Skip to content

Conversation

dependabot[bot]
Copy link

@dependabot dependabot bot commented on behalf of github Aug 19, 2025

Removes tmp. It's no longer used after updating ancestor dependency @nestjs/cli. These dependencies need to be updated together.

Removes tmp

Updates @nestjs/cli from 7.6.0 to 11.0.10

Release notes

Sourced from @​nestjs/cli's releases.

Release 11.0.10

What's Changed

Full Changelog: nestjs/nest-cli@11.0.9...11.0.10

Release 11.0.9

  • fix(deps): update angular-cli monorepo to v20 (5bbd8f83)
  • chore: disable shell by default (c31554d6)
  • fix(deps): update dependency @​inquirer/prompts to v7.8.0 (4897ce2c)

Release 11.0.8

What's Changed

Full Changelog: nestjs/nest-cli@11.0.7...11.0.8

Release 11.0.7

What's Changed

Full Changelog: nestjs/nest-cli@11.0.6...11.0.7

Release 11.0.6

What's Changed

New Contributors

Full Changelog: nestjs/nest-cli@11.0.5...11.0.6

Release 11.0.5

... (truncated)

Commits
  • e47541d chore(): release v11.0.10
  • 3186552 Merge pull request #3115 from nestjs/revert-3047-renovate/major-angular-cli-m...
  • ce6acd3 Revert "fix(deps): update angular-cli monorepo to v20 (major)"
  • 79ac1e2 Merge pull request #3114 from nestjs/revert-3109-chore/disable-shell-by-default
  • d43b91c Revert "chore: disable shell by default"
  • fe3aca7 chore(): release v11.0.9
  • 0594cb1 Merge pull request #3047 from nestjs/renovate/major-angular-cli-monorepo
  • 5bbd8f8 fix(deps): update angular-cli monorepo to v20
  • 4434eb5 Merge pull request #3109 from nestjs/chore/disable-shell-by-default
  • aa6f234 Merge pull request #3105 from nestjs/renovate/inquirer-prompts-7.x
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Removes [tmp](https://github.com/raszi/node-tmp). It's no longer used after updating ancestor dependency [@nestjs/cli](https://github.com/nestjs/nest-cli). These dependencies need to be updated together.


Removes `tmp`

Updates `@nestjs/cli` from 7.6.0 to 11.0.10
- [Release notes](https://github.com/nestjs/nest-cli/releases)
- [Changelog](https://github.com/nestjs/nest-cli/blob/master/.release-it.json)
- [Commits](nestjs/nest-cli@7.6.0...11.0.10)

---
updated-dependencies:
- dependency-name: tmp
  dependency-version: 
  dependency-type: indirect
- dependency-name: "@nestjs/cli"
  dependency-version: 11.0.10
  dependency-type: direct:development
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file javascript Pull requests that update javascript code labels Aug 19, 2025
@TheRedHatter
Copy link
Owner

TheRedHatter commented Aug 19, 2025

Snyk checks have failed. 5 issues have been found so far.

Icon Severity Issues
Critical 1
High 1
Medium 3
Low 0

security/snyk check is complete. 5 issues have been found. (View Details)

license/snyk check is complete. No issues have been found. (View Details)

💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse.

@semgrep-code-theredhatter
Copy link

Semgrep found 1 ssc-1676dcdc-09e4-4f68-8fa8-5ff232a5b53f finding:

Risk: Affected versions of jsonwebtoken are vulnerable to Improper Authentication. Insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC.

Manual Review Advice: A vulnerability from this advisory is reachable if you are using a poorly implemented key retrieval function and your application is supporting usage of both symmetric key and asymmetric key in jwt.verify() implementation with the same key retrieval function.

Fix: Upgrade this library to at least version 9.0.0 at brokencrystals/package-lock.json:11412.

Reference(s): GHSA-hjrf-2m68-5959, CVE-2022-23541

Semgrep found 1 ssc-30d12dd5-94ad-46fa-9d32-3d5477d86f3e finding:

Risk: Affected versions of jsonwebtoken are vulnerable to Use Of A Broken Or Risky Cryptographic Algorithm. The library could be misconfigured so that legacy, insecure key types are used for signature verification. For example, DSA keys could be used with the RS256 algorithm.

Manual Review Advice: A vulnerability from this advisory is reachable if you are using a legacy, insecure key type with a supported algorithm; for example, DSA keys could be used with the RS256 algorithm

Fix: Upgrade this library to at least version 9.0.0 at brokencrystals/package-lock.json:11412.

Reference(s): GHSA-8cf7-32gw-wr33, CVE-2022-23539

@semgrep-code-therredhatter
Copy link

Semgrep found 1 ssc-1676dcdc-09e4-4f68-8fa8-5ff232a5b53f finding:

Risk: Affected versions of jsonwebtoken are vulnerable to Improper Authentication. Insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC.

Manual Review Advice: A vulnerability from this advisory is reachable if you are using a poorly implemented key retrieval function and your application is supporting usage of both symmetric key and asymmetric key in jwt.verify() implementation with the same key retrieval function.

Fix: Upgrade this library to at least version 9.0.0 at brokencrystals/package-lock.json:11412.

Reference(s): GHSA-hjrf-2m68-5959, CVE-2022-23541

Semgrep found 1 ssc-30d12dd5-94ad-46fa-9d32-3d5477d86f3e finding:

Risk: Affected versions of jsonwebtoken are vulnerable to Use Of A Broken Or Risky Cryptographic Algorithm. The library could be misconfigured so that legacy, insecure key types are used for signature verification. For example, DSA keys could be used with the RS256 algorithm.

Manual Review Advice: A vulnerability from this advisory is reachable if you are using a legacy, insecure key type with a supported algorithm; for example, DSA keys could be used with the RS256 algorithm

Fix: Upgrade this library to at least version 9.0.0 at brokencrystals/package-lock.json:11412.

Reference(s): GHSA-8cf7-32gw-wr33, CVE-2022-23539

@TheRedHatter
Copy link
Owner

Logo
Checkmarx One – Scan Summary & Detailsff1a62af-d6d0-4335-a025-53735aaf5fce

New Issues (2)

Checkmarx found the following issues in this Pull Request

Severity Issue Source File / Package Checkmarx Insight
CRITICAL CVE-2023-42282 Npm-ip-2.0.0
detailsDescription: An issue in NPM ip package 0.0.2 through 2.0.1 allows an attacker to execute arbitrary code and obtain sensitive information via the "isPublic()" f...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: itpHkIvths%2Bkb04PCfU9v%2Fe4O481H6eKNTerjChEJf8%3D
Vulnerable Package
HIGH CVE-2024-29415 Npm-ip-2.0.0
detailsDescription: The ip package 0.0.2 through 2.0.1 for Node.js might allow SSRF because some IP addresses (such as 127.1, 01200034567, 012.1.2.3, 000:0:0000::01, a...
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: Jd2rqrutT2%2BAbS9cQ7DGS7h7Io8iRzoXgTTXpTz6EfA%3D
Vulnerable Package
Fixed Issues (10)

Great job! The following issues were fixed in this Pull Request

Severity Issue Source File / Package
CRITICAL CVE-2021-44906 Npm-minimist-1.2.5
CRITICAL CVE-2023-28154 Npm-webpack-5.28.0
HIGH CVE-2022-0144 Npm-shelljs-0.8.4
MEDIUM CVE-2024-43788 Npm-webpack-5.28.0
MEDIUM Client_HTML5_Insecure_Storage /client/src/pages/main/Contact.tsx: 18
MEDIUM Client_HTML5_Insecure_Storage /client/src/pages/main/Contact.tsx: 15
MEDIUM Client_HTML5_Insecure_Storage /client/src/pages/main/Contact.tsx: 16
MEDIUM Client_HTML5_Insecure_Storage /client/src/pages/main/Contact.tsx: 17
MEDIUM Cx41fbf2f3-5595 Npm-shelljs-0.8.4
LOW CVE-2025-54798 Npm-tmp-0.0.33

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file javascript Pull requests that update javascript code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant