Skip to content

Update vulnerable transitive dependencies (hono, express-rate-limit)#83

Merged
shinpr merged 1 commit intomainfrom
fix/update-vulnerable-transitive-deps
Mar 19, 2026
Merged

Update vulnerable transitive dependencies (hono, express-rate-limit)#83
shinpr merged 1 commit intomainfrom
fix/update-vulnerable-transitive-deps

Conversation

@shinpr
Copy link
Owner

@shinpr shinpr commented Mar 19, 2026

Summary

  • Update transitive dependencies from @modelcontextprotocol/sdk to resolve Dependabot security alerts
  • hono: 4.11.7 → 4.12.8 (addresses XSS, prototype pollution, path traversal, cache deception, IP spoofing, timing attacks)
  • @hono/node-server: 1.19.9 → 1.19.11 (addresses authorization bypass via encoded slashes)
  • express-rate-limit: 8.2.1 → 8.3.1 (addresses IPv4-mapped IPv6 rate limit bypass)

Changes

Only pnpm-lock.yaml is modified. No source code changes.

Test plan

  • pnpm run check:all passes (lint, format, unused exports, circular deps, build, 440 tests)

Notes

Remaining Dependabot alerts are in transitive dependencies (tar, underscore, minimatch, rollup, ajv, lodash) where upstream packages need to update first.

🤖 Generated with Claude Code

Update transitive dependencies pulled in by @modelcontextprotocol/sdk
to resolve known security vulnerabilities:

- hono: 4.11.7 → 4.12.8
- @hono/node-server: 1.19.9 → 1.19.11
- express-rate-limit: 8.2.1 → 8.3.1

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@shinpr shinpr self-assigned this Mar 19, 2026
@shinpr shinpr merged commit b61ae6b into main Mar 19, 2026
1 check passed
@shinpr shinpr deleted the fix/update-vulnerable-transitive-deps branch March 19, 2026 04:18
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant