chore(deps): update dependency mintlify to v4.2.79 #2
Security Report
❗️Scan Warnings: The scan completed with warnings. The integration encountered issues with one or more projects in this repository. Consequently, there may be gaps in the coverage of open-source dependencies used in the repository.
Scan Details Report
go
/tmp/ws-scm/cline/go.work
| Step | Level | Description | Details |
|---|---|---|---|
| Preparing the project for scan | ⚠Warn | One or more of the operation commands failed to execute | failed to run go mod download: go: github.com/cline/grpc-go@v0.0.0 (replaced by ./src/generated/grpc-go): reading src/generated/grpc-go/go.mod: open /tmp/ws-scm/cline/src/generated/grpc-go/go.mod: no such file or directory |
| Resolving the project | ⚠Warn | Some problems occurred while performing the resolution operation |
|
❌ New vulnerabilities:
| Vulnerability | Severity | Vulnerable Library | Direct Library | Suggested Fix | Issue | Reachability | |
|---|---|---|---|---|---|---|---|
CVE-2026-4800Path to dependency file: /docs/package.json Path to vulnerable library: /docs/package.json Dependency Hierarchy: -> mintlify-4.2.79.tgz (Root Library) -> cli-4.0.683.tgz -> common-1.0.497.tgz -> parser-3.6.0.tgz -> spectral-functions-1.10.1.tgz -> ❌ lodash-4.17.23.tgz (Vulnerable Library) |
8.1 | Transitive lodash-4.17.23.tgz |
mintlify-4.2.79.tgz | Transitive Upgrade to version lodash-amd - 4.18.0 or greater |
None | ||
CVE-2026-2950Path to dependency file: /docs/package.json Path to vulnerable library: /docs/package.json Dependency Hierarchy: -> mintlify-4.2.79.tgz (Root Library) -> cli-4.0.683.tgz -> common-1.0.497.tgz -> parser-3.6.0.tgz -> spectral-functions-1.10.1.tgz -> ❌ lodash-4.17.23.tgz (Vulnerable Library) |
6.5 | Transitive lodash-4.17.23.tgz |
mintlify-4.2.79.tgz | Transitive Upgrade to version lodash.unset - 4.18.0 or greater |
None |
✔️ Remediated vulnerabilities:
| Vulnerability | Vulnerable Library |
|---|---|
| CVE-2025-69873 | ajv-8.17.1.tgz |
| CVE-2026-4867 | path-to-regexp-0.1.12.tgz |
| CVE-2026-0994 | protobuf-6.33.0-cp39-abi3-manylinux2014_x86_64.whl |
| CVE-2024-51999 | express-4.21.2.tgz |
| CVE-2024-51999 | express-5.0.1.tgz |
| CVE-2025-64756 | glob-10.4.5.tgz |
| CVE-2026-35536 | tornado-6.5.2-cp39-abi3-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl |
| CVE-2025-13466 | body-parser-1.20.3.tgz |
| CVE-2025-59343 | tar-fs-3.1.0.tgz |
| CVE-2025-66471 | urllib3-2.5.0-py3-none-any.whl |
| CVE-2025-404142 | buffers-0.1.1.tgz |
| CVE-2026-21441 | urllib3-2.5.0-py3-none-any.whl |
Base branch total remaining vulnerabilities: 61
Base branch commit: 3a1482db0cfec151e1921e5db4cc86305004c5d0
Total libraries scanned: 2052
Scan token: 1d10c10fb3a94293a0b20d249954d4fa