Skip to content

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Jun 3, 2024

This PR contains the following updates:

Update Change
lockFileMaintenance All locks refreshed

🔧 This Pull Request updates lock files to use the latest dependency versions.


Configuration

📅 Schedule: Branch creation - "before 4am on monday" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/lock-file-maintenance branch from e01e7e8 to 857348f Compare June 28, 2024 22:35
@renovate renovate bot force-pushed the renovate/lock-file-maintenance branch from 857348f to b7b6d0d Compare July 31, 2024 02:06
@renovate renovate bot force-pushed the renovate/lock-file-maintenance branch from b7b6d0d to 95c2054 Compare September 24, 2024 18:25
@socket-security
Copy link

socket-security bot commented Sep 24, 2024

Review the following changes in direct dependencies. Learn more about Socket for GitHub.

Diff Package Supply Chain
Security
Vulnerability Quality Maintenance License
Updatednpm/​@​types/​node@​20.12.12 ⏵ 20.19.27100 +110081 +195100
Updatedgem/​jekyll@​4.3.3 ⏵ 4.3.484 +1100100100100
Updatedgem/​webrick@​1.8.2 ⏵ 1.9.293100100100100
Updatedgem/​github-linguist@​7.29.0 ⏵ 7.30.095 -1100100100100
Updatedgem/​dotenv@​3.1.2 ⏵ 3.2.096100100100100
Updatedgem/​rb-inotify@​0.10.1 ⏵ 0.11.198 +1100100100100

View full report

@renovate renovate bot force-pushed the renovate/lock-file-maintenance branch 2 times, most recently from a9b708b to 23283a7 Compare August 13, 2025 17:16
@renovate renovate bot force-pushed the renovate/lock-file-maintenance branch from 23283a7 to 158b822 Compare August 19, 2025 14:35
@renovate renovate bot force-pushed the renovate/lock-file-maintenance branch from 158b822 to dd98156 Compare August 31, 2025 10:39
@renovate renovate bot force-pushed the renovate/lock-file-maintenance branch from dd98156 to 33f2ecf Compare September 25, 2025 19:06
@renovate renovate bot force-pushed the renovate/lock-file-maintenance branch from 33f2ecf to aa123fc Compare October 25, 2025 04:00
@renovate renovate bot force-pushed the renovate/lock-file-maintenance branch from aa123fc to cb1bd18 Compare November 10, 2025 13:38
@renovate renovate bot force-pushed the renovate/lock-file-maintenance branch from cb1bd18 to 45eff06 Compare November 18, 2025 12:00
@renovate renovate bot force-pushed the renovate/lock-file-maintenance branch from 45eff06 to a84d7fd Compare December 3, 2025 19:40
@renovate renovate bot force-pushed the renovate/lock-file-maintenance branch from a84d7fd to 0831349 Compare December 31, 2025 17:50
Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
@renovate renovate bot force-pushed the renovate/lock-file-maintenance branch from 0831349 to 4832aac Compare January 8, 2026 20:34
@socket-security
Copy link

Caution

Review the following alerts detected in dependencies.

According to your organization's Security Policy, you must resolve all "Block" alerts before proceeding. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Block Critical
Malicious package: npm acorn

Note: This VS Code extension is classified as malware because it exhibits high-confidence brandjacking and typosquatting indicators that strongly imply deceptive distribution and user impersonation:

  • Publisher impersonation: The VSIX claims to be “JFrog VSCode Extension,” but it is published by Artifactory-Software-Studio, not the official JFrog publisher.
  • Typosquatted identifier: The extension’s identity is vscode-jrrog-extension (note the “jrrog” typo), which is a look-alike of the official JFrog extension identifier and consistent with marketplace typosquat tactics.
  • Abuse of trust via branding: The manifest and package metadata deliberately reuse JFrog’s brand name (“JFrog VSCode Extension”) to induce installation under false provenance.
  • High-risk capability overlap: The extension’s functionality includes reading JFrog CLI configuration/credentials and initiating outbound network connections for scanning workflows. In a typosquatted/impersonating package, these capabilities materially increase the likelihood of credential theft or sensitive project metadata leakage, regardless of whether the current bundle contains overt C2 logic.

Together, the deceptive provenance (non-official publisher + typo-lookalike ID + brand reuse) is sufficient to classify the extension as malicious because it is designed to obtain installs by masquerading as a trusted vendor extension, a common precursor to credential harvesting and supply-chain compromise.

From: pnpm-lock.yamlnpm/[email protected]npm/[email protected]npm/[email protected]npm/[email protected]npm/[email protected]

ℹ Read more on: This package | This alert | What is known malware?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: It is strongly recommended that malware is removed from your codebase.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant