chore(deps): Update Yarn dependencies (security-updates)#431
chore(deps): Update Yarn dependencies (security-updates)#431nielsdrost7 wants to merge 1 commit intodevelopfrom
Conversation
📝 WalkthroughWalkthroughAdded an audit-before.json file documenting two high-severity vulnerabilities (axios and rollup). Updated audit-report.json to reflect resolved advisories. Bumped axios dependency from ^1.13.2 to ^1.13.6 in package.json and reformatted the package update report. Changes
Estimated code review effort🎯 2 (Simple) | ⏱️ ~12 minutes Poem
🚥 Pre-merge checks | ✅ 3✅ Passed checks (3 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
There was a problem hiding this comment.
Actionable comments posted: 1
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.
Inline comments:
In `@package.json`:
- Line 11: The audit flags [email protected] used by Vite as vulnerable; to fix,
update package.json so the project uses a Vite release that bundles a patched
Rollup (bump the "vite" dependency to a version that includes rollup >=4.59.0)
or add a package manager override/resolution to force rollup to ^4.59.0 (use
"resolutions" for Yarn or "overrides" for npm) and regenerate lockfile; target
symbols: the "vite" dependency in package.json and add/modify "resolutions" or
"overrides" to pin "rollup" to ^4.59.0, then reinstall and verify the vuln is
resolved.
ℹ️ Review info
⚙️ Run configuration
Configuration used: defaults
Review profile: CHILL
Plan: Pro
Run ID: e6b1fd7c-945a-48bb-b4cb-e74d9f976531
⛔ Files ignored due to path filters (1)
yarn.lockis excluded by!**/yarn.lock,!**/*.lock
📒 Files selected for processing (4)
audit-before.jsonaudit-report.jsonpackage.jsonupdated-packages.txt
| "devDependencies": { | ||
| "@tailwindcss/vite": "^4.1.12", | ||
| "axios": "^1.13.2", | ||
| "axios": "^1.13.6", |
There was a problem hiding this comment.
🧩 Analysis chain
🏁 Script executed:
#!/bin/bash
# Verify unresolved rollup advisory and lockfile-resolved versions (read-only)
rg -n '"module_name":"rollup"|"vulnerable_versions"|"patched_versions"|vite>rollup' audit-report.json audit-before.json
rg -n '^vite@|^rollup@|^\s+version "' yarn.lock -A3 -B1Repository: InvoicePlane/InvoicePlane-v2
Length of output: 50386
Resolve the remaining Rollup high-severity advisory before merging this security PR.
Axios was correctly upgraded to ^1.13.6 (resolves GHSA-43fc-jf86-j433), but the audit still reports vite>rollup at 4.54.0, which is vulnerable to CVE-2026-27606 (Arbitrary File Write via Path Traversal). Rollup versions >=4.0.0 <4.59.0 are affected; please upgrade Vite to a version with patched Rollup or pin Rollup to ^4.59.0 via Yarn resolutions.
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.
In `@package.json` at line 11, The audit flags [email protected] used by Vite as
vulnerable; to fix, update package.json so the project uses a Vite release that
bundles a patched Rollup (bump the "vite" dependency to a version that includes
rollup >=4.59.0) or add a package manager override/resolution to force rollup to
^4.59.0 (use "resolutions" for Yarn or "overrides" for npm) and regenerate
lockfile; target symbols: the "vite" dependency in package.json and add/modify
"resolutions" or "overrides" to pin "rollup" to ^4.59.0, then reinstall and
verify the vuln is resolved.
Yarn Dependency Update
This PR updates Yarn (npm) dependencies.
Update Type: security-updates
Triggered by: schedule
Lock File Status
✓ No lock file conflicts detected.
Updated Packages
Checks Performed
Security Audit
2 security vulnerabilities detected. Please review audit-report.json.
Review Checklist
This PR was automatically created by the Yarn Update workflow.
Summary by CodeRabbit
Chores
Documentation