fix(security): resolve all Dependabot and CodeQL security alerts#35
Merged
chevyphillip merged 3 commits intomainfrom Apr 11, 2026
Merged
fix(security): resolve all Dependabot and CodeQL security alerts#35chevyphillip merged 3 commits intomainfrom
chevyphillip merged 3 commits intomainfrom
Conversation
Agent-Id: agent-ea2b5334-be90-492a-9158-0b8914ea181b Linked-Note-Id: 50d781b8-c6a7-4259-a460-3f0edb5808db
Agent-Id: agent-e72fc79c-5dec-44ea-8df2-fbc451b0f72f Linked-Note-Id: db021f53-d311-44da-9ef3-e72eb72884b3
The security-fix branch already contained the workflow permission hardening and Electron escaping fix, but the lockfile-only dependency bumps were still local. This records the remaining hono and @hono/node-server updates so the published PR fully matches the requested security scope. Constraint: Publish branch must contain all security fixes in one PR Rejected: Open the PR without the lockfile bump | would leave the dependency remediation out of the diff Confidence: high Scope-risk: narrow Reversibility: clean Directive: Keep dependency updates limited to the audited hono packages unless a fresh audit identifies additional exposure Tested: npm ci; npm audit --omit=dev; cd packages/cli && npx tsc --noEmit; cd packages/cli && npm run lint; cd packages/cli && npm test Not-tested: GitHub-hosted CI before PR creation
✅ Snyk checks have passed. No issues have been found so far.
💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse. |
🤖 Augment PR SummarySummary: Updates Hono-related dependencies and GitHub Actions workflow token permissions to clear all Dependabot/CodeQL security alerts. 🤖 Was this summary useful? React with 👍 or 👎 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Addresses all open security alerts in a single PR.
npm audit vulnerabilities (2 moderate → 0)
CodeQL code scanning alerts
packages/cli/src/desktop/electron-app.ts— added backslash escaping before quote escaping in CSS selector builderpermissions: contents: readto.github/workflows/ci.ymlto restrict GITHUB_TOKEN scopeFiles changed
package-lock.json— lockfile-only dep updatespackages/cli/src/desktop/electron-app.ts— string escaping fix.github/workflows/ci.yml— permissions block addedVerification
npm audit→ 0 vulnerabilitiesnpx tsc --noEmit→ clean