensions: ['cjs', 'js', 'mjs'] for AVA to run test files with the cjs extension.

All test files (and those loaded through AVA's require config) are now loaded via import(). Use customization hooks for transpilation. The object form of the extensions configuration is no longer supported.

If you use AVA with @​ava/typescript you must upgrade that package to v7.

New Features

There's two new test modifiers courtesy of @​sindresorhus: test.skipIf() to skip a test based on a runtime condition. test.runIf() is the inverse: the test only runs when the condition is true.

test.skipIf(process.platform === 'win32')('not on Windows', t => {
	t.pass();
});

test.runIf(process.platform === 'linux')('Linux only', t => {
	t.pass();
});

These work with other modifiers like .serial and .failing:

test.serial.skipIf(process.platform === 'win32')('serial, not on Windows', t => {
	t.pass();
});

test.failing.skipIf(process.platform === 'win32')('expected failure, not on Windows', t => {
	t.fail();
});

Other Changes

  • Watch mode now ignores changes to *.tsbuildinfo files
  • TAP reporter is more defensive when restoring the original error name, thanks to @​ninper00 in #​3415
  • Reported errors when throwsAsync/notThrowsAsync are not awaited have been improved by @​sindresorhus in #​3436

New Contributors

Full Changelog: avajs/ava@v7.0.0...v8.0.0

v7.0.0

Compare Source

What's Changed

  • Replace strip-ansi with node:util.stripVTControlCharacters by @​fisker in #​3403
  • Remove support for Node.js 18 and 23; require 20.19 or newer, 22.20 or newer or 24,12 or newer; update dependencies including transitive glob by @​novemberborn in #​3416

Full Changelog: avajs/ava@v6.4.1...v7.0.0

openai/openai-node (openai)

v6.36.0

Compare Source

Full Changelog: v6.35.0...v6.36.0

Features
  • api: add group_type/user metadata fields, update types across admin resources (cc52f97)
  • api: add support for Admin API Keys per endpoint (770d187)
  • api: admin API updates (ee2bd2d)
  • api: manual updates (6af2b6d)
  • api: manual updates (f2dceda)
Bug Fixes
  • api: support admin api key auth (e3862a3)
  • api: tighten auth header selection (f1203bd)
Chores
  • format: run eslint and prettier separately (104543a)
  • internal: codegen related update (05d86da)
  • internal: codegen related update (f184586)

v6.35.0

Compare Source

Full Changelog: v6.34.0...v6.35.0

Features
  • api: Add detail to InputFileContent (910ec5d)
  • api: add OAuthErrorCode type (f84bd1f)
  • api: add prompt_cache_retention parameter to responses compact (c486d1f)
  • api: add web_search_call.results to ResponseIncludable (72449a1)
  • api: manual updates (b742f1f)
  • client: add support for binary messages (c498cc3)
  • client: add support for path parameters in websockets clients (e0aba70)
  • client: add support for queuing messages when waiting for a connection (fd8868c)
  • client: add support for WebSockets in the browser when using simple auth (27bda6a)
  • client: support automatic reconnection for websockets (189410b)
  • typescript: expose underlying WebSocket type (7e96939)
Bug Fixes
  • client: allow single messages greater than the size of the websockets queue (ad19ab2)
  • internal: gitignore generated oidc dir (cf860f6)
  • types: correct prompt_cache_retention enum value in chat/completions and responses (5a81e1a)
  • types: preserve emitted ts-ignore comments (1cde375)
Chores
  • ci: remove release-doctor workflow (e5ab4d1)
  • format: apply prettier output (80fa23d)
  • format: ignore release-updated jsr config (f606e8b)
  • formatter: run prettier and eslint separately (68a988e)
  • internal: codegen related update (7673137)
  • internal: fix package.json duplicate keys (5f075a8)
  • internal: more robust bootstrap script (252e70a)
  • internal: version bump (34c84ee)
  • tests: bump steady to v0.22.1 (316bdba)
Documentation

v6.34.0

Compare Source

Full Changelog: v6.33.0...v6.34.0

Features
  • api: add phase field to Message in conversations (eb7cbc1)
  • client: add support for short-lived tokens (#​839) (a72ebcf)
Bug Fixes
  • api: remove web_search_call.results from ResponseIncludable in responses (1f6968e)
Chores
  • internal: codegen related update (1081460)
  • internal: update multipart form array serialization (3faee8d)
  • tests: bump steady to v0.20.1 (b73cc6b)
Documentation
  • api: add multi-file ingestion recommendations to vector-stores files/file-batches (1bc32a3)

v6.33.0

Compare Source

Full Changelog: v6.32.0...v6.33.0

Features
  • api: add keys field to computer action types (27a850e)
  • client: add async iterator and stream() to WebSocket classes (e1c16ee)
Bug Fixes
  • api: align SDK response types with expanded item schemas (491cd52)
  • types: make type required in ResponseInputMessageItem (2012293)
Chores
  • ci: skip lint on metadata-only changes (74a917f)
  • internal: refactor imports (cfe9c60)
  • internal: update gitignore (71bd114)
  • tests: bump steady to v0.19.4 (f2e9dea)
  • tests: bump steady to v0.19.5 (37c6cf4)
  • tests: bump steady to v0.19.6 (496b3af)
  • tests: bump steady to v0.19.7 (8491eb6)
Refactors
  • tests: switch from prism to steady (47c0581)

v6.32.0

Compare Source

Full Changelog: v6.31.0...v6.32.0

Features
  • api: 5.4 nano and mini model slugs (068df6d)

v6.31.0

Compare Source

Full Changelog: v6.31.0...v6.32.0

Features
  • api: 5.4 nano and mini model slugs (068df6d)

v6.30.1

Compare Source

Full Changelog: v6.30.1...v6.31.0

Features
  • api: add in/nin filter types to ComparisonFilter (b2eda27)

v6.29.0

Compare Source

Full Changelog: v6.29.0...v6.30.0

Features
  • api: add /v1/videos endpoint option to batches (271d879)
  • api: add defer_loading field to NamespaceTool (7cc8f0a)
Bug Fixes
  • api: oidc publishing for npm (fa50066)

v6.28.0

Compare Source

Full Changelog: v6.28.0...v6.29.0

Features

v6.27.0

Compare Source

Full Changelog: v6.26.0...v6.27.0

Features
  • api: The GA ComputerTool now uses the CompuerTool class. The 'computer_use_preview' tool is moved to ComputerUsePreview (0206188)
Chores
  • internal: improve import alias names (9cc2478)

v6.26.0

Compare Source

Full Changelog: v6.26.0...v6.27.0

Features
  • api: The GA ComputerTool now uses the CompuerTool class. The 'computer_use_preview' tool is moved to ComputerUsePreview (0206188)
Chores
  • internal: improve import alias names (9cc2478)

v6.25.0

Compare Source

Full Changelog: v6.24.0...v6.25.0

Features
Bug Fixes
Chores
  • internal: refactor sse event parsing (0ea2380)

v6.24.0

Compare Source

Full Changelog: v6.24.0...v6.25.0

Features
Bug Fixes
Chores
  • internal: refactor sse event parsing (0ea2380)

v6.23.0

Compare Source

Full Changelog: v6.23.0...v6.24.0

Features
  • api: add gpt-realtime-1.5 and gpt-audio-1.5 models to realtime (75875bf)

v6.22.0

Compare Source

Full Changelog: v6.21.0...v6.22.0

Features
  • api: container network_policy and skills (65c1482)
Bug Fixes
  • docs: restore helper methods in API reference (3a4c189)
  • webhooks: restore webhook type exports (49bbf46)
Chores
  • internal: avoid type checking errors with ts-reset (4b0d1f2)
Documentation
  • split api.md by standalone resources (48e07d6)
  • update comment (e3a1ea0)

v6.21.0

Compare Source

Full Changelog: v6.21.0...v6.22.0

Features
  • api: container network_policy and skills (65c1482)
Bug Fixes
  • docs: restore helper methods in API reference (3a4c189)
  • webhooks: restore webhook type exports (49bbf46)
Chores
  • internal: avoid type checking errors with ts-reset (4b0d1f2)
Documentation
  • split api.md by standalone resources (48e07d6)
  • update comment (e3a1ea0)

v6.20.0

Compare Source

Full Changelog: v6.20.0...v6.21.0

Features
  • api: support for images in batch api (017ba1c)

v6.19.0

Compare Source

Full Changelog: v6.19.0...v6.20.0

Features
  • api: skills and hosted shell (e4bdd62)

v6.18.0

Compare Source

Full Changelog: v6.17.0...v6.18.0

Features
  • api: image generation actions for responses; ResponseFunctionCallArgumentsDoneEvent.name (d373c32)
Bug Fixes
  • client: avoid memory leak with abort signals (b449f36)
  • client: avoid removing abort listener too early (1c045f7)
  • client: undo change to web search Find action (8259b45)
  • client: update type for find_in_page action (9aa8d98)
Chores
  • client: do not parse responses with empty content-length (4a118fa)
  • client: restructure abort controller binding (a4d7151)
  • internal: fix pagination internals not accepting option promises (6677905)

v6.17.0

Compare Source

Full Changelog: v6.16.0...v6.17.0

Features
Bug Fixes
  • api: mark assistants as deprecated (3ae2a14)
Chores
  • ci: upgrade actions/github-script (4ea73d3)
  • internal: update actions/checkout version (f163b77)
  • internal: upgrade babel, qs, js-yaml (2e2f3c6)

v6.16.0

Compare Source

Full Changelog: v6.15.0...v6.16.0

Features
  • api: add new Response completed_at prop (ca40534)
  • ci: add breaking change detection workflow (a6f3dea)
Chores
  • break long lines in snippets into multiline (80dee2f)
  • internal: codegen related update (b2fac3e)

v6.15.0

Compare Source

Full Changelog: v6.14.0...v6.15.0

Bug Fixes

v6.14.0

Compare Source

Full Changelog: v6.14.0...v6.15.0

Bug Fixes

v6.13.0

Compare Source

Full Changelog: v6.13.0...v6.14.0

Features

v6.10.0

Compare Source

Full Changelog: v6.9.1...v6.10.0

Features
  • api: gpt-5.1-codex-max and responses/compact (935f79e)
Chores
  • client: fix logger property type (fdc671f)
  • internal: upgrade eslint (9de0f90)

v6.9.1

Compare Source

Full Changelog: v6.9.0...v6.9.1

Bug Fixes
  • api: align types of input items / output items for typescript (99adaa7)

v6.9.0

Compare Source

Full Changelog: v6.9.0...v6.9.1

Bug Fixes
  • api: align types of input items / output items for typescript (99adaa7)

v6.8.1

Compare Source

Full Changelog: v6.8.0...v6.8.1

Bug Fixes
  • api: fix nullability of logprobs (40a403c)

v6.8.0

Compare Source

Full Changelog: v6.7.0...v6.8.0

Features
  • api: Realtime API token_limits, Hybrid searching ranking options (6a5b48c)
  • api: remove InputAudio from ResponseInputContent (9909fef)
Chores
  • internal: codegen related update (3ad52aa)

v6.7.0

Compare Source

Full Changelog: v6.6.0...v6.7.0

Features
Bug Fixes

v6.6.0

Compare Source

Full Changelog: v6.6.0...v6.7.0

Features
Bug Fixes

v6.5.0

Compare Source

Full Changelog: v6.5.0...v6.6.0

Features
  • api: Add responses.input_tokens.count (520c8a9)
Bug Fixes
  • api: internal openapi updates (d4aaef9)

v6.4.0

Compare Source

Full Changelog: v6.4.0...v6.5.0

Features

v6.3.0

Compare Source

Full Changelog: v6.3.0...v6.4.0

Features
  • api: Add support for gpt-4o-transcribe-diarize on audio/transcriptions endpoint (2d27392)

v6.2.0

Compare Source

Full Changelog: v6.2.0...v6.3.0

Features
  • api: comparison filter in/not in (1a733c6)
Chores
  • internal: use npm pack for build uploads (a532410)

v6.1.0

Compare Source

Full Changelog: v6.1.0...v6.2.0

Features
  • api: dev day 2025 launches (f2816db)
Chores
  • internal: codegen related update (b6f64b7)
  • jsdoc: fix @​link annotations to refer only to parts of the package‘s public interface (73e465d)

v6.0.1

Compare Source

Full Changelog: v6.0.1...v6.1.0

Features
  • api: add support for realtime calls (5de9585)

v6.0.0

Compare Source

Full Changelog: v6.0.0...v6.0.1

Bug Fixes
  • api: add status, approval_request_id to MCP tool call (498c6a5)
sveltejs/language-tools (svelte-check)

v4.4.8

Compare Source

Patch Changes
  • feat: typescript 6.0 support (#​2985)

v4.4.7

Compare Source

Patch Changes
  • fix: flush stdout/stderr before exit (#​3014)

  • fix: report diagnostics in tsconfig.json (#​3005)

v4.4.6

Compare Source

Patch Changes
  • fix: prevent config loading message in svelte-check --incremental (#​2974)

  • fix: resolve svelte files with NodeNext in --incremental/tsgo (#​2990)

  • perf: various optimization with ast walk (#​2969)

  • fix: prevent error with escape sequence in attribute (#​2968)

  • fix: typescript 6.0 compatibility (#​2988)

v4.4.5

Compare Source

Patch Changes
  • fix: use Promise for async kit handler return types (#​2966)

v4.4.4

Compare Source

Patch Changes
  • fix: more robust detection of lang="ts" attribute (#​2957)

  • fix: pass filename to warningFilter (#​2959)

  • fix: resolve svelte files under path alias in --incremental/tsgo mode (#​2955)

v4.4.3

Compare Source

Patch Changes
  • fix: respect @ts-ignore etc comments within tags (#​2950)

v4.4.2

Compare Source

Patch Changes
  • fix: resolve shims correctly in --incremental/tsgo mode (cd1ff2f)

  • fix: include references in generated tsconfig.json in --incremental/tsgo mode (1990f74)

v4.4.1

Compare Source

Patch Changes
  • fix: handle relative imports reaching outside working directory when using --incremental/--tsgo flags (#​2942)

  • fix: support SvelteKit zero types in svelte-check --incremental (#​2939)

v4.4.0

Compare Source

Minor Changes
  • feat: provide --incremental and --tsgo flags (#​2932)
Patch Changes
  • fix: ignore Unix domain sockets in file watcher to prevent crashes (#​2931)

  • fix: properly use machine output by default for Claude Code (e9f58d2)

v4.3.6

Compare Source

Patch Changes
  • fix: don't hoist type/snippet referencing $store (#​2926)

v4.3.5

Compare Source

Patch Changes
  • fix: ensure await-block type is preserved in the latest Svelte version (#​2895)

v4.3.4

Compare Source

Patch Changes
  • chore: use machine format when run by Claude Code (#​2870)

v4.3.3

Compare Source

Patch Changes
  • fix: prevent file watcher issue (#​2859)

  • fix: allow undefined and null values for #each in Svelte 5 (#​2863)

  • perf: check if file content changed in tsconfig file watch (#​2859)

v4.3.2

Compare Source

Patch Changes
  • perf: tweak some snapshot hot paths (#​2852)

  • perf: more precise module cache invalidation (#​2853)

  • fix: properly handle runes={false} in <svelte:options> (#​2847)

See https://github.com/sveltejs/language-tools/releases

v4.3.1

Compare Source

fix: handle object literal in MustacheTag (#​2805)

v4.3.0

Compare Source

  • feat: zero types for params (#​2795)
  • feat: add await support (#​2799)
  • fix: strip doctype using AST instead of regex (#​2798)
  • chore: make human output more concise and readable (#​2748)

v4.2.2

Compare Source

  • fix: invalidate project file cache and handle watcher race condition (#​2779)
  • fix: prevent error with bind:this={get, set} (#​2781)
  • fix: don't treat derived imported from svelte/store as a potential store (#​2780)
  • fix: key block can have its own block scope (#​2768)

v4.2.1

Compare Source

  • feat: support generics on snippets (#​2761)

v4.2.0

Compare Source

  • feat: support attachments (#​2760)
  • fix: deduplicate definition for rune-mode components (#​2759)

v4.1.7

Compare Source

  • fix: robustify hoisting logic around prop types (#​2740)
  • fix: ensure typed exports are marked as used (#​2746)
  • chore: bump vscode-html/css-language-service (#​2752)
  • fix: ensure eligible snippets can be referenced in module script (#​2753)
  • fix: prevent error with unclosed tag followed by LF or end of file (#​2750)

v4.1.6

Compare Source

  • fix: prevent unused variable error for bindable
  • fix: ensure exports in runes mode are marked as used
  • fix: add color CLI options

v4.1.5

Compare Source

  • fix: take other snippets into account when checking for hoistability (#​2668)
  • fix: disambiguate render in module script (#​2667)
  • fix: properly transform $props.id when $props is assigned to props ([#​2694](https://redirect.github.com/svelt

Note

PR body was truncated to here.


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • At any time (no schedule defined)
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot requested a review from a team as a code owner October 6, 2025 07:39
@coderabbitai
Copy link
Copy Markdown
Contributor

coderabbitai Bot commented Oct 6, 2025

Important

Review skipped

Auto incremental reviews are disabled on this repository.

Please check the settings in the CodeRabbit UI or the .coderabbit.yaml file in this repository. To trigger a single review, invoke the @coderabbitai review command.

⚙️ Run configuration

Configuration used: Repository UI

Review profile: CHILL

Plan: Pro

Run ID: cd874851-efbf-487f-b8c5-7b988b8d47ca

You can disable this status message by setting the reviews.review_status to false in the CodeRabbit configuration file.

Use the checkbox below for a quick retry:

  • 🔍 Trigger review

Walkthrough

This PR upgrades dependencies in the UI package. The OpenAI dependency is bumped from 5.23.2 to 6.5.0 in both the import map and package.json. Additional devDependencies are also updated: svelte-check, svelte-preprocess, and tailwindcss to newer minor and patch versions.

Changes

Cohort / File(s) Summary
UI package dependency updates
packages/ui/import_map.json, packages/ui/package.json
Upgraded openai from 5.23.2 to 6.5.0; upgraded svelte-check from ^3.8.6 to ^4.3.3; upgraded svelte-preprocess from ^5.1.4 to ^6.0.3; upgraded tailwindcss from ^3.4.18 to ^4.1.14

Estimated code review effort

🎯 2 (Simple) | ⏱️ ~10 minutes

Possibly related PRs

Suggested reviewers

  • ericglau
  • collins-w
🚥 Pre-merge checks | ✅ 3
✅ Passed checks (3 passed)
Check name Status Explanation
Title Check ✅ Passed The PR title "Update ui deps sync (major)" is directly related to the changeset, which consists of major version updates to four UI package dependencies (openai, svelte-check, svelte-preprocess, and tailwindcss). The title clearly conveys the primary change—updating UI dependencies to major versions—and would allow a teammate scanning the commit history to quickly understand the PR's purpose. While the term "sync" is somewhat informal compared to "update," the "(major)" notation effectively emphasizes the significant nature of these version bumps.
Docstring Coverage ✅ Passed No functions found in the changes. Docstring coverage check skipped.
Description check ✅ Passed The PR description clearly documents dependency version updates with detailed release notes and changelogs for each package.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Commit unit tests in branch renovate/major-ui-deps-sync

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

@renovate renovate Bot force-pushed the renovate/major-ui-deps-sync branch 5 times, most recently from e49ac46 to 394311c Compare October 8, 2025 16:38
@socket-security
Copy link
Copy Markdown

socket-security Bot commented Oct 8, 2025

Caution

Review the following alerts detected in dependencies.

According to your organization's Security Policy, you must resolve all "Block" alerts before proceeding. It is recommended to resolve "Warn" alerts too. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Block Critical
Critical CVE: npm fast-xml-parser has an entity encoding bypass via regex injection in DOCTYPE entity names

CVE: GHSA-m7jm-9gc2-mpf2 fast-xml-parser has an entity encoding bypass via regex injection in DOCTYPE entity names (CRITICAL)

Affected versions: >= 5.0.0 < 5.3.5; >= 4.1.3 < 4.5.4

Patched version: 5.3.5

From: packages/core/solidity/src/environments/hardhat/upgradeable/package-lock.jsonnpm/@openzeppelin/hardhat-upgrades@3.9.1npm/fast-xml-parser@5.2.5

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/fast-xml-parser@5.2.5. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Critical
Critical CVE: Handlebars.js has JavaScript Injection via AST Type Confusion

CVE: GHSA-2w6w-674q-4c4q Handlebars.js has JavaScript Injection via AST Type Confusion (CRITICAL)

Affected versions: >= 4.0.0 < 4.7.9

Patched version: 4.7.9

From: packages/core/solidity/src/environments/hardhat/package-lock.jsonnpm/@nomicfoundation/hardhat-toolbox@6.1.0npm/handlebars@4.7.8

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/handlebars@4.7.8. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block High
High CVE: Axios: Header Injection via Prototype Pollution

CVE: GHSA-6chq-wfr3-2hj9 Axios: Header Injection via Prototype Pollution (HIGH)

Affected versions: >= 1.0.0 < 1.15.1; < 0.31.1

Patched version: 1.15.1

From: packages/core/solidity/src/environments/hardhat/package-lock.jsonnpm/@openzeppelin/hardhat-upgrades@3.9.1npm/@nomicfoundation/hardhat-toolbox@6.1.0npm/axios@1.11.0

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/axios@1.11.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block High
High CVE: Axios: Prototype Pollution Gadgets - Response Tampering, Data Exfiltration, and Request Hijacking

CVE: GHSA-pf86-5x62-jrwf Axios: Prototype Pollution Gadgets - Response Tampering, Data Exfiltration, and Request Hijacking (HIGH)

Affected versions: >= 1.0.0 < 1.15.1; < 0.31.1

Patched version: 1.15.1

From: packages/core/solidity/src/environments/hardhat/package-lock.jsonnpm/@openzeppelin/hardhat-upgrades@3.9.1npm/@nomicfoundation/hardhat-toolbox@6.1.0npm/axios@1.11.0

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/axios@1.11.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block High
High CVE: Axios: Incomplete Fix for CVE-2025-62718 — NO_PROXY Protection Bypassed via RFC 1122 Loopback Subnet (127.0.0.0/8) in Axios 1.15.0

CVE: GHSA-pmwg-cvhr-8vh7 Axios: Incomplete Fix for CVE-2025-62718 — NO_PROXY Protection Bypassed via RFC 1122 Loopback Subnet (127.0.0.0/8) in Axios 1.15.0 (HIGH)

Affected versions: >= 1.0.0 < 1.15.1; < 0.31.1

Patched version: 1.15.1

From: packages/core/solidity/src/environments/hardhat/package-lock.jsonnpm/@openzeppelin/hardhat-upgrades@3.9.1npm/@nomicfoundation/hardhat-toolbox@6.1.0npm/axios@1.11.0

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/axios@1.11.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block High
High CVE: Axios has prototype pollution read-side gadgets in HTTP adapter that allow credential injection and request hijacking

CVE: GHSA-q8qp-cvcw-x6jj Axios has prototype pollution read-side gadgets in HTTP adapter that allow credential injection and request hijacking (HIGH)

Affected versions: >= 1.0.0 < 1.15.2

Patched version: 1.15.2

From: packages/core/solidity/src/environments/hardhat/package-lock.jsonnpm/@openzeppelin/hardhat-upgrades@3.9.1npm/@nomicfoundation/hardhat-toolbox@6.1.0npm/axios@1.11.0

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/axios@1.11.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block High
High CVE: Axios is Vulnerable to Denial of Service via __proto__ Key in mergeConfig

CVE: GHSA-43fc-jf86-j433 Axios is Vulnerable to Denial of Service via proto Key in mergeConfig (HIGH)

Affected versions: >= 1.0.0 < 1.13.5; < 0.30.3

Patched version: 1.13.5

From: packages/core/solidity/src/environments/hardhat/package-lock.jsonnpm/@openzeppelin/hardhat-upgrades@3.9.1npm/@nomicfoundation/hardhat-toolbox@6.1.0npm/axios@1.11.0

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/axios@1.11.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block High
High CVE: Axios is vulnerable to DoS attack through lack of data size check

CVE: GHSA-4hjh-wcwx-xvwj Axios is vulnerable to DoS attack through lack of data size check (HIGH)

Affected versions: >= 1.0.0 < 1.12.0; >= 0.28.0 < 0.30.2

Patched version: 1.12.0

From: packages/core/solidity/src/environments/hardhat/package-lock.jsonnpm/@openzeppelin/hardhat-upgrades@3.9.1npm/@nomicfoundation/hardhat-toolbox@6.1.0npm/axios@1.11.0

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/axios@1.11.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block High
High CVE: npm fast-xml-parser has RangeError DoS Numeric Entities Bug

CVE: GHSA-37qj-frw5-hhjh fast-xml-parser has RangeError DoS Numeric Entities Bug (HIGH)

Affected versions: >= 5.0.9 < 5.3.4

Patched version: 5.3.4

From: packages/core/solidity/src/environments/hardhat/upgradeable/package-lock.jsonnpm/@openzeppelin/hardhat-upgrades@3.9.1npm/fast-xml-parser@5.2.5

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/fast-xml-parser@5.2.5. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block High
High CVE: npm fast-xml-parser affected by DoS through entity expansion in DOCTYPE (no expansion limit)

CVE: GHSA-jmr7-xgp7-cmfj fast-xml-parser affected by DoS through entity expansion in DOCTYPE (no expansion limit) (HIGH)

Affected versions: >= 4.1.3 < 4.5.4; >= 5.0.0 < 5.3.6

Patched version: 5.3.6

From: packages/core/solidity/src/environments/hardhat/upgradeable/package-lock.jsonnpm/@openzeppelin/hardhat-upgrades@3.9.1npm/fast-xml-parser@5.2.5

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/fast-xml-parser@5.2.5. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block High
High CVE: npm fast-xml-parser affected by numeric entity expansion bypassing all entity expansion limits (incomplete fix for CVE-2026-26278)

CVE: GHSA-8gc5-j5rx-235r fast-xml-parser affected by numeric entity expansion bypassing all entity expansion limits (incomplete fix for CVE-2026-26278) (HIGH)

Affected versions: >= 5.0.0 < 5.5.6; >= 4.0.0-beta.3 < 4.5.5

Patched version: 5.5.6

From: packages/core/solidity/src/environments/hardhat/upgradeable/package-lock.jsonnpm/@openzeppelin/hardhat-upgrades@3.9.1npm/fast-xml-parser@5.2.5

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/fast-xml-parser@5.2.5. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block High
High CVE: Handlebars.js has JavaScript Injection via AST Type Confusion by tampering @partial-block

CVE: GHSA-3mfm-83xf-c92r Handlebars.js has JavaScript Injection via AST Type Confusion by tampering @partial-block (HIGH)

Affected versions: >= 4.0.0 < 4.7.9

Patched version: 4.7.9

From: packages/core/solidity/src/environments/hardhat/package-lock.jsonnpm/@nomicfoundation/hardhat-toolbox@6.1.0npm/handlebars@4.7.8

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/handlebars@4.7.8. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block High
High CVE: Handlebars.js has Denial of Service via Malformed Decorator Syntax in Template Compilation

CVE: GHSA-9cx6-37pm-9jff Handlebars.js has Denial of Service via Malformed Decorator Syntax in Template Compilation (HIGH)

Affected versions: >= 4.0.0 < 4.7.9

Patched version: 4.7.9

From: packages/core/solidity/src/environments/hardhat/package-lock.jsonnpm/@nomicfoundation/hardhat-toolbox@6.1.0npm/handlebars@4.7.8

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/handlebars@4.7.8. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block High
High CVE: Handlebars.js has JavaScript Injection in CLI Precompiler via Unescaped Names and Options

CVE: GHSA-xjpj-3mr7-gcpf Handlebars.js has JavaScript Injection in CLI Precompiler via Unescaped Names and Options (HIGH)

Affected versions: >= 4.0.0 < 4.7.9

Patched version: 4.7.9

From: packages/core/solidity/src/environments/hardhat/package-lock.jsonnpm/@nomicfoundation/hardhat-toolbox@6.1.0npm/handlebars@4.7.8

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/handlebars@4.7.8. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block High
High CVE: Handlebars.js has JavaScript Injection via AST Type Confusion when passing an object as dynamic partial

CVE: GHSA-xhpv-hc6g-r9c6 Handlebars.js has JavaScript Injection via AST Type Confusion when passing an object as dynamic partial (HIGH)

Affected versions: >= 4.0.0 < 4.7.9

Patched version: 4.7.9

From: packages/core/solidity/src/environments/hardhat/package-lock.jsonnpm/@nomicfoundation/hardhat-toolbox@6.1.0npm/handlebars@4.7.8

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/handlebars@4.7.8. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block High
High CVE: Undici: Malicious WebSocket 64-bit length overflows parser and crashes the client

CVE: GHSA-f269-vfmq-vjvj Undici: Malicious WebSocket 64-bit length overflows parser and crashes the client (HIGH)

Affected versions: >= 6.0.0 < 6.24.0; >= 7.0.0 < 7.24.0

Patched version: 6.24.0

From: packages/core/solidity/src/environments/hardhat/upgradeable/package-lock.jsonnpm/@openzeppelin/hardhat-upgrades@3.9.1npm/undici@6.21.3

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/undici@6.21.3. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Potential code anomaly (AI signal): npm @aws-sdk/core is 100.0% likely to have a medium risk anomaly

Notes: The fragment implements a conventional XML parsing utility suitable for REST/XML responses with normal error normalization. The key security risk is potential leakage of the raw XML payload via error objects ($responseBodyText) if error objects are logged or surfaced. Mitigation should include sanitizing or omitting raw bodies in exceptions, or providing controlled, redacted error details. No malware or backdoors detected; overall risk remains moderate due to potential data leakage in error pathways.

Confidence: 1.00

Severity: 0.60

From: packages/core/solidity/src/environments/hardhat/upgradeable/package-lock.jsonnpm/@openzeppelin/hardhat-upgrades@3.9.1npm/@aws-sdk/core@3.864.0

ℹ Read more on: This package | This alert | What is an AI-detected potential code anomaly?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: An AI system found a low-risk anomaly in this package. It may still be fine to use, but you should check that it is safe before proceeding.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@aws-sdk/core@3.864.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Potential code anomaly (AI signal): npm @aws-sdk/credential-provider-process is 100.0% likely to have a medium risk anomaly

Notes: The code implements credential retrieval via a credential_process mechanism, but the primary risk is executing an external, potentially untrusted command through a shell. This creates a command-injection surface and potential data leakage during credential discovery. Recommended mitigations include replacing exec with a more restricted execution method (e.g., execFile with whitelisted commands or a dedicated, sandboxed runner), validating the credential_process value against a allowlist, adding strict timeouts, and enforcing integrity checks on the credentials source to reduce supply-chain risk.

Confidence: 1.00

Severity: 0.60

From: packages/core/solidity/src/environments/hardhat/upgradeable/package-lock.jsonnpm/@openzeppelin/hardhat-upgrades@3.9.1npm/@aws-sdk/credential-provider-process@3.864.0

ℹ Read more on: This package | This alert | What is an AI-detected potential code anomaly?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: An AI system found a low-risk anomaly in this package. It may still be fine to use, but you should check that it is safe before proceeding.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@aws-sdk/credential-provider-process@3.864.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Low CVE: AWS SDK for JavaScript v3 adopted defense in depth enhancement for region parameter value in npm @smithy/config-resolver

CVE: GHSA-6475-r3vj-m8vf AWS SDK for JavaScript v3 adopted defense in depth enhancement for region parameter value (LOW)

Affected versions: < 4.4.0

Patched version: 4.4.0

From: packages/core/solidity/src/environments/hardhat/upgradeable/package-lock.jsonnpm/@openzeppelin/hardhat-upgrades@3.9.1npm/@smithy/config-resolver@4.1.5

ℹ Read more on: This package | This alert | What is a mild CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known low severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@smithy/config-resolver@4.1.5. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Potential code anomaly (AI signal): npm @smithy/eventstream-serde-universal is 100.0% likely to have a medium risk anomaly

Notes: The code implements a conventional, well-structured event-stream unmarshalling pipeline with explicit handling for error, exception, and event message types. The primary security considerations are: potential exposure of header/body content through thrown errors, reliance on the deserializer contract (notably the $unknown flag), and ensuring that downstream consumers appropriately trust the deserialized payloads. In a supply-chain context, ensure that eventStreamCodec, deserializer implementations, and error handling are trusted and audited to avoid leaking sensitive metadata, and consider sanitizing error messages in production.

Confidence: 1.00

Severity: 0.60

From: packages/core/solidity/src/environments/hardhat/upgradeable/package-lock.jsonnpm/@openzeppelin/hardhat-upgrades@3.9.1npm/@smithy/eventstream-serde-universal@4.0.5

ℹ Read more on: This package | This alert | What is an AI-detected potential code anomaly?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: An AI system found a low-risk anomaly in this package. It may still be fine to use, but you should check that it is safe before proceeding.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@smithy/eventstream-serde-universal@4.0.5. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Potential code anomaly (AI signal): npm @smithy/node-http-handler is 100.0% likely to have a medium risk anomaly

Notes: The code implements conventional 100-continue handling and robust body transmission for HTTP requests. No malicious activity, backdoors, or data exfiltration behaviors are observed in this fragment. While generally safe, consider validating and constraining extremely large bodies and ensuring proper error handling for client/server timeouts in production.

Confidence: 1.00

Severity: 0.60

From: packages/core/solidity/src/environments/hardhat/upgradeable/package-lock.jsonnpm/@openzeppelin/hardhat-upgrades@3.9.1npm/@smithy/node-http-handler@4.1.1

ℹ Read more on: This package | This alert | What is an AI-detected potential code anomaly?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: An AI system found a low-risk anomaly in this package. It may still be fine to use, but you should check that it is safe before proceeding.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@smithy/node-http-handler@4.1.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Potential code anomaly (AI signal): npm @smithy/shared-ini-file-loader is 100.0% likely to have a medium risk anomaly

Notes: The code is straightforward and not inherently malicious. However, it handles potentially sensitive tokens from the filesystem without error handling, validation, or security controls. The primary risk is exposure of SSO tokens if the calling code mishandles them, and potential path traversal if id is not properly sanitized by getSSOTokenFilepath. No evidence of exfiltration, backdoors, or network activity. Recommendations: add input validation, robust error handling for IO and JSON parsing, explicit token schema validation, and consider access controls/logging around token reads.

Confidence: 1.00

Severity: 0.60

From: packages/core/solidity/src/environments/hardhat/upgradeable/package-lock.jsonnpm/@openzeppelin/hardhat-upgrades@3.9.1npm/@smithy/shared-ini-file-loader@4.0.5

ℹ Read more on: This package | This alert | What is an AI-detected potential code anomaly?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: An AI system found a low-risk anomaly in this package. It may still be fine to use, but you should check that it is safe before proceeding.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@smithy/shared-ini-file-loader@4.0.5. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

See 23 more rows in the dashboard

View full report

@renovate renovate Bot force-pushed the renovate/major-ui-deps-sync branch 7 times, most recently from ab19736 to e5f0fb6 Compare October 15, 2025 13:35
@renovate renovate Bot force-pushed the renovate/major-ui-deps-sync branch 3 times, most recently from 2f3fb12 to 9c27729 Compare October 17, 2025 20:04
Copy link
Copy Markdown
Contributor

@coderabbitai coderabbitai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

Caution

Some comments are outside the diff and can’t be posted inline due to platform limitations.

⚠️ Outside diff range comments (1)
packages/ui/package.json (1)

15-45: Critical: Tailwind v4 migration incomplete—build will fail due to missing configuration updates.

The upgrade to Tailwind v4 requires configuration and CSS syntax changes that are not present in this PR:

  1. Missing required dependency: @tailwindcss/postcss not in package.json. Tailwind v4 moved the PostCSS plugin to a separate package; your postcss.config.js requires 'tailwindcss' which no longer exists as a plugin.

  2. Outdated CSS directives:

    • packages/ui/src/common/styles/global.css: Change @tailwind utilities; to @import "tailwindcss";
    • packages/ui/src/common/styles/standalone.css: Likely needs same update
  3. Incompatible preprocessor config: packages/ui/svelte.config.js has postcss: true which will fail when PostCSS can't load the tailwindcss plugin.

Required changes before merge:

  • Add "@tailwindcss/postcss": "next" to devDependencies (or use CSS-first approach by removing postcss config entirely)
  • Update all CSS files from @tailwind directives to @import "tailwindcss"
  • Run npm run build and npm run validate to verify the build succeeds
  • Confirm svelte-check passes with Svelte v3.55.0 + svelte-check v4.3.3

The OpenAI SDK upgrade (v5.23.2→6.5.0) appears compatible with your usage patterns.

🧹 Nitpick comments (1)
packages/ui/package.json (1)

29-29: Consider using a caret range for OpenAI to allow patch/minor updates.

The version is pinned to an exact semver (6.5.0) rather than using a caret range (^6.5.0). While pinning prevents accidental upgrades, it also blocks security patches and minor updates. Most projects use caret ranges for npm dependencies to balance safety and flexibility. If exact pinning is intentional, please document the rationale.

📜 Review details

Configuration used: CodeRabbit UI

Review profile: CHILL

Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 8073313 and 9c27729.

⛔ Files ignored due to path filters (1)
  • yarn.lock is excluded by !**/yarn.lock, !**/*.lock
📒 Files selected for processing (2)
  • packages/ui/import_map.json (1 hunks)
  • packages/ui/package.json (2 hunks)
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (10)
  • GitHub Check: boostsecurity - boostsecurityio/semgrep-pro
  • GitHub Check: check
  • GitHub Check: build (cairo, default)
  • GitHub Check: build (solidity, default)
  • GitHub Check: build (stellar, default)
  • GitHub Check: build (stellar, compile)
  • GitHub Check: build (stylus, default)
  • GitHub Check: format-lint
  • GitHub Check: mcp
  • GitHub Check: semgrep-cloud-platform/scan
🔇 Additional comments (2)
packages/ui/import_map.json (1)

4-4: Verify OpenAI SDK v6 compatibility—significant API migration required.

The OpenAI SDK v6 migrated from node-fetch to builtin fetch, which represents a breaking change. Before merging, you must verify that:

  1. All application code consuming the OpenAI SDK has been updated to work with v6's API (e.g., method signatures, response shapes)
  2. The application builds successfully with the new version
  3. Existing tests pass with v6

Since the PR context shows no code changes related to OpenAI usage, there's a risk that dependent code is incompatible with v6.

packages/ui/package.json (1)

39-40: Verify Svelte ecosystem upgrade—ensure build tools meet minimum requirements.

Svelte 4 is mainly a maintenance release that increases the minimum version requirements, with Node.js 16 now the minimum version and TypeScript 5+ recommended. The package.json shows TypeScript ^5.9.3 (line 44), which satisfies requirements.

However, verify that:

  1. The application builds successfully with svelte-check ^4.3.3
  2. If using SvelteKit, it's version 1.20.4 or newer (check if applicable)
  3. The validate script at line 12 (svelte-check) runs without errors

Comment thread packages/ui/package.json Outdated
"tailwindcss": "^3.4.18",
"svelte-check": "^4.3.3",
"svelte-preprocess": "^6.0.3",
"tailwindcss": "^4.1.14",
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🔴 Critical

🧩 Analysis chain

⚠️ Tailwind CSS v4 requires significant configuration and CSS file updates—verify migration is complete.

Tailwind CSS v4.0 is a major version with necessary updates required from v3 to v4. This update introduces breaking changes that are NOT evident in this PR:

  1. CSS imports: In v4 you import Tailwind using a regular CSS @import statement, not using the @tailwind directives
  2. Preprocessor incompatibility: Tailwind CSS v4.0 is not designed to be used with CSS preprocessors like Sass, Less, or Stylus, and it is not possible to use Sass for <style> blocks in Svelte
  3. Browser support: Tailwind CSS v4.0 is designed for Safari 16.4+, Chrome 111+, and Firefox 128+. If you need to support older browsers, stick with v3.4
  4. Configuration: CSS-first config replaces JavaScript-based tailwind.config.js

The PR shows no corresponding updates to CSS files, Tailwind config, or SCSS/Sass removal. The upgrade tool will handle most of these changes automatically, but there's no evidence it was used. Without these changes, the build will likely fail or styles will break.

Verify the following before merging:

  • All CSS files have been updated to use @import "tailwindcss" instead of @tailwind directives
  • tailwind.config.js has been updated to CSS-first format (or removed if no custom config needed)
  • Any SCSS/Sass files have been converted to plain CSS or removed
  • The build completes successfully and styles render correctly

Run the following verification script:


🏁 Script executed:

#!/bin/bash
# Find and list Tailwind-related config and CSS files

echo "=== Tailwind Config Files ==="
find . -name "tailwind.config.*" -o -name "tailwind.css" -o -name "global.css" | grep -v node_modules

echo ""
echo "=== SCSS/Sass Files (may be incompatible with Tailwind v4) ==="
find . -name "*.scss" -o -name "*.sass" | grep -v node_modules | head -20

echo ""
echo "=== CSS Files Mentioning @tailwind ==="
rg -t css "@tailwind" --no-heading

echo ""
echo "=== SVG/Vue/Svelte Files with Style Blocks Using @tailwind ==="
rg -t svelte -A2 "<style" | grep -A2 "@tailwind"

Length of output: 418


CSS files must be updated to use Tailwind v4 syntax—@tailwind directives are no longer supported.

In v4 you import Tailwind using a regular CSS @import statement, not using the @tailwind directives you used in v3. The PR updates tailwindcss to v4.1.14 but contains two CSS files that still use the deprecated v3 syntax:

  • packages/ui/src/standalone.css:@tailwind utilities;
  • packages/ui/src/common/styles/global.css:@tailwind utilities;

These files must be updated before this PR can be merged. Change @tailwind utilities; to @import "tailwindcss"; in both files.

Additional items to verify:

  • If tailwind.config.js contains custom configuration, it must be explicitly loaded with @config "../../tailwind.config.js"; at the top of your CSS file (or migrated to CSS-first format using @theme)
  • Ensure tailwind.config.js is no longer auto-detected in v4 and add the @config directive if needed
  • If any .svelte, .vue, or other component files use <style> blocks with Tailwind, verify they reference the updated CSS or use the new v4 syntax

@renovate renovate Bot force-pushed the renovate/major-ui-deps-sync branch 6 times, most recently from e3ed09e to 65753f3 Compare October 24, 2025 14:45
@renovate renovate Bot force-pushed the renovate/major-ui-deps-sync branch 5 times, most recently from 574305a to 84def4e Compare October 30, 2025 12:52
@renovate renovate Bot force-pushed the renovate/major-ui-deps-sync branch 5 times, most recently from 856b623 to 9ab9475 Compare November 18, 2025 03:44
@renovate renovate Bot force-pushed the renovate/major-ui-deps-sync branch 7 times, most recently from 9ceae70 to e56267c Compare December 1, 2025 18:54
@renovate renovate Bot force-pushed the renovate/major-ui-deps-sync branch 4 times, most recently from 886ad57 to 98f9d30 Compare December 9, 2025 16:52
@renovate renovate Bot force-pushed the renovate/major-ui-deps-sync branch 5 times, most recently from b394213 to 6bad696 Compare December 16, 2025 20:55
@renovate renovate Bot force-pushed the renovate/major-ui-deps-sync branch 2 times, most recently from ed2eab4 to d865f3b Compare December 20, 2025 08:50
@renovate renovate Bot force-pushed the renovate/major-ui-deps-sync branch 5 times, most recently from bed7122 to 67c2053 Compare January 12, 2026 17:31
@socket-security
Copy link
Copy Markdown

socket-security Bot commented Apr 23, 2026

Review the following changes in direct dependencies. Learn more about Socket for GitHub.

Diff Package Supply Chain
Security
Vulnerability Quality Maintenance License
Added@​nomicfoundation/​hardhat-toolbox@​6.1.0981007685100
Updatedhardhat@​2.26.3 ⏵ 2.26.594 +310092 +297 +280
Added@​openzeppelin/​hardhat-upgrades@​3.9.19810010087100

View full report

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants