Skip to content

fix(security): 🔒 harden CI permissions and patch vulnerable transitive deps#232

Merged
justapithecus merged 2 commits intomainfrom
andrew/fix/security/harden-ci-and-patch-deps
Mar 17, 2026
Merged

fix(security): 🔒 harden CI permissions and patch vulnerable transitive deps#232
justapithecus merged 2 commits intomainfrom
andrew/fix/security/harden-ci-and-patch-deps

Conversation

@justapithecus
Copy link
Member

Summary

Resolves all 19 CodeQL code-scanning alerts (missing workflow permissions) and all 5 open Dependabot alerts (vulnerable transitive devDependencies).

Highlights

  • Add explicit permissions: contents: read to ci.yml, nightly.yml, and release-dry-run.yml — enforces least-privilege GITHUB_TOKEN scope
  • Add pnpm.overrides for flatted (≥3.4.0), minimatch (≥3.1.4), rollup (≥4.59.0), and basic-ftp (≥5.2.0)
  • All patched packages are transitive devDependencies only — zero production impact
  • release.yml already had explicit permissions and is unchanged

Test plan

  • CI passes (lint, test, build, examples, bundle freshness)
  • Verify code-scanning alerts auto-close after merge
  • Verify Dependabot alerts auto-close after merge

🤖 Generated with Claude Code

justapithecus and others added 2 commits March 17, 2026 13:58
…e deps

Workflow hardening:
- Add explicit `permissions: contents: read` to ci.yml, nightly.yml,
  and release-dry-run.yml (resolves 19 CodeQL code-scanning alerts)

Dependency patching (all transitive devDependencies):
- flatted ≥3.4.0 — unbounded recursion DoS in parse()
- minimatch ≥3.1.4 — ReDoS via nested extglobs
- rollup ≥4.59.0 — arbitrary file write via path traversal
- basic-ftp ≥5.2.0 — path traversal in downloadToDir()

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
- Use exact versions instead of open-ended ranges to prevent
  silent drift on future lockfile refreshes
- Scope minimatch override to `^3` selector so it stays within
  glob@7's declared range (3.1.4, not 10.x)

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@justapithecus justapithecus merged commit a719946 into main Mar 17, 2026
13 checks passed
@justapithecus justapithecus deleted the andrew/fix/security/harden-ci-and-patch-deps branch March 17, 2026 18:59
@justapithecus justapithecus mentioned this pull request Mar 17, 2026
4 tasks
justapithecus added a commit that referenced this pull request Mar 17, 2026
## Summary

Lockstep version bump to v0.13.3 — security hardening release covering
CI workflow permission scoping and transitive devDependency patching
from #232.

## Highlights

- Lockstep bump across all 14 targets (Go, SDK, events.ts, golden
fixtures, executor bundle, docs, container guide, test fixtures)
- Changelog promoted with `[0.13.3] - 2026-03-17` section
- No code changes — version metadata and rebuilt artifacts only

## Test plan

- [ ] CI passes (version lockstep, lint, test, build, bundle freshness,
examples)
- [ ] `quarry/types/version.go` reads `0.13.3`
- [ ] `sdk/package.json` reads `0.13.3`
- [ ] Golden fixtures contain `contract_version: 0.13.3`

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant