Security: uv audit workflow#3102
Conversation
Co-authored-by: Zhihao Dai <zhihao.dai@eng.ox.ac.uk>
Co-authored-by: Zhihao Dai <zhihao.dai@eng.ox.ac.uk>
Co-authored-by: Zhihao Dai <zhihao.dai@eng.ox.ac.uk>
Co-authored-by: Zhihao Dai <zhihao.dai@eng.ox.ac.uk>
Co-authored-by: Zhihao Dai <zhihao.dai@eng.ox.ac.uk>
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## master #3102 +/- ##
==========================================
- Coverage 96.31% 96.24% -0.07%
==========================================
Files 161 161
Lines 17350 17350
==========================================
- Hits 16710 16699 -11
- Misses 640 651 +11 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|
My understanding is that "7 days wait rule" would prevent installing malicious packages, but does not prevent "vulnerable packages" which which tells us that We do have I think |
|
Alright, makes sense in that case. I'm currently checking the nbcovert vulnerability. Seems like it might come from our release dependency m2r2 (markdown to rst) which is anyway not well maintained. I'm working on a replacement. Probably we'll go for myst-parser or similar |
Co-authored-by: Zhihao Dai <zhihao.dai@eng.ox.ac.uk>
Checklist before merging this PR:
Fixes #.
Summary
uv audit(available since0.10.8) provides auditing against lockfile for known vulnerabilities. This PR proposes a weekly workflow to runuv auditand surface any vulnerabilities.uv auditrequires0.10.8or higher, I have updateduvversion to 0.11.7 (released on 2026-04-15).astral-sh/setup-uvto8.1.0(released on 2026-04-16) which now enforces immutable release.Ref:
uv auditdocumentationOther Information