fix: patch moderate/high security vulnerabilities in dependencies#416
Merged
luwes merged 1 commit intomuxinc:mainfrom Mar 20, 2026
Merged
fix: patch moderate/high security vulnerabilities in dependencies#416luwes merged 1 commit intomuxinc:mainfrom
luwes merged 1 commit intomuxinc:mainfrom
Conversation
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #416 +/- ##
=======================================
Coverage 87.29% 87.29%
=======================================
Files 37 37
Lines 3211 3211
Branches 472 477 +5
=======================================
Hits 2803 2803
- Misses 405 408 +3
+ Partials 3 0 -3 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
✅ Snyk checks have passed. No issues have been found so far.
💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse. |
luwes
pushed a commit
that referenced
this pull request
Mar 20, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Addresses security vulnerabilities reported by
npm audit:undici: bumped from^5.28.4to^6.23.0to fix unbounded decompression chain (GHSA-g9mf-h72j-4rw9), HTTP request/response smuggling (GHSA-2mjp-6q6p-2qxm), and other high-severity issues@vercel/blob: bumped from^2.0.0to^2.0.1— this version pinsundici@^6.23.0, resolving the transitive vulnerability@isaacs/brace-expansionand other dev dependencies: updated vianpm audit fixThe
undiciv5 → v6 upgrade has no functional impact on this codebase. All exported APIs used (fetch,request) remain unchanged. Node.js ≥ 18 is already required by Next.js.Closes #412
Closes #413
Test plan
npm testpasses (48 tests, 0 failures)npm auditno longer reportsundicior@vercel/blobvulnerabilitiesnpm run build)Note
Medium Risk
Upgrades
undicito v6 and refreshes the lockfile (including AWS SDK transitive updates), which can affect runtime HTTP behavior and Node engine expectations despite no direct code changes.Overview
This PR is a dependency/security patch update: it bumps
undicifrom v5 to v6 and updates@vercel/blobto pick up the fixedundiciversion.It also regenerates
package-lock.json(and the example app lockfile), pulling in newer transitive versions (notably a large set of AWS SDK/Smithy packages and some tooling deps) and marking several packages aspeerin the lock metadata.Written by Cursor Bugbot for commit 2eead6a. This will update automatically on new commits. Configure here.