Skip to content

chore(deps): bump the go_modules group across 2 directories with 4 updates#164

Open
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/go_modules/op-defender/go_modules-d5c38e6a91
Open

chore(deps): bump the go_modules group across 2 directories with 4 updates#164
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/go_modules/op-defender/go_modules-d5c38e6a91

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jan 15, 2026

Bumps the go_modules group with 3 updates in the /op-defender directory: golang.org/x/crypto, github.com/consensys/gnark-crypto and github.com/sirupsen/logrus.
Bumps the go_modules group with 2 updates in the /op-monitorism directory: golang.org/x/crypto and github.com/consensys/gnark-crypto.

Updates golang.org/x/crypto from 0.21.0 to 0.45.0

Commits
  • 4e0068c go.mod: update golang.org/x dependencies
  • e79546e ssh: curb GSSAPI DoS risk by limiting number of specified OIDs
  • f91f7a7 ssh/agent: prevent panic on malformed constraint
  • 2df4153 acme/autocert: let automatic renewal work with short lifetime certs
  • bcf6a84 acme: pass context to request
  • b4f2b62 ssh: fix error message on unsupported cipher
  • 79ec3a5 ssh: allow to bind to a hostname in remote forwarding
  • 122a78f go.mod: update golang.org/x dependencies
  • c0531f9 all: eliminate vet diagnostics
  • 0997000 all: fix some comments
  • Additional commits viewable in compare view

Updates github.com/consensys/gnark-crypto from 0.12.1 to 0.18.1

Release notes

Sourced from github.com/consensys/gnark-crypto's releases.

v0.18.1

Full Changelog: Consensys/gnark-crypto@v0.18.0...v0.18.1

v0.18.0

What's Changed

New Contributors

Full Changelog: Consensys/gnark-crypto@v0.17.0...v0.18.0

v0.17.0

What's Changed

New Contributors

... (truncated)

Changelog

Sourced from github.com/consensys/gnark-crypto's changelog.

[v0.18.1] - 2025-10-28

Docs

  • add CHANGELOG for 0.18.1

Perf

  • limit memory allocation during Vector deserialization (#759)

[v0.18.0] - 2025-06-09

Build

  • deps: bump golang.org/x/crypto from 0.33.0 to 0.35.0 (#677)

Chore

  • remove unused benchmark script (#675)

Docs

  • replace outdated link to article (#690)

Experiment

  • vortex on koalabear (#645)

Feat

  • remove dependency on internal package in ecc.go (#693)
  • make <31 bit field generated using uint32 (#676)

Fix

  • remove unimplemented path from fft ext
  • Eisenstein Half-GCD convergence (#680)

Perf

  • adds avx512 poseidon2 for small fields (#665)
  • remove useless copies in e4 mul by elem (#667)
  • disable cobra bit reverse for small fields (#662)

Refactor

  • hash to curve (#674)

[v0.17.0] - 2025-03-11

Chore

  • remove useless github workflow
  • generify poseidon2 parameters for other curves/fr (#636)
  • add auto close PR workflow (#638)

Feat

  • baby-bear and koala-bear extensions of degree 4 (#643)
  • poseidon2 for koala-bear, baby-bear and goldilocks (#629)
  • add sis avx512 and fft avx512 for koalabear (#622)

... (truncated)

Commits

Updates github.com/sirupsen/logrus from 1.9.0 to 1.9.1

Release notes

Sourced from github.com/sirupsen/logrus's releases.

v1.9.1

What's Changed

New Contributors

Full Changelog: sirupsen/logrus@v1.9.0...v1.9.1

Commits
  • b30aa27 Merge pull request #1339 from xieyuschen/patch-1
  • 6acd903 Merge pull request #1376 from ozfive/master
  • 105e63f Merge pull request #1 from ashmckenzie/ashmckenzie/fix-writer-scanner
  • c052ba6 Scan text in 64KB chunks
  • e59b167 Merge pull request #1372 from tommyblue/syslog_different_loglevels
  • 766cfec This commit fixes a potential denial of service vulnerability in logrus.Write...
  • 70234da Add instructions to use different log levels for local and syslog
  • a448f82 Merge pull request #1362 from FrancoisWagner/fix-data-race-in-hooks-test-pkg
  • ff07b25 Fix data race in hooks.test package
  • d8787af Use text when shows the logrus output
  • See full diff in compare view

Updates golang.org/x/net from 0.23.0 to 0.47.0

Commits
  • 9a29643 go.mod: update golang.org/x dependencies
  • 07cefd8 context: deprecate
  • 5ac9dac publicsuffix: don't treat ip addresses as domain names
  • d1f64cc quic: use testing/synctest
  • fff0469 http2: document that RFC 7540 prioritization does not work with small payloads
  • f35e3a4 http2: fix weight overflow in RFC 7540 write scheduler
  • 89adc90 http2: fix typo referring to RFC 9218 as RFC 9128 instead
  • 8d76a2c quic: don't defer MAX_STREAMS frames indefinitely
  • 027f8b7 quic: fix expected ACK Delay in client's ACK after HANDSHAKE_DONE
  • dec9fe7 dns/dnsmessage: update SVCB packing to prohibit name compression
  • Additional commits viewable in compare view

Updates golang.org/x/crypto from 0.32.0 to 0.45.0

Commits
  • 4e0068c go.mod: update golang.org/x dependencies
  • e79546e ssh: curb GSSAPI DoS risk by limiting number of specified OIDs
  • f91f7a7 ssh/agent: prevent panic on malformed constraint
  • 2df4153 acme/autocert: let automatic renewal work with short lifetime certs
  • bcf6a84 acme: pass context to request
  • b4f2b62 ssh: fix error message on unsupported cipher
  • 79ec3a5 ssh: allow to bind to a hostname in remote forwarding
  • 122a78f go.mod: update golang.org/x dependencies
  • c0531f9 all: eliminate vet diagnostics
  • 0997000 all: fix some comments
  • Additional commits viewable in compare view

Updates github.com/consensys/gnark-crypto from 0.16.0 to 0.18.1

Release notes

Sourced from github.com/consensys/gnark-crypto's releases.

v0.18.1

Full Changelog: Consensys/gnark-crypto@v0.18.0...v0.18.1

v0.18.0

What's Changed

New Contributors

Full Changelog: Consensys/gnark-crypto@v0.17.0...v0.18.0

v0.17.0

What's Changed

New Contributors

... (truncated)

Changelog

Sourced from github.com/consensys/gnark-crypto's changelog.

[v0.18.1] - 2025-10-28

Docs

  • add CHANGELOG for 0.18.1

Perf

  • limit memory allocation during Vector deserialization (#759)

[v0.18.0] - 2025-06-09

Build

  • deps: bump golang.org/x/crypto from 0.33.0 to 0.35.0 (#677)

Chore

  • remove unused benchmark script (#675)

Docs

  • replace outdated link to article (#690)

Experiment

  • vortex on koalabear (#645)

Feat

  • remove dependency on internal package in ecc.go (#693)
  • make <31 bit field generated using uint32 (#676)

Fix

  • remove unimplemented path from fft ext
  • Eisenstein Half-GCD convergence (#680)

Perf

  • adds avx512 poseidon2 for small fields (#665)
  • remove useless copies in e4 mul by elem (#667)
  • disable cobra bit reverse for small fields (#662)

Refactor

  • hash to curve (#674)

[v0.17.0] - 2025-03-11

Chore

  • remove useless github workflow
  • generify poseidon2 parameters for other curves/fr (#636)
  • add auto close PR workflow (#638)

Feat

  • baby-bear and koala-bear extensions of degree 4 (#643)
  • poseidon2 for koala-bear, baby-bear and goldilocks (#629)
  • add sis avx512 and fft avx512 for koalabear (#622)

... (truncated)

Commits

Updates golang.org/x/net from 0.34.0 to 0.47.0

Commits
  • 9a29643 go.mod: update golang.org/x dependencies
  • 07cefd8 context: deprecate
  • 5ac9dac publicsuffix: don't treat ip addresses as domain names
  • d1f64cc quic: use testing/synctest
  • fff0469 http2: document that RFC 7540 prioritization does not work with small payloads
  • f35e3a4 http2: fix weight overflow in RFC 7540 write scheduler
  • 89adc90 http2: fix typo referring to RFC 9218 as RFC 9128 instead
  • 8d76a2c quic: don't defer MAX_STREAMS frames indefinitely
  • 027f8b7 quic: fix expected ACK Delay in client's ACK after HANDSHAKE_DONE
  • dec9fe7 dns/dnsmessage: update SVCB packing to prohibit name compression
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
    You can disable automated security fix PRs for this repo from the Security Alerts page.

…dates

Bumps the go_modules group with 3 updates in the /op-defender directory: [golang.org/x/crypto](https://github.com/golang/crypto), [github.com/consensys/gnark-crypto](https://github.com/consensys/gnark-crypto) and [github.com/sirupsen/logrus](https://github.com/sirupsen/logrus).
Bumps the go_modules group with 2 updates in the /op-monitorism directory: [golang.org/x/crypto](https://github.com/golang/crypto) and [github.com/consensys/gnark-crypto](https://github.com/consensys/gnark-crypto).


Updates `golang.org/x/crypto` from 0.21.0 to 0.45.0
- [Commits](golang/crypto@v0.21.0...v0.45.0)

Updates `github.com/consensys/gnark-crypto` from 0.12.1 to 0.18.1
- [Release notes](https://github.com/consensys/gnark-crypto/releases)
- [Changelog](https://github.com/Consensys/gnark-crypto/blob/master/CHANGELOG.md)
- [Commits](Consensys/gnark-crypto@v0.12.1...v0.18.1)

Updates `github.com/sirupsen/logrus` from 1.9.0 to 1.9.1
- [Release notes](https://github.com/sirupsen/logrus/releases)
- [Changelog](https://github.com/sirupsen/logrus/blob/master/CHANGELOG.md)
- [Commits](sirupsen/logrus@v1.9.0...v1.9.1)

Updates `golang.org/x/net` from 0.23.0 to 0.47.0
- [Commits](golang/net@v0.23.0...v0.47.0)

Updates `golang.org/x/crypto` from 0.32.0 to 0.45.0
- [Commits](golang/crypto@v0.21.0...v0.45.0)

Updates `github.com/consensys/gnark-crypto` from 0.16.0 to 0.18.1
- [Release notes](https://github.com/consensys/gnark-crypto/releases)
- [Changelog](https://github.com/Consensys/gnark-crypto/blob/master/CHANGELOG.md)
- [Commits](Consensys/gnark-crypto@v0.12.1...v0.18.1)

Updates `golang.org/x/net` from 0.34.0 to 0.47.0
- [Commits](golang/net@v0.23.0...v0.47.0)

---
updated-dependencies:
- dependency-name: golang.org/x/crypto
  dependency-version: 0.45.0
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: github.com/consensys/gnark-crypto
  dependency-version: 0.18.1
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: github.com/sirupsen/logrus
  dependency-version: 1.9.1
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: golang.org/x/net
  dependency-version: 0.47.0
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: golang.org/x/crypto
  dependency-version: 0.45.0
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: github.com/consensys/gnark-crypto
  dependency-version: 0.18.1
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: golang.org/x/net
  dependency-version: 0.47.0
  dependency-type: indirect
  dependency-group: go_modules
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot requested review from a team as code owners January 15, 2026 18:26
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update go code labels Jan 15, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file go Pull requests that update go code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants