Skip to content

Fix dependency vulnerabilities (grpc, mcp-sdk, spdystream, go-git, circl)#322

Merged
davixcky merged 3 commits into
mainfrom
fix/dependabot-vulnerabilities
Apr 22, 2026
Merged

Fix dependency vulnerabilities (grpc, mcp-sdk, spdystream, go-git, circl)#322
davixcky merged 3 commits into
mainfrom
fix/dependabot-vulnerabilities

Conversation

@davixcky
Copy link
Copy Markdown
Contributor

Summary

  • Bump google.golang.org/grpc v1.78.0 → v1.79.3 (critical: authorization bypass via missing leading slash in :path pseudo-header, CVE-2026-33186)
  • Bump modelcontextprotocol/go-sdk v1.1.0 → v1.4.1 (high: DNS rebinding, cross-site tool execution, improper case sensitivity handling)
  • Bump moby/spdystream v0.5.0 → v0.5.1 (high: DoS via unvalidated SPDY frame lengths, CVE-2026-35469)
  • Bump go-git/go-git/v5 v5.16.5 → v5.18.0 (medium: credential leak via cross-host redirect, idx file memory DoS)
  • Bump cloudflare/circl v1.6.1 → v1.6.3 (low: incorrect secp384r1 calculation)

Resolves all 10 open Dependabot alerts on this repo. Part of ENG-896.

Test plan

  • go build ./cmd/... passes
  • go test ./cmd/... ./internal/... passes
  • Verify Dependabot alerts are auto-dismissed after merge

🤖 Generated with Claude Code

Bump vulnerable Go dependencies to patched versions:
- google.golang.org/grpc v1.78.0 → v1.79.3 (critical: authz bypass CVE-2026-33186)
- modelcontextprotocol/go-sdk v1.1.0 → v1.4.1 (high: DNS rebinding, cross-site tool exec)
- moby/spdystream v0.5.0 → v0.5.1 (high: DoS on CRI CVE-2026-35469)
- go-git/go-git/v5 v5.16.5 → v5.18.0 (medium: credential leak, idx file DoS)
- cloudflare/circl v1.6.1 → v1.6.3 (low: incorrect secp384r1 calculation)

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@daniel-de-vera
Copy link
Copy Markdown
Contributor

@davixcky, did you test the CLI with these changes? (in particular mcp and local).
Also, I'm surprised to not see libconnect changes in this PR, why don't you also include the required updates from libconnect?

@davixcky davixcky changed the title Fix critical and high severity dependency vulnerabilities WIP: Fix critical and high severity dependency vulnerabilities Apr 21, 2026
@davixcky
Copy link
Copy Markdown
Contributor Author

@davixcky, did you test the CLI with these changes? (in particular mcp and local).

Yes, working fine
image

Also, I'm surprised to not see libconnect changes in this PR, why don't you also include the required updates from libconnect?

I will leave libconnect upgrade separately

@davixcky davixcky changed the title WIP: Fix critical and high severity dependency vulnerabilities chore: Fix critical and high severity dependency vulnerabilities Apr 21, 2026
@davixcky davixcky requested review from daniel-de-vera, foxish and scott-cotton and removed request for daniel-de-vera and scott-cotton April 21, 2026 20:48
davixcky and others added 2 commits April 21, 2026 15:59
Update libconnect to include grpc v1.79.3, spdystream v0.5.1,
and x/net v0.53.0 fixes.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@davixcky davixcky changed the title chore: Fix critical and high severity dependency vulnerabilities WIP: Fix dependency vulnerabilities (grpc, mcp-sdk, spdystream, go-git, circl) Apr 21, 2026
Copy link
Copy Markdown
Contributor

@daniel-de-vera daniel-de-vera left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@davixcky davixcky changed the title WIP: Fix dependency vulnerabilities (grpc, mcp-sdk, spdystream, go-git, circl) Fix dependency vulnerabilities (grpc, mcp-sdk, spdystream, go-git, circl) Apr 22, 2026
@davixcky davixcky merged commit ce4a8e8 into main Apr 22, 2026
@davixcky davixcky deleted the fix/dependabot-vulnerabilities branch April 22, 2026 14:05
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants