-
Notifications
You must be signed in to change notification settings - Fork 621
add funding.json for op retro program #6353
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
How to use the Graphite Merge QueueAdd either label to this PR to merge it via the merge queue:
You must have a Graphite account in order to use the merge queue. Sign up using this link. An organization admin has enabled the Graphite Merge Queue in this repository. Please do not merge from GitHub as this will restart CI on PRs being processed by the merge queue. |
|
@Yash094 is attempting to deploy a commit to the thirdweb Team on Vercel. A member of the Team first needs to authorize it. |
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #6353 +/- ##
===========================================
- Coverage 56.83% 41.73% -15.11%
===========================================
Files 1168 1167 -1
Lines 64793 65191 +398
Branches 5258 3842 -1416
===========================================
- Hits 36824 27205 -9619
- Misses 27242 37285 +10043
+ Partials 727 701 -26
*This pull request uses carry forward flags. Click here to find out more. |
jakeloo
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Run formatter on the funding.json file
|
New dependencies detected. Learn more about Socket for GitHub ↗︎
Have feedback? Participate in our User Experience Survey 📊 |
|
🚨 Potential security issues detected. Learn more about Socket for GitHub ↗︎ To accept the risk, merge this PR and you will not be notified again.
Next stepsWhat is a critical CVE?Contains a Critical Common Vulnerability and Exposure (CVE). Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies. Take a deeper look at the dependencyTake a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support [AT] socket [DOT] dev. Remove the packageIf you happen to install a dependency that Socket reports as Known Malware you should immediately remove it and select a different dependency. For other alert types, you may may wish to investigate alternative packages or consider if there are other ways to mitigate the specific risk posed by the dependency. Mark a package as acceptable riskTo ignore an alert, reply with a comment starting with
|
PR-Codex overview
This PR introduces a new
funding.jsonconfiguration and updates thepackage-lock.jsonfile to include various dependencies and their versions, enhancing project management and dependency tracking.Detailed summary
funding.jsonwithopRetroconfiguration and aprojectId.package-lock.jsonto include new dependencies such asbiome,@biomejs/biome, and various@changesetspackages.