Skip to content

[Snyk] Fix for 3 vulnerabilities#11012

Open
revan-zhang wants to merge 19 commits intoxfrom
snyk-fix-32fb8347b9d940372263fdba6b0facbe
Open

[Snyk] Fix for 3 vulnerabilities#11012
revan-zhang wants to merge 19 commits intoxfrom
snyk-fix-32fb8347b9d940372263fdba6b0facbe

Conversation

@revan-zhang
Copy link
Copy Markdown
Contributor

@revan-zhang revan-zhang commented Apr 2, 2026

snyk-top-banner

Snyk has created this PR to fix 3 vulnerabilities in the yarn dependencies of this project.

Snyk changed the following file(s):

  • package.json

Note for zero-installs users

If you are using the Yarn feature zero-installs that was introduced in Yarn V2, note that this PR does not update the .yarn/cache/ directory meaning this code cannot be pulled and immediately developed on as one would expect for a zero-install project - you will need to run yarn to update the contents of the ./yarn/cache directory.
If you are not using zero-install you can ignore this as your flow should likely be unchanged.

⚠️ Warning
Failed to update the yarn.lock, please update manually before merging.

Vulnerabilities that will be fixed with an upgrade:

Issue
medium severity Prototype Pollution
SNYK-JS-LODASH-15869619
high severity Arbitrary Code Injection
SNYK-JS-LODASH-15869625
high severity XML Injection
SNYK-JS-XMLDOMXMLDOM-15869636

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Prototype Pollution
🦉 Arbitrary Code Injection
🦉 XML Injection


Open with Devin

Note

Medium Risk
Dependency upgrades can introduce build/runtime regressions, especially with the larger @tamagui/static version jump; PR also doesn’t include a yarn.lock update so resolved versions may differ until regenerated.

Overview
Updates package.json to remediate reported Snyk issues by bumping dependencies: @expo/plist from ^0.1.3 to ^0.3.0 and @tamagui/static from 1.108.0 to 1.129.6.

Written by Cursor Bugbot for commit b8129ab. This will update automatically on new commits. Configure here.

@revan-zhang
Copy link
Copy Markdown
Contributor Author

revan-zhang commented Apr 2, 2026

Snyk checks have passed. No issues have been found so far.

Status Scan Engine Critical High Medium Low Total (0)
Open Source Security 0 0 0 0 0 issues
Licenses 0 0 0 0 0 issues

💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse.

@socket-security
Copy link
Copy Markdown

socket-security bot commented Apr 2, 2026

Warning

Review the following alerts detected in dependencies.

According to your organization's Security Policy, it is recommended to resolve "Warn" alerts. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Warn High
Obfuscated code: npm @onekeyfe/cross-inpage-provider-injected is 98.0% likely obfuscated

Confidence: 0.98

Location: Package overview

From: package.jsonnpm/@onekeyfe/cross-inpage-provider-injected@2.2.63

ℹ Read more on: This package | This alert | What is obfuscated code?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should not obfuscate their code. Consider not using packages with obfuscated code.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@onekeyfe/cross-inpage-provider-injected@2.2.63. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
Obfuscated code: npm @onekeyfe/cross-inpage-provider-injected is 85.0% likely obfuscated

Confidence: 0.85

Location: Package overview

From: package.jsonnpm/@onekeyfe/cross-inpage-provider-injected@2.2.63

ℹ Read more on: This package | This alert | What is obfuscated code?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should not obfuscate their code. Consider not using packages with obfuscated code.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@onekeyfe/cross-inpage-provider-injected@2.2.63. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

Copy link
Copy Markdown

@cursor cursor bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cursor Bugbot has reviewed your changes and found 1 potential issue.

Fix All in Cursor

Bugbot Autofix is OFF. To automatically fix reported issues with cloud agents, enable autofix in the Cursor dashboard.

Comment thread package.json
"@tamagui/animations-moti": "1.108.0",
"@tamagui/config": "1.108.0",
"@tamagui/static": "1.108.0",
"@tamagui/static": "1.129.6",
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Tamagui package version mismatch breaks compatibility

High Severity

@tamagui/static is bumped to 1.129.6 while all other @tamagui/* packages (animations-moti, config, themes, toast, babel-plugin) remain pinned at 1.108.0. Tamagui's own documentation states that "99% of the time" configuration errors are "due to having mis-matched versions of Tamagui dependencies" and that every @tamagui/* dependency must be pinned to exactly the same version. This mismatch is very likely to cause build or runtime failures.

Additional Locations (1)
Fix in Cursor Fix in Web

Copy link
Copy Markdown

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: b8129abee1

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

Comment thread package.json
"@tamagui/animations-moti": "1.108.0",
"@tamagui/config": "1.108.0",
"@tamagui/static": "1.108.0",
"@tamagui/static": "1.129.6",
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Commit yarn.lock with this dependency version change

This change updates direct dependency versions in package.json but does not include the corresponding yarn.lock update, which will break installs in CI because this repo runs immutable installs (for example .github/workflows/lint.yml and .github/workflows/unittest.yml both execute yarn install --immutable). With the new descriptor @tamagui/static@1.129.6 missing from lockfile, immutable install fails and the security fix cannot be reliably applied.

Useful? React with 👍 / 👎.

Copy link
Copy Markdown
Contributor

@devin-ai-integration devin-ai-integration bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Devin Review found 1 potential issue.

View 2 additional findings in Devin Review.

Open in Devin Review

Comment thread package.json
"@tamagui/animations-moti": "1.108.0",
"@tamagui/config": "1.108.0",
"@tamagui/static": "1.108.0",
"@tamagui/static": "1.129.6",
Copy link
Copy Markdown
Contributor

@devin-ai-integration devin-ai-integration bot Apr 2, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🔴 @tamagui/static bumped to 1.129.6 while all other tamagui packages remain at 1.108.0

The PR bumps @tamagui/static from 1.108.0 to 1.129.6, but every other tamagui package in the monorepo remains pinned at 1.108.0: @tamagui/animations-moti, @tamagui/config, @tamagui/themes, @tamagui/toast, tamagui, @tamagui/babel-plugin (line 261), and tamagui-loader (line 351). The tamagui ecosystem expects all packages to be at the same version. Notably, tamagui-loader@1.108.0 declares its own dependency on @tamagui/static@1.108.0 (confirmed in yarn.lock), so the root-level bump to 1.129.6 introduces a second copy of the package without actually replacing the version used by the loader. This 21-minor-version gap can cause build-time failures or silent static-extraction mismatches if both versions are loaded, and the transitive vulnerable version (1.108.0) used by tamagui-loader remains unfixed.

Open in Devin Review

Was this helpful? React with 👍 or 👎 to provide feedback.

Copy link
Copy Markdown
Contributor

@devin-ai-integration devin-ai-integration bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Devin Review found 1 new potential issue.

View 3 additional findings in Devin Review.

Open in Devin Review

Comment thread package.json
Comment on lines 147 to +150
"@supabase/supabase-js": "^2.77.0",
"@tamagui/animations-moti": "1.108.0",
"@tamagui/config": "1.108.0",
"@tamagui/static": "1.108.0",
"@tamagui/static": "1.129.6",
Copy link
Copy Markdown
Contributor

@devin-ai-integration devin-ai-integration bot Apr 2, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🔴 yarn.lock not updated — vulnerability fixes are ineffective

The package.json changes @expo/plist from ^0.1.3 to ^0.3.0 and @tamagui/static from 1.108.0 to 1.129.6, but the yarn.lock was not regenerated. The lockfile still resolves @expo/plist via the ^0.1.3 specifier to 0.1.3 (which depends on vulnerable @xmldom/xmldom ~0.7.7) and @tamagui/static to 1.108.0 (with vulnerable lodash). Running yarn install --immutable in CI will fail because the lockfile doesn't satisfy the new package.json constraints. Until the lockfile is updated, the stated vulnerability fixes (SNYK-JS-XMLDOMXMLDOM, SNYK-JS-LODASH) are not actually applied.

Open in Devin Review

Was this helpful? React with 👍 or 👎 to provide feedback.

Copy link
Copy Markdown
Contributor

@devin-ai-integration devin-ai-integration bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Devin Review found 1 new potential issue.

View 7 additional findings in Devin Review.

Open in Devin Review

Comment thread package.json
"@cityofzion/neon-core": "^5.7.0",
"@cowprotocol/contracts": "^1.7.0",
"@expo/plist": "^0.1.3",
"@expo/plist": "^0.3.0",
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🔴 yarn.lock not updated for @expo/plist version bump — security fix is ineffective

The package.json changes @expo/plist from ^0.1.3 to ^0.3.0, but yarn.lock was not regenerated. The root workspace entry in yarn.lock:9192 still references npm:^0.1.3, and the resolution at yarn.lock:5656 still resolves to 0.1.3. There is no ^0.3.0 resolution entry in the lockfile. This means the vulnerable version 0.1.3 will continue to be installed, making this security fix completely ineffective.

Prompt for agents
The yarn.lock file was not updated after bumping @expo/plist from ^0.1.3 to ^0.3.0 in package.json. Run `yarn install` to regenerate the lockfile so it resolves the new version. Verify the resolved version is >= 0.3.0 in the updated lockfile.
Open in Devin Review

Was this helpful? React with 👍 or 👎 to provide feedback.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants