Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Security upgrade axios from 1.6.7 to 1.8.2 #4738

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

prernaadev01
Copy link
Collaborator

snyk-top-banner

Snyk has created this PR to fix 1 vulnerabilities in the npm dependencies of this project.

Snyk changed the following file(s):

  • guardian-cli/package.json
  • guardian-cli/package-lock.json

Vulnerabilities that will be fixed with an upgrade:

Issue Score
medium severity Server-side Request Forgery (SSRF)
SNYK-JS-AXIOS-9292519
  703  

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Server-side Request Forgery (SSRF)

…duce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-AXIOS-9292519
@prernaadev01 prernaadev01 requested review from a team as code owners March 8, 2025 08:26
@prernaadev01 prernaadev01 requested a review from pathornteng March 8, 2025 08:26
Copy link

github-actions bot commented Mar 8, 2025

Test Results

 34 files   -  98   73 suites   - 198   11m 18s ⏱️ - 25m 9s
 37 tests  - 430   36 ✅  - 431  0 💤 ±0  1 ❌ +1 
167 runs   - 302  166 ✅  - 303  0 💤 ±0  1 ❌ +1 

For more details on these failures, see this check.

Results for commit ebf713d. ± Comparison against base commit 4ed1bf5.

This pull request removes 431 and adds 1 tests. Note that renamed tests count towards both.
Add file from ipfs for dry run mode with empty auth token - Negative ‑ IPFS Add file from ipfs for dry run mode with empty auth token - Negative
Add file from ipfs for dry run mode with invalid auth token - Negative ‑ IPFS Add file from ipfs for dry run mode with invalid auth token - Negative
Add file from ipfs for dry run mode without auth token - Negative ‑ IPFS Add file from ipfs for dry run mode without auth token - Negative
Add file from ipfs for dry run mode ‑ IPFS Add file from ipfs for dry run mode
Add file to ipfs with empty auth token - Negative ‑ IPFS Add file to ipfs with empty auth token - Negative
Add file to ipfs with invalid auth token - Negative ‑ IPFS Add file to ipfs with invalid auth token - Negative
Add file to ipfs without auth token - Negative ‑ IPFS Add file to ipfs without auth token - Negative
Add file to ipfs ‑ IPFS Add file to ipfs
Add wipe contract admin(retire) permissions with empty auth token - Negative ‑ Contracts Add wipe contract admin(retire) permissions with empty auth token - Negative
Add wipe contract admin(retire) with invalid auth token - Negative ‑ Contracts Add wipe contract admin(retire) with invalid auth token - Negative
…
"before all" hook for "Deletes the module with the provided module ID with invalid artifact id - Negative" ‑ Modules "before all" hook for "Deletes the module with the provided module ID with invalid artifact id - Negative"

♻️ This comment has been updated with latest results.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants