Skip to content

chore(main): release web3telegram 0.1.0-alpha.10#98

Merged
abbesBenayache merged 1 commit intomainfrom
release-please--branches--main--components--web3telegram
Feb 16, 2026
Merged

chore(main): release web3telegram 0.1.0-alpha.10#98
abbesBenayache merged 1 commit intomainfrom
release-please--branches--main--components--web3telegram

Conversation

@iexec-release-please-app
Copy link
Contributor

🤖 I have created a release beep boop

0.1.0-alpha.10 (2026-02-16)

Changed

  • stop enforcing SCONE as unique TEE framework for orders (#97) (6864435)

This PR was generated with Release Please. See documentation.

@cursor
Copy link

cursor bot commented Feb 16, 2026

You have run out of free Bugbot PR reviews for this billing cycle. This will reset on March 10.

To receive reviews on all of your PRs, visit the Cursor dashboard to activate Pro and start your 14-day free trial.

@socket-security
Copy link

Warning

Review the following alerts detected in dependencies.

According to your organization's Security Policy, it is recommended to resolve "Warn" alerts. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Warn Critical
Critical CVE: TimelockController vulnerability in OpenZeppelin Contracts in npm @openzeppelin/contracts

CVE: GHSA-fg47-3c2x-m2wr TimelockController vulnerability in OpenZeppelin Contracts (CRITICAL)

Affected versions: >= 4.0.0 < 4.3.1; >= 3.3.0 < 3.4.2

Patched version: 3.4.2

From: dapp/package-lock.jsonnpm/iexec@8.22.0npm/@openzeppelin/contracts@3.3.0

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@openzeppelin/contracts@3.3.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
GitHub dependency: npm @ensdomains/ens-contracts depends on Arachnid/clones-with-immutable-args

Dependency: clones-with-immutable-args@Arachnid/clones-with-immutable-args@#featur

Location: Package overview

From: dapp/package-lock.jsonnpm/iexec@8.22.0npm/@ensdomains/ens-contracts@1.6.0

ℹ Read more on: This package | This alert | What are GitHub dependencies?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Publish the GitHub dependency to a public or private package repository and consume it from there.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@ensdomains/ens-contracts@1.6.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
Obfuscated code: npm registry-auth-token is 94.0% likely obfuscated

Confidence: 0.94

Location: Package overview

From: dapp/package-lock.jsonnpm/iexec@8.22.0npm/registry-auth-token@3.3.2

ℹ Read more on: This package | This alert | What is obfuscated code?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should not obfuscate their code. Consider not using packages with obfuscated code.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/registry-auth-token@3.3.2. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

@abbesBenayache abbesBenayache self-requested a review February 16, 2026 14:59
@abbesBenayache abbesBenayache merged commit 473b6a9 into main Feb 16, 2026
7 checks passed
@abbesBenayache abbesBenayache deleted the release-please--branches--main--components--web3telegram branch February 16, 2026 15:00
@iexec-release-please-app
Copy link
Contributor Author

🤖 Created releases:

🌻

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant