chore: cherry-pick upstream sync (1 commit)#16
Open
prospapledge88 wants to merge 1 commit intodevfrom
Open
Conversation
coleam00#1483) * chore(deps): remove stale package-lock.json to clear Dependabot noise This file was deleted in coleam00#85 (Bun migration) but accidentally re-committed in coleam00#89 unrelated to that PR's actual fix. It hasn't been touched since April and isn't used by anything (CI runs `bun install`), but Dependabot keeps scanning it — every one of the 21 open alerts triaged in coleam00#1353 is against this file, not bun.lock. Removing it closes all 21 alerts. The axios `^1.15.0` override in package.json stays — it's doing real work for the bun tree because @slack/bolt pulls in a vulnerable axios transitively (CVE-2025-62718). Add package-lock.json (and yarn/pnpm lockfiles) to .gitignore so this can't silently slip back in. Closes coleam00#1353 * chore(deps): patch four runtime CVEs in bun.lock via overrides Targets coleam00#1353 alerts that resolve in the actual runtime tree (bun.lock), not just the stale package-lock.json removed in the previous commit. Added overrides: - follow-redirects ^1.16.0 — auth-header leak on cross-domain redirect (GHSA-r4q5-vmmm-2653); via @slack/bolt - path-to-regexp ^8.4.2 — DoS via sequential optional groups (CVE-2026-4926, CVE-2026-4923); via @slack/bolt + claude-agent-sdk - qs ^6.15.1 — arrayLimit bypass DoS (CVE-2025-15284, CVE-2026-2391); via @slack/bolt - flatted ^3.4.2 — prototype pollution in parse() (CVE-2026-33228); dev-only via eslint chain bun audit confirms each resolves to a single non-vulnerable version across the tree. bun run validate green. No code changes — purely transitive bumps; we don't import any of these directly. Skipped (require deeper triage): undici, lodash, picomatch — each has multiple major versions resolved in the bun tree, so a single override would force-downgrade other consumers. (cherry picked from commit 25531df)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Upstream sync — 2026-05-07
Scanned
5957c6e2..upstream/dev(59 commits total). Batches 1–8 (sync PRs #6–#13) had already absorbed the vast majority. This PR picks the one remaining commit that was missed.Commits by tier
Tier 1 — Security CVEs / crash fixes (1 commit picked)
25531dfchore(deps): remove stale package-lock.json to clear Dependabot alerts (#1483)Details: Removes the stale
package-lock.json(accidentally re-committed in upstream coleam00#89, not used by Bun) that was triggering 21 Dependabot alerts. Addspackage-lock.json/yarn.lock/pnpm-lock.yamlto.gitignore. Adds four explicit CVE override pins topackage.json:follow-redirects ^1.16.0— GHSA-r4q5-vmmm-2653 (auth-header leak on cross-domain redirect); via @slack/boltpath-to-regexp ^8.4.2— CVE-2026-4926, CVE-2026-4923 (DoS via sequential optional groups); via @slack/bolt + claude-agent-sdkqs ^6.15.1— CVE-2025-15284, CVE-2026-2391 (arrayLimit bypass DoS); via @slack/boltflatted ^3.4.2— CVE-2026-33228 (prototype pollution in parse()); dev-only via eslint chainOur
bun.lockalready had the patched versions (absorbed via earlier syncs), but thepackage.jsonoverrides were missing, so a freshbun installcould have resolved older vulnerable versions.Tier 2–3 / Skip — All other 58 commits
All bug fixes and reliability improvements from this range were already absorbed in prior sync batches:
Remaining upstream commits are Pi provider, maintainer workflows, Docker-only, Homebrew formula, release commits, and docs — all intentionally skipped per fork policy.
Conflicts resolved
package.jsontest-exclude,@hono/node-server)bun.lockpath-scurryandpendentries);bun installthen regenerated the lockfile cleanly (the conflict arose because our lockfile already had patched versions from an earlier sync)Validation results
check:bundledcheck:bundled-skilltype-checklint --max-warnings 0no-unnecessary-type-assertionerrors (identical ondev)format:checktestsdev): @archon/providers 57 fail (running as root/UID 0, IS_SANDBOX not set), @archon/workflows 2 fail (includes knownbun script node does not leak repo .env from execution cwd (#1135)), @archon/core 25 fail (orchestrator tests)All failures are pre-existing and identical on the
devbranch — confirmed by runningbun run testandbun run lintondevbefore the cherry-pick.Notes
Generated by Claude Code