chore: update vulnerable dependencies#631
Conversation
Greptile SummaryThis PR addresses May 2026 scanner findings by bumping
|
| Filename | Overview |
|---|---|
| pyproject.toml | Removes workspace-wide constraint-dependencies block and re-pins security floors as explicit entries in the docs and notebooks dependency groups; no correctness issues found. |
| packages/data-designer-engine/pyproject.toml | Adds cryptography>=46.0.7,<47 and python-multipart>=0.0.27,<1 as direct dependencies to enforce security floors; tight <47 upper bound on cryptography is intentional to guard against unknown breaking changes. |
| uv.lock | Lockfile regenerated to reflect all security bumps; adds jupyter-builder 0.0.9 as a new transitive dep of the JupyterLab/Notebook alpha prereleases; all hashes present and consistent with the declared specifiers. |
Flowchart
%%{init: {'theme': 'neutral'}}%%
flowchart TD
A[Root pyproject.toml] -->|constraint-dependencies REMOVED| B[Moved to explicit group deps]
B --> C[notebooks group]
B --> D[docs group]
B --> E[data-designer-engine package]
C --> C1[aiohttp >= 3.13.5]
C --> C2[jupyter-server >= 2.18.2]
C --> C3[jupyterlab >= 4.6.0a5]
C --> C4[mistune >= 3.2.1]
C --> C5[nbconvert >= 7.17.1]
C --> C6[notebook >= 7.6.0a5]
D --> D1[mistune >= 3.2.1]
D --> D2[nbconvert >= 7.17.1]
E --> E1[cryptography >= 46.0.7 < 47]
E --> E2[python-multipart >= 0.0.27]
F[uv.lock regenerated] --> G[jupyter-builder 0.0.9 NEW]
F --> H[python-multipart 0.0.28]
F --> I[jupyter-server 2.18.2]
F --> J[jupyterlab 4.6.0a5]
F --> K[mistune 3.2.1]
F --> L[notebook 7.6.0a5]
Reviews (3): Last reviewed commit: "Merge branch 'main' into johnny/chore/up..." | Re-trigger Greptile
Code Review: PR #631 — chore: update vulnerable dependenciesSummaryLockfile-only security bump. The PR raises FindingsCorrectness
Risks
Style / Conventions
Security
Test Coverage
Suggestions
VerdictLow-risk, well-scoped security patch. The only open question is whether accepting alpha releases of JupyterLab and Notebook is acceptable policy here — the PR body flags this explicitly and defers to scanner guidance, which is reasonable. Approve once a docs/notebook smoke check confirms no regression; no code-level blockers. |
Raise security floors for python-multipart, Jupyter Server, JupyterLab, Mistune, and Notebook according to the May 2026 scanner guidance. Regenerate uv.lock so the workspace resolves patched versions for the notebooks/docs and MCP dependency paths. Signed-off-by: Johnny Greco <jogreco@nvidia.com>
357c5c4 to
6496a3d
Compare
📋 Summary
Updates workspace dependency constraints and the uv lockfile to address the May 2026 scanner findings for python-multipart, Jupyter Server, JupyterLab, Mistune, and Notebook. This keeps the vulnerable MCP and Jupyter dependency paths resolving to patched versions.
🔗 Related Issue
N/A
🔄 Changes
jupyter-server>=2.18.2,jupyterlab>=4.6.0a5,mistune>=3.2.1,notebook>=7.6.0a5, andpython-multipart>=0.0.27.uv.lockso the workspace resolvesjupyter-server2.18.2,jupyterlab4.6.0a5,mistune3.2.1,notebook7.6.0a5, andpython-multipart0.0.28.jupyter-builderlock entry required by the updated JupyterLab/Notebook prereleases.🔍 Attention Areas
uv.locknow resolves prerelease versions for JupyterLab and Notebook because the scanner guidance specifically calls for4.6.0a5and7.6.0a5.🧪 Testing
uv lock --checkuv tree --all-groups --locked | rg "(jupyter-server|jupyterlab|mistune|notebook|python-multipart|jupyter-builder) v"git diff --checkmake testpasses (not run; dependency lockfile-only change)✅ Checklist