booster
booster copied to clipboard
fix: Update glob to 10.5.0 to address CVE-2025-64756
Force all glob dependencies to use version 10.5.0 or higher via pnpm hook to prevent command injection vulnerability (CVE-2025-64756) that affects glob versions 10.2.0 through 10.4.x.
The vulnerability allows arbitrary command execution when the glob CLI tool is used with the -c/--cmd flag and processes files with malicious names. While this primarily affects CLI usage, updating ensures no security scanners will flag vulnerable versions in the dependency tree.
Changes:
- Updated .pnpmfile.cjs hook to override vulnerable glob versions
- Regenerated pnpm-lock.yaml with glob 10.5.0
🤖 Generated with Claude Code
Description
Changes
Checks
- [ ] Project Builds
- [ ] Project passes tests and checks
- [ ] Updated documentation accordingly
PR Summary
- Upgrade of 'glob' dependency version This update boosts the security of our application by addressing a potential weakness, called command injection vulnerability, that was discovered in certain versions of the 'glob' dependency we use. This vulnerability has been officially identified by number CVE-2025-64756. We've upgraded from those susceptible versions to version '10.5.0' to eliminate this risk. This action puts our users' data safety at top priority, ensuring our software continues to provide trustworthy service.
/integration sha=224dfd7
:x: Oh no! Integration tests have failed