fix(deps): update module github.com/coreos/go-oidc/v3 to v3.18.0#3814
fix(deps): update module github.com/coreos/go-oidc/v3 to v3.18.0#3814renovate[bot] wants to merge 1 commit intodevelopfrom
Conversation
ℹ️ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
There was a problem hiding this comment.
Stale comment
Security review (automation)
Outcome: No medium, high, or critical security issues were identified in this PR’s changes.
Scope reviewed:
go.mod/go.sumonly —go1.24.6→1.25.0,github.com/coreos/go-oidc/v3v3.17.0→v3.18.0,golang.org/x/oauth2v0.35.0→v0.36.0. No application code was modified, so there is no new auth, injection, or deserialization surface in Semaphore’s own logic.Dependency note: Upstream
v3.18.0is primarily dependency alignment (e.g.go-jose/oauth2bumps per upstream release notes). That is consistent with maintenance and patch-level crypto/JWT handling rather than introducing a new exploitable weakness for this bump alone.Slack summary (copy/paste): PR #3814 (go-oidc → v3.18.0): security pass — diff is toolchain + OIDC/oauth2 bumps only, no app code changes; no actionable medium+ findings.
Sent by Cursor Automation: Find vulnerabilities
616210e to
d41b33c
Compare
There was a problem hiding this comment.
Stale comment
Security review (automation)
Scope: Diff is limited to
go.mod/go.sum:github.com/coreos/go-oidc/v3v3.17.0 → v3.18.0,golang.org/x/oauth2v0.35.0 → v0.36.0, andgodirective 1.24.6 → 1.25.0. No application or OIDC handler code was modified in this PR.Findings: No medium, high, or critical issues attributable to this change were identified.
- Application logic: No new sinks or trust-boundary changes; existing OIDC usage (e.g.
api/login.go) is unchanged by this diff.- Dependencies: v3.18.0 upstream bumps
golang.org/x/oauth2andgithub.com/go-jose/go-jose/v4in the library’s own graph; aligning the main module with currentgo-oidc/oauth2is maintenance, not a new exposure.oauth2was already on a post–CVE-2025-22868 line (v0.35.0); v0.36.0 does not introduce a plausible regression from that perspective.Slack-ready summary: PR #3814 (go-oidc v3.18.0 + oauth2 bump + Go 1.25.0): clean — deps-only PR, no new exploitable paths in diff; no findings to track.
Sent by Cursor Automation: Find vulnerabilities
d41b33c to
05a5980
Compare
There was a problem hiding this comment.
Stale comment
Security review (dependency bump)
Scope: This PR only changes
go.mod/go.sum:github.com/coreos/go-oidc/v3v3.17.0 → v3.18.0,golang.org/x/oauth2v0.35.0 → v0.36.0, and the modulegodirective 1.24.6 → 1.25.0. No application or API code was added or modified.Assessment: No medium, high, or critical vulnerability was identified as introduced or newly exposed by this diff.
- Injection / auth bypass: Semaphore’s OIDC integration (
api/login.go, router) is unchanged; attacker-controlled paths still flow through the same handlers. This PR does not alter verification, state handling, or claim parsing.- Supply chain:
go-oidcv3.18.0 is a small release (per upstream changelog): CI/dependabot housekeeping,golang.org/x/oauth2bump, andgithub.com/go-jose/go-jose/v4v4.1.3 → v4.1.4 inside the library. That is a routine patch-level dependency alignment, not a new Semaphore feature or trust boundary change.- Toolchain: Raising the
godirective matches the declared language version for builds; it does not by itself create an exploitable flaw in the shipped binary.Prior automation review threads from earlier runs are cleared so this assessment is the single active security review outcome.
Slack summary (copy/paste): PR #3814 (go-oidc v3.18.0): Clean — dependency-only bump, no Semaphore code changes; no medium+ security findings; prior bot review threads reconciled.
Sent by Cursor Automation: Find vulnerabilities
05a5980 to
520bfb8
Compare
There was a problem hiding this comment.
Security review (automation)
Outcome: No medium, high, or critical vulnerabilities identified in this change set.
Scope reviewed: Diff is limited to go.mod / go.sum. There are no added or modified application files; OIDC usage in api/login.go is unchanged and does not enable InsecureSkipSignatureCheck or similar unsafe verifier options.
Dependency note: go-oidc v3.18.0 is a maintenance release (CI/dependabot, golang.org/x/oauth2 and go-jose bumps inside that module). This PR aligns Semaphore with those transitive versions and bumps oauth2 directly. No plausible new attacker-controlled sink or auth bypass was introduced by these version bumps alone.
Prior threads: No unresolved automation review threads were present on this PR.
Slack summary: PR3814 security pass — deps-only bump (go-oidc 3.18.0, oauth2 0.36.0, Go 1.25 directive); no exploitable app diff; no findings.
Sent by Cursor Automation: Find vulnerabilities


This PR contains the following updates:
v3.17.0→v3.18.0Release Notes
coreos/go-oidc (github.com/coreos/go-oidc/v3)
v3.18.0Compare Source
What's Changed
Full Changelog: coreos/go-oidc@v3.17.0...v3.18.0
Configuration
📅 Schedule: (UTC)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.