Skip to content

chore(deps): update dependency solidity-coverage to v0.8.17#14

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/solidity-coverage-0.x-lockfile
Open

chore(deps): update dependency solidity-coverage to v0.8.17#14
renovate[bot] wants to merge 1 commit intomainfrom
renovate/solidity-coverage-0.x-lockfile

Conversation

@renovate
Copy link
Copy Markdown

@renovate renovate Bot commented Oct 7, 2024

This PR contains the following updates:

Package Change Age Confidence
solidity-coverage 0.8.70.8.17 age confidence

Release Notes

sc-forks/solidity-coverage (solidity-coverage)

v0.8.17: 0.8.17 (Osaka Support)

Compare Source

This release contains changes to support the Osaka hardfork (thanks to @​fvictorio 💯 ).

What's Changed

Full Changelog: sc-forks/solidity-coverage@v0.8.16...v0.8.17

v0.8.16: 0.8.16

Compare Source

Support for custom storage layout syntax

This version updates the plugin's parser dependency to support the layout and at keywords introduced in Solidity v0.8.29

What's Changed

Full Changelog: sc-forks/solidity-coverage@v0.8.15...v0.8.16

v0.8.15: 0.8.15

Compare Source

Speed up test runs when using viaIR

This release adds an irMinimum option which should improve execution speeds if you're generating coverage with solc's viaIR mode enabled. The plugin has handled viaIR for about a year but it runs more slowly in that setting because it has to search for execution traces across a wider range of opcodes. The performance hit is especially notable in solidity code that iterates hundreds of times in loops.

NOTE: Not all code will compile withirMinimum (you may get stack-too-deep errors unfortunately). But if yours does, this option should make things faster for you.

Usage

// .solcover.js
module.exports = {
  irMinimum: true,
}
What's Changed
New Contributors

Full Changelog: sc-forks/solidity-coverage@v0.8.14...v0.8.15

v0.8.14: 0.8.14

Compare Source

What's Changed
New Contributors

Full Changelog: sc-forks/solidity-coverage@v0.8.13...v0.8.14

v0.8.13

Compare Source

🐛 Bug Fixes

This release fixes a bug that caused the plugin to error when used with hardhat-viem in combination with a forked network.

What's Changed
New Contributors

Full Changelog: sc-forks/solidity-coverage@v0.8.12...v0.8.13

v0.8.12

Compare Source

What's Changed

  • Adds "work-around" support for the hardhat-viem plugin. If you're using viem, run the coverage task with:
    SOLIDITY_COVERAGE=true npx hardhat coverage
    
  • Adds support for solc v0.4.x
  • Fixes a bug where plugin crashed if the contract sources directory name contained a period.
  • Fixes a bug where instrumentation failed if there was whitespace between require statement and the terminating semi-colon
PRs

Full Changelog: sc-forks/solidity-coverage@v0.8.11...v0.8.12

v0.8.11

Compare Source

===================

  • Check all SWAP opcodes for inst. hashes when viaIR is true (#​873)

v0.8.10

Compare Source

===================

  • Check all PUSH opcodes for instr. hashes when viaIR is true (#​871)

v0.8.9

Compare Source

==================

  • Fix duplicate hash logic (#​868)
  • Improve organization of edge case code in collector (#​869)

v0.8.8

Compare Source

==================

  • Coerce sources path to absolute path if necessary (#​866)
  • Only inject file-level instr. for first pragma in file (#​865)

Configuration

📅 Schedule: Branch creation - Between 12:00 AM and 03:59 AM, only on Monday ( * 0-3 * * 1 ) (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot force-pushed the renovate/solidity-coverage-0.x-lockfile branch from 377351c to 262bd83 Compare November 29, 2024 08:37
@renovate renovate Bot changed the title chore(deps): update dependency solidity-coverage to v0.8.13 chore(deps): update dependency solidity-coverage to v0.8.14 Nov 29, 2024
@renovate renovate Bot force-pushed the renovate/solidity-coverage-0.x-lockfile branch from 262bd83 to 74f44e0 Compare January 24, 2025 07:30
@renovate renovate Bot force-pushed the renovate/solidity-coverage-0.x-lockfile branch from 74f44e0 to bd58f10 Compare February 1, 2025 03:02
@renovate renovate Bot force-pushed the renovate/solidity-coverage-0.x-lockfile branch from bd58f10 to c6a4a29 Compare February 9, 2025 23:11
@renovate renovate Bot force-pushed the renovate/solidity-coverage-0.x-lockfile branch 2 times, most recently from 2f12e39 to 1e02f8b Compare March 12, 2025 04:13
@renovate renovate Bot force-pushed the renovate/solidity-coverage-0.x-lockfile branch 2 times, most recently from 2d24b6f to e03c2ae Compare March 20, 2025 23:56
@renovate renovate Bot force-pushed the renovate/solidity-coverage-0.x-lockfile branch from e03c2ae to c934f28 Compare April 3, 2025 00:21
@socket-security
Copy link
Copy Markdown

socket-security Bot commented Apr 3, 2025

Caution

Review the following alerts detected in dependencies.

According to your organization's Security Policy, you must resolve all "Block" alerts before proceeding. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Block High
viem@1.21.4 has Telemetry.

Note: The code seems to be related to URI manipulation and validation, but the use of dynamic image loading could be an attempt to obfuscate network communication, raising potential security concerns.

From: ?npm/@celo/rainbowkit-celo@1.1.1npm/@wagmi/connectors@3.1.11npm/viem@1.21.4

ℹ Read more on: This package | This alert | What is telemetry?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Most telemetry comes with settings to disable it. Consider disabling telemetry if you do not want to be tracked.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/viem@1.21.4. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block High
viem@2.0.0 has Telemetry.

Note: The code seems to be related to URI manipulation and validation, but the use of dynamic image loading could be an attempt to obfuscate network communication, raising potential security concerns.

From: ?npm/@celo/rainbowkit-celo@1.1.1npm/viem@2.0.0

ℹ Read more on: This package | This alert | What is telemetry?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Most telemetry comes with settings to disable it. Consider disabling telemetry if you do not want to be tracked.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/viem@2.0.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Medium
bufferutil@4.0.9 has Native code.

Location: Package overview

From: ?npm/@celo/rainbowkit-celo@1.1.1npm/@wagmi/connectors@3.1.11npm/viem@2.33.3npm/wagmi@2.16.3npm/bufferutil@4.0.9

ℹ Read more on: This package | This alert | Why is native code a concern?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Verify that the inclusion of native code is expected and necessary for this package's functionality. If it is unnecessary or unexpected, consider using alternative packages without native code to mitigate potential risks.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/bufferutil@4.0.9. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Medium
utf-8-validate@5.0.10 has Native code.

Location: Package overview

From: ?npm/@celo/rainbowkit-celo@1.1.1npm/@wagmi/connectors@3.1.11npm/viem@2.33.3npm/wagmi@2.16.3npm/utf-8-validate@5.0.10

ℹ Read more on: This package | This alert | Why is native code a concern?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Verify that the inclusion of native code is expected and necessary for this package's functionality. If it is unnecessary or unexpected, consider using alternative packages without native code to mitigate potential risks.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/utf-8-validate@5.0.10. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
viem@2.31.0 is a AI-detected potential code anomaly.

Notes: The code implements a cross-chain deposit flow with proper validations, artifact reads, and on-chain interactions. There is no evidence of hidden backdoors, data exfiltration, or malware. The main security considerations relate to token approval logic and correct configuration of flags to avoid granting excessive allowances. Overall, the module appears legitimate for a bridge deposit flow, with moderate risk primarily around configuration of approvals and correct handling of gas/fees.

Confidence: 1.00

Severity: 0.60

From: ?npm/@celo/rainbowkit-celo@1.1.1npm/viem@2.31.0

ℹ Read more on: This package | This alert | What is an AI-detected potential code anomaly?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: An AI system found a low-risk anomaly in this package. It may still be fine to use, but you should check that it is safe before proceeding.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/viem@2.31.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
viem@2.33.3 is a AI-detected potential code anomaly.

Notes: The code implements a cross-chain deposit flow with proper validations, artifact reads, and on-chain interactions. There is no evidence of hidden backdoors, data exfiltration, or malware. The main security considerations relate to token approval logic and correct configuration of flags to avoid granting excessive allowances. Overall, the module appears legitimate for a bridge deposit flow, with moderate risk primarily around configuration of approvals and correct handling of gas/fees.

Confidence: 1.00

Severity: 0.60

From: packages/react-app/package.jsonnpm/viem@2.33.3

ℹ Read more on: This package | This alert | What is an AI-detected potential code anomaly?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: An AI system found a low-risk anomaly in this package. It may still be fine to use, but you should check that it is safe before proceeding.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/viem@2.33.3. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

@renovate renovate Bot force-pushed the renovate/solidity-coverage-0.x-lockfile branch from c934f28 to 7a8ecfb Compare April 12, 2025 00:16
@renovate renovate Bot force-pushed the renovate/solidity-coverage-0.x-lockfile branch from 7a8ecfb to 712c84c Compare April 19, 2025 15:57
@renovate renovate Bot changed the title chore(deps): update dependency solidity-coverage to v0.8.14 chore(deps): update dependency solidity-coverage to v0.8.15 Apr 19, 2025
@renovate renovate Bot force-pushed the renovate/solidity-coverage-0.x-lockfile branch from 712c84c to cc229de Compare April 26, 2025 11:50
@renovate renovate Bot changed the title chore(deps): update dependency solidity-coverage to v0.8.15 chore(deps): update dependency solidity-coverage to v0.8.16 May 11, 2025
@renovate renovate Bot force-pushed the renovate/solidity-coverage-0.x-lockfile branch from cc229de to 49f0579 Compare May 11, 2025 07:43
@socket-security
Copy link
Copy Markdown

socket-security Bot commented May 11, 2025

@renovate renovate Bot force-pushed the renovate/solidity-coverage-0.x-lockfile branch from 49f0579 to 88d4071 Compare May 24, 2025 04:07
@renovate renovate Bot force-pushed the renovate/solidity-coverage-0.x-lockfile branch 2 times, most recently from 8cb9858 to e668c07 Compare June 6, 2025 14:41
@renovate renovate Bot force-pushed the renovate/solidity-coverage-0.x-lockfile branch from e668c07 to ea3624a Compare June 28, 2025 16:16
@renovate renovate Bot force-pushed the renovate/solidity-coverage-0.x-lockfile branch from ea3624a to ce607a7 Compare July 6, 2025 04:00
@renovate renovate Bot force-pushed the renovate/solidity-coverage-0.x-lockfile branch from ce607a7 to 86e50ce Compare August 14, 2025 23:13
Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
@renovate renovate Bot force-pushed the renovate/solidity-coverage-0.x-lockfile branch from 86e50ce to 1761017 Compare December 14, 2025 23:57
@renovate renovate Bot changed the title chore(deps): update dependency solidity-coverage to v0.8.16 chore(deps): update dependency solidity-coverage to v0.8.17 Dec 14, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants