Skip to content

chore(deps): update dependency mintlify to v4.2.79

3628e23
Select commit
Loading
Failed to load commit list.
Open

chore(deps): update dependency mintlify to v4.2.79 #2

chore(deps): update dependency mintlify to v4.2.79
3628e23
Select commit
Loading
Failed to load commit list.
Dev - Mend for GitHub.com / Mend Security Check failed Apr 10, 2026 in 10m 41s

Security Report

❗️Scan Warnings: The scan completed with warnings. The integration encountered issues with one or more projects in this repository. Consequently, there may be gaps in the coverage of open-source dependencies used in the repository.

Scan Details Report

go

/tmp/ws-scm/cline/go.work

Step Level Description Details
Preparing the project for scan ⚠Warn One or more of the operation commands failed to execute failed to run go mod download: go: github.com/cline/grpc-go@v0.0.0 (replaced by ./src/generated/grpc-go): reading src/generated/grpc-go/go.mod: open /tmp/ws-scm/cline/src/generated/grpc-go/go.mod: no such file or directory
Resolving the project ⚠Warn Some problems occurred while performing the resolution operation
  • Failed to execute command: go list -mod=readonly -deps -json all
    Error lines:
    [github.com/cline/grpc-go@v0.0.0 (replaced by ./src/generated/grpc-go): reading src/generated/grpc-go/go.mod: open /tmp/ws-scm/cline/src/generated/grpc-go/go.mod: no such file or directory, github.com/cline/grpc-go@v0.0.0 (replaced by ./src/generated/grpc-go): reading src/generated/grpc-go/go.mod: open /tmp/ws...
  • Fallback is used.
    Relying on the dependencies declared in the go.mod files rather than the dependencies actually in use by the project.
    Returns direct dependencies only.

You have successfully remediated 12 vulnerabilities, but introduced 2 new vulnerabilities in this branch.

❌ New vulnerabilities:
Vulnerability Severity CVSS Score Vulnerable Library Direct Library Suggested Fix Issue Reachability
CVE-2026-4800

Path to dependency file: /docs/package.json

Path to vulnerable library: /docs/package.json

Dependency Hierarchy:

-> mintlify-4.2.79.tgz (Root Library)

   -> cli-4.0.683.tgz

     -> common-1.0.497.tgz

       -> parser-3.6.0.tgz

         -> spectral-functions-1.10.1.tgz

           -> ❌ lodash-4.17.23.tgz (Vulnerable Library)

High 8.1 Transitive lodash-4.17.23.tgz mintlify-4.2.79.tgz Transitive Upgrade to version lodash-amd - 4.18.0 or greater None

Unreachable

CVE-2026-2950

Path to dependency file: /docs/package.json

Path to vulnerable library: /docs/package.json

Dependency Hierarchy:

-> mintlify-4.2.79.tgz (Root Library)

   -> cli-4.0.683.tgz

     -> common-1.0.497.tgz

       -> parser-3.6.0.tgz

         -> spectral-functions-1.10.1.tgz

           -> ❌ lodash-4.17.23.tgz (Vulnerable Library)

Medium 6.5 Transitive lodash-4.17.23.tgz mintlify-4.2.79.tgz Transitive Upgrade to version lodash.unset - 4.18.0 or greater None

Unreachable

✔️ Remediated vulnerabilities:

Vulnerability Vulnerable Library
CVE-2025-69873 ajv-8.17.1.tgz
CVE-2026-4867 path-to-regexp-0.1.12.tgz
CVE-2026-0994 protobuf-6.33.0-cp39-abi3-manylinux2014_x86_64.whl
CVE-2024-51999 express-4.21.2.tgz
CVE-2024-51999 express-5.0.1.tgz
CVE-2025-64756 glob-10.4.5.tgz
CVE-2026-35536 tornado-6.5.2-cp39-abi3-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl
CVE-2025-13466 body-parser-1.20.3.tgz
CVE-2025-59343 tar-fs-3.1.0.tgz
CVE-2025-66471 urllib3-2.5.0-py3-none-any.whl
CVE-2025-404142 buffers-0.1.1.tgz
CVE-2026-21441 urllib3-2.5.0-py3-none-any.whl

Base branch total remaining vulnerabilities: 61
Base branch commit: 3a1482db0cfec151e1921e5db4cc86305004c5d0


Total libraries scanned: 2052

Scan token: 1d10c10fb3a94293a0b20d249954d4fa