Skip to content

Upgrade go deps#405

Merged
amishas157 merged 3 commits intorelease-v20260413from
patch/deps
Apr 9, 2026
Merged

Upgrade go deps#405
amishas157 merged 3 commits intorelease-v20260413from
patch/deps

Conversation

@amishas157
Copy link
Copy Markdown
Contributor

@amishas157 amishas157 commented Apr 9, 2026

PR Checklist

PR Structure

  • This PR has reasonably narrow scope (if not, break it down into smaller PRs).
  • This PR avoids mixing refactoring changes with feature changes (split into two PRs
    otherwise).
  • This PR's title starts with the jira ticket associated with the PR.

Thoroughness

  • This PR adds tests for the most critical parts of the new functionality or fixes.
  • I've updated the README with the added features, breaking changes, new instructions on how to use the repository. I updated the description of the fuction with the changes that were made.

Release planning

  • I've decided if this PR requires a new major/minor/patch version accordingly to
    semver, and I've changed the name of the BRANCH to major/_ , minor/_ or patch/* .

What

This PR:

  • Addresses security vulnerabilities by upgrading packages
  • Add dependabot.yml to have dependabot PRs to upgrade deps on regular basis. It will create at max 3 PRs, one for each ecosystem.

Why

To stay upgraded and free of vulnerabilites

Known limitations

[TODO or N/A]

@socket-security
Copy link
Copy Markdown

socket-security bot commented Apr 9, 2026

Review the following changes in direct dependencies. Learn more about Socket for GitHub.

Diff Package Supply Chain
Security
Vulnerability Quality Maintenance License
Updatedgithub.com/​stretchr/​testify@​v1.10.0 ⏵ v1.11.196 +1100100100100

View full report

@socket-security
Copy link
Copy Markdown

socket-security bot commented Apr 9, 2026

Warning

Review the following alerts detected in dependencies.

According to your organization's Security Policy, it is recommended to resolve "Warn" alerts. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Warn High
High CVE: OpenTelemetry-Go: multi-value baggage header extraction causes excessive allocations (remote dos amplification) in golang `go.opentelemetry.io/otel`

CVE: GHSA-mh2q-q3fh-2475 OpenTelemetry-Go: multi-value baggage header extraction causes excessive allocations (remote dos amplification) (HIGH)

Affected versions: >= 1.36.0 < 1.41.0; >= 1.36.0 < 1.41.0

Patched version: 1.41.0

From: ?golang/github.com/stellar/go-stellar-sdk@v0.0.0-20251211085638-ba09a6a91775golang/github.com/spf13/viper@v1.17.0golang/github.com/xitongsys/parquet-go-source@v0.0.0-20240122235623-d6294584ab18golang/cloud.google.com/go/storage@v1.42.0golang/go.opentelemetry.io/otel@v1.39.0

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/go.opentelemetry.io/otel@v1.39.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

@amishas157 amishas157 changed the title Update deps Upgrade go deps Apr 9, 2026
@amishas157 amishas157 marked this pull request as ready for review April 9, 2026 18:50
@amishas157 amishas157 requested a review from a team as a code owner April 9, 2026 18:50
@amishas157 amishas157 merged commit 70c680f into release-v20260413 Apr 9, 2026
9 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants