Conversation
Update overrides to cover lodash/lodash-es <=4.17.23 (previously only covered <=4.17.22). Forces resolution to ^4.18.0 which fixes both CVE code injection via _.template (high) and prototype pollution via _.unset/_.omit (moderate). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
|
The latest updates on your projects. Learn more about Vercel for GitHub.
|
|
📝 WalkthroughWalkthroughUpdated pnpm overrides for Changes
Estimated code review effort🎯 2 (Simple) | ⏱️ ~10 minutes Possibly related PRs
Poem
🚥 Pre-merge checks | ✅ 3✅ Passed checks (3 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches📝 Generate docstrings
🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
There was a problem hiding this comment.
Pull request overview
Updates the monorepo’s pnpm overrides/lockfile to fully mitigate known lodash/lodash-es vulnerabilities that are pulled in transitively (notably via docs/ensnode.io dependencies).
Changes:
- Expands the override selector range to include
<=4.17.23for bothlodashandlodash-es. - Forces resolution to
^4.18.0and updates the lockfile to4.18.1forlodash/lodash-es.
Reviewed changes
Copilot reviewed 1 out of 2 changed files in this pull request and generated no comments.
| File | Description |
|---|---|
| package.json | Updates pnpm.overrides entries for lodash and lodash-es to cover the full vulnerable selector range and enforce the fixed version range. |
| pnpm-lock.yaml | Reflects the updated overrides and resolves lodash / lodash-es to 4.18.1 in packages/snapshots. |
Files not reviewed (1)
- pnpm-lock.yaml: Language not supported
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
Greptile SummaryThis PR patches two lodash security vulnerabilities (GHSA-r5fr-rjxr-66jc — high severity code injection via
Confidence Score: 5/5
Important Files Changed
Flowchart%%{init: {'theme': 'neutral'}}%%
flowchart TD
A[Transitive dep requires lodash in vulnerable range] -->|pnpm.overrides match| B{Override rule}
B -->|lodash resolved to| C[lodash 4.18.1]
B -->|lodash-es resolved to| D[lodash-es 4.18.1]
E[chevrotain] -->|previously 4.17.23| A
F[chevrotain-allstar] -->|previously 4.17.23| A
G[dagre-d3-es] -->|previously 4.17.23| A
H[mermaid] -->|previously 4.17.23| A
I[yaml-language-server] -->|previously 4.17.23| A
J[zip-a-folder] -->|previously 4.17.23| A
C --> K[GHSA-r5fr-rjxr-66jc fixed - code injection via template]
D --> K
C --> L[GHSA-f23m-r3pf-42rh fixed - prototype pollution via unset and omit]
D --> L
Reviews (1): Last reviewed commit: "fix(deps): patch lodash and lodash-es se..." | Re-trigger Greptile |
Summary
pnpm.overridesforlodashandlodash-esto cover the full vulnerable range (<=4.17.23, previously only<=4.17.22)^4.18.0, fixing GHSA-r5fr-rjxr-66jc (high: code injection via_.template) and GHSA-f23m-r3pf-42rh (moderate: prototype pollution via_.unset/_.omit)docs/ensnode.iodeps (mermaid,astro-seo)Test plan
pnpm audit --audit-level=moderatereturns no vulnerabilities🤖 Generated with Claude Code