Skip to content

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jan 5, 2026

Bumps megalinter/megalinter from 9.1.0 to 9.3.0.

Release notes

Sourced from megalinter/megalinter's releases.

v9.3.0

What's Changed

  • Core

    • Add enum name support in MegaLinter config Json schema for better autocompletion in editors
    • Update base image to python:3.13-alpine3.23
  • New linters

  • Linters enhancements

    • Change checkmake Docker image reference by @​bdovaz
  • Reporters

    • Handle multiple MegaLinter runs on the same repo using custom value sent in variable MEGALINTER_MULTIRUN_KEY
    • Allow to override url to CI build in Git based reporters using REPORTERS_ACTION_RUN_URL variable
    • Fix sections display in Gitlab console logs
  • Doc

    • Classify all JSON schema config variables by category and section
  • CI

    • Free disk space on GitHub actions runner when releasing a new flavor
    • Add missing Dockerfile patterns to Renovate Dockerfile manager
    • Remove gitpod custom image, workflow, and makefile targets
  • Linter versions upgrades (54)

... (truncated)

Changelog

Sourced from megalinter/megalinter's changelog.

[v9.3.0] - 2026-01-04

  • Core

    • Add enum name support in MegaLinter config Json schema for better autocompletion in editors
    • Update base image to python:3.13-alpine3.23
  • New linters

  • Linters enhancements

    • Change checkmake Docker image reference by @​bdovaz
  • Reporters

    • Handle multiple MegaLinter runs on the same repo using custom value sent in variable MEGALINTER_MULTIRUN_KEY
    • Allow to override url to CI build in Git based reporters using REPORTERS_ACTION_RUN_URL variable
    • Fix sections display in Gitlab console logs
  • Doc

    • Classify all JSON schema config variables by category and section
  • CI

    • Free disk space on GitHub actions runner when releasing a new flavor
    • Add missing Dockerfile patterns to Renovate Dockerfile manager
    • Remove gitpod custom image, workflow, and makefile targets
  • Linter versions upgrades (54)

... (truncated)

Commits
  • 42bb470 Release MegaLinter v9.3.0
  • fe74938 changelog
  • edb083a [automation] Auto-update linters version, help and documentation (#6889)
  • 824240c JSON Schema fix (#6888)
  • 9af8d5b chore(deps): update dependency npm-package-json-lint to v9.1.0 (#6883)
  • 781c95c [automation] Auto-update linters version, help and documentation (#6885)
  • 101b802 JSON Schema (#6887)
  • 3ab7a93 chore(deps): update dependency friendsofphp/php-cs-fixer to v3.92.4 (#6886)
  • 12f7c03 chore(deps): update ghcr.io/astral-sh/uv docker tag to v0.9.21 (#6882)
  • 91a9dfb chore(deps): update dependency sfdx-hardis to v6.20.0 (#6884)
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [megalinter/megalinter](https://github.com/megalinter/megalinter) from 9.1.0 to 9.3.0.
- [Release notes](https://github.com/megalinter/megalinter/releases)
- [Changelog](https://github.com/oxsecurity/megalinter/blob/main/CHANGELOG.md)
- [Commits](oxsecurity/megalinter@v9.1.0...v9.3.0)

---
updated-dependencies:
- dependency-name: megalinter/megalinter
  dependency-version: 9.3.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot assigned iggy Jan 5, 2026
@dependabot dependabot bot added dependencies Pull requests that update a dependency file github_actions Pull requests that update GitHub Actions code labels Jan 5, 2026
@github-actions
Copy link

github-actions bot commented Jan 5, 2026

MegaLinter analysis: Error

Descriptor Linter Files Fixed Errors Warnings Elapsed time
✅ ACTION actionlint 4 0 0 0.25s
✅ API spectral 2 0 0 3.9s
✅ COPYPASTE jscpd yes no no 1.73s
✅ DOCKERFILE hadolint 1 0 0 0.07s
✅ GO golangci-lint yes yes no no 37.32s
✅ GO revive yes no no 0.03s
✅ MARKDOWN markdownlint 2 0 0 0 0.64s
✅ MARKDOWN markdown-table-formatter 2 0 0 0 0.25s
✅ REPOSITORY checkov yes no no 29.52s
✅ REPOSITORY gitleaks yes no no 0.29s
✅ REPOSITORY git_diff yes no no 0.0s
✅ REPOSITORY grype yes no no 27.24s
✅ REPOSITORY secretlint yes no no 0.38s
✅ REPOSITORY syft yes no no 1.45s
❌ REPOSITORY trivy yes 1 no 6.1s
✅ REPOSITORY trivy-sbom yes no no 1.43s
✅ REPOSITORY trufflehog yes no no 2.19s
✅ SPELL lychee 12 0 0 0.31s
✅ YAML prettier 10 0 0 0 0.72s
✅ YAML v8r 10 0 0 7.58s
✅ YAML yamllint 10 0 0 0.64s

Detailed Issues

❌ REPOSITORY / trivy - 1 error
2026-01-05T00:06:32Z	INFO	[vulndb] Need to update DB
2026-01-05T00:06:32Z	INFO	[vulndb] Downloading vulnerability DB...
2026-01-05T00:06:32Z	INFO	[vulndb] Downloading artifact...	repo="mirror.gcr.io/aquasec/trivy-db:2"
44.77 MiB / 79.57 MiB [---------------------------------->__________________________] 56.26% ? p/s ?79.57 MiB / 79.57 MiB [----------------------------------------------------------->] 100.00% ? p/s ?79.57 MiB / 79.57 MiB [----------------------------------------------------------->] 100.00% ? p/s ?79.57 MiB / 79.57 MiB [---------------------------------------------->] 100.00% 57.97 MiB p/s ETA 0s79.57 MiB / 79.57 MiB [---------------------------------------------->] 100.00% 57.97 MiB p/s ETA 0s79.57 MiB / 79.57 MiB [---------------------------------------------->] 100.00% 57.97 MiB p/s ETA 0s79.57 MiB / 79.57 MiB [---------------------------------------------->] 100.00% 54.23 MiB p/s ETA 0s79.57 MiB / 79.57 MiB [---------------------------------------------->] 100.00% 54.23 MiB p/s ETA 0s79.57 MiB / 79.57 MiB [---------------------------------------------->] 100.00% 54.23 MiB p/s ETA 0s79.57 MiB / 79.57 MiB [---------------------------------------------->] 100.00% 50.73 MiB p/s ETA 0s79.57 MiB / 79.57 MiB [---------------------------------------------->] 100.00% 50.73 MiB p/s ETA 0s79.57 MiB / 79.57 MiB [---------------------------------------------->] 100.00% 50.73 MiB p/s ETA 0s79.57 MiB / 79.57 MiB [---------------------------------------------->] 100.00% 47.46 MiB p/s ETA 0s79.57 MiB / 79.57 MiB [-------------------------------------------------] 100.00% 31.63 MiB p/s 2.7s2026-01-05T00:06:35Z	INFO	[vulndb] Artifact successfully downloaded	repo="mirror.gcr.io/aquasec/trivy-db:2"
2026-01-05T00:06:35Z	INFO	[vuln] Vulnerability scanning is enabled
2026-01-05T00:06:35Z	INFO	[misconfig] Misconfiguration scanning is enabled
2026-01-05T00:06:35Z	INFO	[misconfig] Need to update the checks bundle
2026-01-05T00:06:35Z	INFO	[misconfig] Downloading the checks bundle...
165.46 KiB / 165.46 KiB [---------------------------------------------------------] 100.00% ? p/s 0s2026-01-05T00:06:38Z	INFO	Number of language-specific files	num=1
2026-01-05T00:06:38Z	INFO	[gomod] Detecting vulnerabilities...
2026-01-05T00:06:38Z	INFO	Detected config files	num=2

Report Summary

┌──────────────────┬────────────┬─────────────────┬───────────────────┐
│      Target      │    Type    │ Vulnerabilities │ Misconfigurations │
├──────────────────┼────────────┼─────────────────┼───────────────────┤
│ go.mod           │   gomod    │        2        │         -         │
├──────────────────┼────────────┼─────────────────┼───────────────────┤
│ Dockerfile       │ dockerfile │        -        │         0         │
├──────────────────┼────────────┼─────────────────┼───────────────────┤
│ Dockerfile.local │ dockerfile │        -        │         0         │
└──────────────────┴────────────┴─────────────────┴───────────────────┘
Legend:
- '-': Not scanned
- '0': Clean (no security findings detected)


For OSS Maintainers: VEX Notice
--------------------------------
If you're an OSS maintainer and Trivy has detected vulnerabilities in your project that you believe are not actually exploitable, consider issuing a VEX (Vulnerability Exploitability eXchange) statement.
VEX allows you to communicate the actual status of vulnerabilities in your project, improving security transparency and reducing false positives for your users.
Learn more and start using VEX: https://trivy.dev/docs/v0.68/guide/supply-chain/vex/repo#publishing-vex-documents

To disable this notice, set the TRIVY_DISABLE_VEX_NOTICE environment variable.


go.mod (gomod)
==============
Total: 2 (UNKNOWN: 0, LOW: 0, MEDIUM: 2, HIGH: 0, CRITICAL: 0)

┌─────────────────────┬────────────────┬──────────┬────────┬───────────────────┬───────────────┬─────────────────────────────────────────────────────┐
│       Library       │ Vulnerability  │ Severity │ Status │ Installed Version │ Fixed Version │                        Title                        │
├─────────────────────┼────────────────┼──────────┼────────┼───────────────────┼───────────────┼─────────────────────────────────────────────────────┤
│ golang.org/x/crypto │ CVE-2025-47914 │ MEDIUM   │ fixed  │ v0.44.0           │ 0.45.0        │ golang.org/x/crypto/ssh/agent: in                   │
│                     │                │          │        │                   │               │ golang.org/x/crypto/ssh/agent                       │
│                     │                │          │        │                   │               │ https://avd.aquasec.com/nvd/cve-2025-47914          │
│                     ├────────────────┤          │        │                   │               ├─────────────────────────────────────────────────────┤
│                     │ CVE-2025-58181 │          │        │                   │               │ golang.org/x/crypto/ssh: in golang.org/x/crypto/ssh │
│                     │                │          │        │                   │               │ https://avd.aquasec.com/nvd/cve-2025-58181          │
└─────────────────────┴────────────────┴──────────┴────────┴───────────────────┴───────────────┴─────────────────────────────────────────────────────┘

See detailed reports in MegaLinter artifacts

Your project could benefit from a custom flavor, which would allow you to run only the linters you need, and thus improve runtime performances. (Skip this info by defining FLAVOR_SUGGESTIONS: false)

  • Documentation: Custom Flavors
  • Command: npx mega-linter-runner@9.3.0 --custom-flavor-setup --custom-flavor-linters ACTION_ACTIONLINT,API_SPECTRAL,COPYPASTE_JSCPD,DOCKERFILE_HADOLINT,GO_GOLANGCI_LINT,GO_REVIVE,MARKDOWN_MARKDOWNLINT,MARKDOWN_MARKDOWN_TABLE_FORMATTER,REPOSITORY_CHECKOV,REPOSITORY_GIT_DIFF,REPOSITORY_GITLEAKS,REPOSITORY_GRYPE,REPOSITORY_SECRETLINT,REPOSITORY_SYFT,REPOSITORY_TRIVY,REPOSITORY_TRIVY_SBOM,REPOSITORY_TRUFFLEHOG,SPELL_LYCHEE,YAML_PRETTIER,YAML_YAMLLINT,YAML_V8R

MegaLinter is graciously provided by OX Security

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file github_actions Pull requests that update GitHub Actions code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants