Conversation
Reviewer's GuideThis PR bumps eight project dependencies to their latest patch or minor versions and regenerates the lockfile to lock in those updates. Sequence Diagram: ERC2771Context Handling of Short msg.datasequenceDiagram
title ERC2771Context Handling of Short msg.data
participant Relayer as "Trusted Forwarder"
participant UserContract as "UserContract (using ERC2771Context)"
Relayer->>UserContract: Forwarded Call (calldata with signer_data_length < 20)
activate UserContract
UserContract->>UserContract: Calls internal _msgSender()
UserContract-->>UserContract: Returns Relayer's address
UserContract->>UserContract: Calls internal _msgData()
UserContract-->>UserContract: Returns full original calldata
UserContract-->>Relayer: Execution succeeds (no revert due to short calldata)
deactivate UserContract
Sequence Diagram: Multicall Context Awareness with ERC2771ContextsequenceDiagram
title Multicall Context Awareness with ERC2771Context
actor Initiator
participant MC as "Multicall Contract"
participant TargetContract as "TargetContract (using ERC2771Context)"
Initiator->>MC: multicall(calls[])
activate MC
MC->>TargetContract: delegatecall(call_data_for_target)
activate TargetContract
TargetContract->>TargetContract: Calls internal _msgSender() (from ERC2771Context)
TargetContract-->>TargetContract: Returns Initiator's address (correct original sender)
TargetContract-->>MC: Call_Result
deactivate TargetContract
MC-->>Initiator: Aggregated_Results
deactivate MC
Updated Class Diagram for ERC2771ContextclassDiagram
class ERC2771Context {
#_contextPrefixLength(): uint256
#_msgSender(): address
#_msgData(): bytes
}
File-Level Changes
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
|
Review the following changes in direct dependencies. Learn more about Socket for GitHub.
|
|
Warning Review the following alerts detected in dependencies. According to your organization's Security Policy, it is recommended to resolve "Warn" alerts. Learn more about Socket for GitHub.
|
Bumps the npm_and_yarn group with 1 update in the / directory: [@openzeppelin/contracts](https://github.com/OpenZeppelin/openzeppelin-contracts). Updates `@openzeppelin/contracts` from 4.9.2 to 4.9.6 - [Release notes](https://github.com/OpenZeppelin/openzeppelin-contracts/releases) - [Changelog](https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/CHANGELOG.md) - [Commits](OpenZeppelin/openzeppelin-contracts@v4.9.2...v4.9.6) Updates `braces` from 3.0.2 to 3.0.3 - [Changelog](https://github.com/micromatch/braces/blob/master/CHANGELOG.md) - [Commits](micromatch/braces@3.0.2...3.0.3) Updates `elliptic` from 6.5.4 to 6.6.1 - [Commits](indutny/elliptic@v6.5.4...v6.6.1) Updates `flat` from 4.1.1 to 5.0.2 - [Release notes](https://github.com/hughsk/flat/releases) - [Commits](hughsk/flat@4.1.1...5.0.2) Updates `follow-redirects` from 1.15.2 to 1.15.9 - [Release notes](https://github.com/follow-redirects/follow-redirects/releases) - [Commits](follow-redirects/follow-redirects@v1.15.2...v1.15.9) Updates `serialize-javascript` from 6.0.0 to 6.0.2 - [Release notes](https://github.com/yahoo/serialize-javascript/releases) - [Commits](yahoo/serialize-javascript@v6.0.0...v6.0.2) Updates `undici` from 5.22.1 to 5.29.0 - [Release notes](https://github.com/nodejs/undici/releases) - [Commits](nodejs/undici@v5.22.1...v5.29.0) Updates `ws` from 7.4.6 to 7.5.10 - [Release notes](https://github.com/websockets/ws/releases) - [Commits](websockets/ws@7.4.6...7.5.10) --- updated-dependencies: - dependency-name: "@openzeppelin/contracts" dependency-version: 4.9.6 dependency-type: direct:development dependency-group: npm_and_yarn - dependency-name: braces dependency-version: 3.0.3 dependency-type: indirect dependency-group: npm_and_yarn - dependency-name: elliptic dependency-version: 6.6.1 dependency-type: indirect dependency-group: npm_and_yarn - dependency-name: flat dependency-version: 5.0.2 dependency-type: indirect dependency-group: npm_and_yarn - dependency-name: follow-redirects dependency-version: 1.15.9 dependency-type: indirect dependency-group: npm_and_yarn - dependency-name: serialize-javascript dependency-version: 6.0.2 dependency-type: indirect dependency-group: npm_and_yarn - dependency-name: undici dependency-version: 5.29.0 dependency-type: indirect dependency-group: npm_and_yarn - dependency-name: ws dependency-version: 7.5.10 dependency-type: indirect dependency-group: npm_and_yarn ... Signed-off-by: dependabot[bot] <support@github.com>
e1528e7 to
e49d7a6
Compare
Dependency ReviewThe following issues were found:
|
Bumps the npm_and_yarn group with 1 update in the / directory: @openzeppelin/contracts.
Updates
@openzeppelin/contractsfrom 4.9.2 to 4.9.6Release notes
Sourced from
@openzeppelin/contracts's releases.Changelog
Sourced from
@openzeppelin/contracts's changelog.Commits
dc44c9fRelease v4.9.6 (#4931)a6286d0Port Base64 tests to truffle (#4926) (#4929)bd325d5Release v4.9.5 (#4790)ad6a5b6Add changeset88ac712Replace doublefunctionDelegateCalla83918dBump node CI version to 16.x0d5f54eRelease v4.9.4 (#4784)ccfffe1Make Multicall context-aware9329cfaRemove Wizard page from 4.xe1b3d8cRemove Wizard from 4.x navigationUpdates
bracesfrom 3.0.2 to 3.0.3Commits
74b2db23.0.388f1429update eslint. lint, fix unit tests.415d660Snyk js braces 6838727 (#40)190510ffix tests, skip 1 test in test/braces.expand716eb9freadme bumpa5851e5Merge pull request #37 from coderaiser/fix/vulnerability2092bd1feature: braces: add maxSymbols (https://github.com/micromatch/braces/issues/...9f5b4cffix: vulnerability (https://security.snyk.io/vuln/SNYK-JS-BRACES-6838727)98414f9remove funding file665ab5dupdate keepEscaping doc (#27)Updates
ellipticfrom 6.5.4 to 6.6.1Commits
9b774366.6.104cb6f5Merge commit from forkb8a7edd6.6.034c8534fix: signature verification due to leading zeros3e46a486.5.7accb61elib: DER signature decoding correction03e06e16.5.67ac5360Merge commit from fork75700786.5.5206da2elib: lintUpdates
flatfrom 4.1.1 to 5.0.2Commits
e5ffd66Release 5.0.2fdb79d5Update dependencies, refresh lockfile, format with standard.e52185dTest against node 14 in CI.0189cb1Avoid arrow function syntax.f25d3a1Release 5.0.154cc7aduse standard formatting779816edrop dependencies2eea6d3Bump lodash from 4.17.15 to 4.17.19a61a554Bump acorn from 7.1.0 to 7.4.020ef0efFix prototype pollution on unflattenUpdates
follow-redirectsfrom 1.15.2 to 1.15.9Commits
e4e55c7Release version 1.15.9 of the npm package.31a1abfAttempt much more gentle detection.d2aaa97Fix url field.62558f0Release version 1.15.8 of the npm package.a8d1ceeReturn subtlety.458ca8eFix native URL test for Node 20.ca49e44Handle KeepAlive connections in tests.f3711d7Test on Node 20 and 22.fda0fafFix typo.760757fRelease version 1.15.7 of the npm package.Updates
serialize-javascriptfrom 6.0.0 to 6.0.2Release notes
Sourced from serialize-javascript's releases.
Commits
b71ec236.0.2f27d65dfix: serialize URL string contents to prevent XSS (#173)02499c0Bump@babel/traversefrom 7.10.1 to 7.23.7 (#171)0d88527docs: update readme with URL support (#146)e2a3a91chore: update node version and lock file5a1fa64fix typo (#164)7139f92Release v6.0.1 (#157)7e23ae8Fix serialization issue for 0n. (#156)343abd9Bump json5 from 2.1.3 to 2.2.3 (#155)38d0e70Bump mocha from 10.1.0 to 10.2.0 (#153)Updates
undicifrom 5.22.1 to 5.29.0Release notes
Sourced from undici's releases.
... (truncated)
Commits
9528f68Bumped v5.29.0f1d75a4increase timeout for redirect test2d31ed6remove fuzzing tests6b36d49fix redirect test in Node v16648dd8fmore fix for the wpt runner on Windowsa0516badon't use internal header state for cookies (#3295)87ce4affix test/client for node 20c2c8fd5fix: accept v20 SSL specific error for alpn selection in http/282200bd[v6.x] fix wpts on windows (#4093)47546fatest: fix windows wpt (#4050)Updates
wsfrom 7.4.6 to 7.5.10Release notes
Sourced from ws's releases.
... (truncated)
Commits
d962d70[dist] 7.5.1022c2876[security] Fix crash when the Upgrade header cannot be read (#2231)8a78f87[dist] 7.5.90435e6e[security] Fix same host check for ws+unix: redirects4271f07[dist] 7.5.8dc1781b[security] Drop sensitive headers when following insecure redirects2758ed3[fix] Abort the handshake if the Upgrade header is invalida370613[dist] 7.5.71f72e2e[security] Drop sensitive headers when following redirects (#2013)8ecd890[dist] 7.5.6Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore <dependency name> major versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)@dependabot ignore <dependency name> minor versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)@dependabot ignore <dependency name>will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)@dependabot unignore <dependency name>will remove all of the ignore conditions of the specified dependency@dependabot unignore <dependency name> <ignore condition>will remove the ignore condition of the specified dependency and ignore conditionsYou can disable automated security fix PRs for this repo from the Security Alerts page.
Summary by Sourcery
Chores: