chore(deps): update dependency nanoid to v5.1.11#3714
chore(deps): update dependency nanoid to v5.1.11#3714renovate[bot] wants to merge 1 commit intodevelopfrom
Conversation
2951987 to
3a93bea
Compare
3a93bea to
40a8365
Compare
Up to standards ✅🟢 Issues
|
| Metric | Results |
|---|---|
| Duplication | 0 |
TIP This summary will be updated as you push new changes. Give us feedback
40a8365 to
1dd9f95
Compare
1dd9f95 to
6d23404
Compare
There was a problem hiding this comment.
Stale comment
Security Review: No Issues Found
This PR updates the
nanoiddev dependency from 5.1.6 to 5.1.9 inweb/package-lock.jsononly. No security concerns identified:
- Scope: Lockfile-only change; no application code modified.
- Dependency risk:
nanoidis a dev-only dependency (not shipped to production). No known vulnerabilities exist for the 5.1.x line (prior issues like CVE-2024-55565 were fixed in 5.0.9).- Supply chain: Integrity hashes are present and the package is resolved from the official npm registry. The update is authored by Renovate Bot, a trusted automated dependency manager.
Sent by Cursor Automation: Find vulnerabilities
6d23404 to
ed5d6d3
Compare
There was a problem hiding this comment.
Stale comment
Security review (nanoid 5.1.6 → 5.1.9)
Outcome: No medium, high, or critical findings tied to this change.
What changed: Only
web/package-lock.json— resolved version and integrity hash for the top-levelnanoiddevDependency (5.1.6→5.1.9). No application or build-script source was modified.Analysis:
- Attack surface: No new code paths; dependency patch bump only.
- Direct usage: No
import/requireofnanoidinweb/Vue/JS sources; it remains a dev dependency (lockfile marksnode_modules/nanoidasdev: true).- Known nanoid issues: CVE-2024-55565 (fractional
size/ DoS) is fixed in5.0.9+; both old and new versions are in the patched range. Public scanners (e.g. Snyk) list no direct vulnerabilities on5.1.9.- Supply chain: Same registry URL pattern; integrity pin updated to match the new tarball — expected for a lockfile update.
No inline comments filed; nothing to substantiate at medium+ confidence with a concrete exploit path in this diff.
Sent by Cursor Automation: Find vulnerabilities
ed5d6d3 to
713ef37
Compare
There was a problem hiding this comment.
Security review (nanoid 5.1.6 → 5.1.11)
Scope: Only web/package-lock.json changed (version + npm integrity for nanoid).
Assessment: No medium, high, or critical issues identified from this diff.
- No application or config logic was added or modified; there is no new attacker-controlled sink or boundary change to analyze.
- This is a patch-level bump within the existing 5.x line. Known advisory CVE-2024-55565 (fractional
size/ improper validation) affects versions < 5.0.9; 5.1.6 and 5.1.11 are already in the fixed range, so the bump does not remediate a gap introduced by this PR—it maintains dependency hygiene. - Supply-chain: updated tarball is pinned with an npm integrity hash in the lockfile (standard npm verification).
Prior threads: Previous automation assessments were cleared so this review reflects the current state only.
No inline comments: no high-confidence vulnerability tied to the modified lines.
Sent by Cursor Automation: Find vulnerabilities


This PR contains the following updates:
5.1.6→5.1.11Release Notes
ai/nanoid (nanoid)
v5.1.11Compare Source
v5.1.10Compare Source
v5.1.9Compare Source
v5.1.8Compare Source
cusatomAlphabet75% faster (by @saripovdenis).v5.1.7Compare Source
--versionto CLI (by @mahmoodhamdi).nanoid.jsfor CDN (by @mahmoodhamdi).customRandomtypes (by @oguimbal).Configuration
📅 Schedule: (UTC)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.