[Aikido] Fix 8 security issues in axios, hono, lodash and 2 more#407
[Aikido] Fix 8 security issues in axios, hono, lodash and 2 more#407aikido-autofix[bot] wants to merge 1 commit intomainfrom
Conversation
|
PR SummaryMedium Risk Overview SDK dev dependency update. Updates Written by Cursor Bugbot for commit 8462784. This will update automatically on new commits. Configure here. |
There was a problem hiding this comment.
Cursor Bugbot has reviewed your changes and found 2 potential issues.
Bugbot Autofix is OFF. To automatically fix reported issues with cloud agents, enable autofix in the Cursor dashboard.
| "react": ">=18.3.1", | ||
| "react-dom": ">=18.3.1", | ||
| "thirdweb": "^5.68.0", | ||
| "thirdweb": "5.93.5-nightly-b51157c0ff17e9535029fc8790cfa8538d1c995f-20250326000337", |
There was a problem hiding this comment.
Nightly thirdweb build pinned in devDependencies
Medium Severity
The thirdweb devDependency was changed from the semver range "^5.68.0" to a specific nightly build "5.93.5-nightly-b51157c0ff17e9535029fc8790cfa8538d1c995f-20250326000337". Nightly builds are inherently unstable, not meant for committed code, and can introduce unexpected breakage. The peer dependency still specifies the stable range "^5.72.0", making this inconsistent. This looks like a testing artifact that wasn't reverted before committing.
| "axios@<=1.13.5": "1.13.5", | ||
| "hono@<=4.12.4": "4.12.4", | ||
| "lodash@<=4.17.23": "4.17.23", | ||
| "js-yaml@<=3.14.2": "3.14.2" |
There was a problem hiding this comment.
Overrides use exact versions instead of minimum ranges
Medium Severity
The new overrides for axios, hono, lodash, and js-yaml pin to exact versions (e.g., "1.13.5") instead of using the >= minimum-range pattern (e.g., ">=1.13.5") that every other override in this file follows. This means future patch releases containing additional security fixes won't be picked up automatically, potentially leaving vulnerabilities unresolved until someone manually bumps these overrides again.


Upgrade axios, hono, lodash, thirdweb, and js-yaml to fix DoS via prototype pollution, authorization bypass via URL decoding mismatch, SSE/cookie injection, and timing-safe authentication vulnerabilities.
✅ 8 CVEs resolved by this upgrade
This PR will resolve the following CVEs:
streamSSE()function fails to validateevent,id, andretryfields for carriage return and newline characters, allowing injection of additional SSE fields that could lead to data manipulation or client-side script injection if rendered unsafely.setCookie()due to insufficient validation of semicolons, carriage returns, and newlines in domain and path options, allowing attackers to manipulate cookie attributes if untrusted input is passed to these fields.basicAuthandbearerAuthmiddlewares where hash value comparison used non-constant-time string equality, potentially allowing timing-based analysis attacks under controlled conditions.🔗 Related Tasks
PR-Codex overview
This PR updates various package dependencies and configurations in the
package.json,pnpm-lock.yaml, and related files, including version upgrades and restructuring of certain properties.Detailed summary
packageManagerinpackage.json.lint-stagedconfiguration format.axios,hono,lodash, andjs-yamlwith specific versions.typesVersionsinpackages/agw-react/package.json.thirdwebversion in multiple places.devDependenciesandpeerDependenciesfor various packages.axios,viem, and others across multiple files.