Skip to content

build(deps-dev): bump picomatch from 2.3.1 to 2.3.2 in /src/applications/lambda/petfood-cleanup-processor-node#529

Open
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/npm_and_yarn/src/applications/lambda/petfood-cleanup-processor-node/picomatch-2.3.2
Open

build(deps-dev): bump picomatch from 2.3.1 to 2.3.2 in /src/applications/lambda/petfood-cleanup-processor-node#529
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/npm_and_yarn/src/applications/lambda/petfood-cleanup-processor-node/picomatch-2.3.2

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot bot commented on behalf of github Mar 26, 2026

Bumps picomatch from 2.3.1 to 2.3.2.

Release notes

Sourced from picomatch's releases.

2.3.2

This is a security release fixing several security relevant issues.

What's Changed

Full Changelog: micromatch/picomatch@2.3.1...2.3.2

Changelog

Sourced from picomatch's changelog.

Release history

All notable changes to this project will be documented in this file.

The format is based on Keep a Changelog and this project adheres to Semantic Versioning.

  • Changelogs are for humans, not machines.
  • There should be an entry for every single version.
  • The same types of changes should be grouped.
  • Versions and sections should be linkable.
  • The latest version comes first.
  • The release date of each versions is displayed.
  • Mention whether you follow Semantic Versioning.

Changelog entries are classified using the following labels (from keep-a-changelog):

  • Added for new features.
  • Changed for changes in existing functionality.
  • Deprecated for soon-to-be removed features.
  • Removed for now removed features.
  • Fixed for any bug fixes.
  • Security in case of vulnerabilities.

4.0.0 (2024-02-07)

Fixes

Changed

3.0.1

Fixes

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [picomatch](https://github.com/micromatch/picomatch) from 2.3.1 to 2.3.2.
- [Release notes](https://github.com/micromatch/picomatch/releases)
- [Changelog](https://github.com/micromatch/picomatch/blob/master/CHANGELOG.md)
- [Commits](micromatch/picomatch@2.3.1...2.3.2)

---
updated-dependencies:
- dependency-name: picomatch
  dependency-version: 2.3.2
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file javascript Pull requests that update Javascript code labels Mar 26, 2026
@github-actions
Copy link
Copy Markdown
Contributor

ASH Security Scan Report

  • Report generated: 2026-03-26T00:35:03+00:00
  • Time since scan: 1 minute

Scan Metadata

  • Project: ASH
  • Scan executed: 2026-03-26T00:33:32+00:00
  • ASH version: 3.2.4

Summary

Scanner Results

The table below shows findings by scanner, with status based on severity thresholds and dependencies:

  • Severity levels:
    • Suppressed (S): Findings that have been explicitly suppressed and don't affect scanner status
    • Critical (C): Highest severity findings that require immediate attention
    • High (H): Serious findings that should be addressed soon
    • Medium (M): Moderate risk findings
    • Low (L): Lower risk findings
    • Info (I): Informational findings with minimal risk
  • Duration (Time): Time taken by the scanner to complete its execution
  • Actionable: Number of findings at or above the threshold severity level that require attention
  • Result:
    • PASSED = No findings at or above threshold
    • FAILED = Findings at or above threshold
    • MISSING = Required dependencies not available
    • SKIPPED = Scanner explicitly disabled
    • ERROR = Scanner execution error
  • Threshold: The minimum severity level that will cause a scanner to fail
    • Thresholds: ALL, LOW, MEDIUM, HIGH, CRITICAL
    • Source: Values in parentheses indicate where the threshold is set:
      • global (global_settings section in the ASH_CONFIG used)
      • config (scanner config section in the ASH_CONFIG used)
      • scanner (default configuration in the plugin, if explicitly set)
  • Statistics calculation:
    • All statistics are calculated from the final aggregated SARIF report
    • Suppressed findings are counted separately and do not contribute to actionable findings
    • Scanner status is determined by comparing actionable findings to the threshold
Scanner Suppressed Critical High Medium Low Info Actionable Result Threshold
bandit 0 0 0 0 25 0 0 PASSED MEDIUM (global)
cdk-nag 0 0 0 0 0 0 0 SKIPPED MEDIUM (global)
cfn-nag 0 0 0 0 0 0 0 MISSING MEDIUM (global)
checkov 30 0 0 0 0 0 0 PASSED MEDIUM (global)
detect-secrets 24 0 0 0 0 0 0 PASSED MEDIUM (global)
grype 0 10 0 7 3 0 17 FAILED MEDIUM (global)
npm-audit 0 0 0 0 0 0 0 PASSED MEDIUM (global)
opengrep 0 0 0 0 0 0 0 MISSING MEDIUM (global)
semgrep 14 1 0 0 0 0 1 FAILED MEDIUM (global)
syft 0 0 0 0 0 0 0 PASSED MEDIUM (global)
trivy-repo 0 0 0 0 0 0 0 MISSING MEDIUM (global)

Top 9 Hotspots

Files with the highest number of security findings:

Finding Count File Location
4 src/applications/microservices/petfood-rs/Cargo.lock
2 src/applications/lambda/petfood-cleanup-processor-node/package-lock.json
2 src/applications/lambda/petstatusupdater-node/package-lock.json
2 src/cdk/package-lock.json
2 src/applications/lambda/traffic-generator-node/package-lock.json
2 src/applications/lambda/petfood-stock-processor-node/package-lock.json
2 package-lock.json
1 src/cdk/scripts/keycloak/keycloak-setup.sh
1 src/applications/microservices/payforadoption-go/go.mod

Detailed Findings

Show 18 actionable findings

Finding 1: bash.curl.security.curl-pipe-bash.curl-pipe-bash

  • Severity: HIGH
  • Scanner: semgrep
  • Rule ID: bash.curl.security.curl-pipe-bash.curl-pipe-bash
  • Location: src/cdk/scripts/keycloak/keycloak-setup.sh:213

Description:
Data is being piped into bash from a curl command. An attacker with control of the server in the curl command could inject malicious code into the pipe, resulting in a system compromise. Avoid piping untrusted data into bash or any other shell if you can. If you must do this, consider checking the SHA sum of the content returned by the server to verify its integrity.

Code Snippet:

curl -fsSL https://raw.githubusercontent.com/helm/helm/main/scripts/get-helm-3 | bash

Finding 2: GHSA-8gc5-j5rx-235r-fast-xml-parser

  • Severity: HIGH
  • Scanner: grype
  • Rule ID: GHSA-8gc5-j5rx-235r-fast-xml-parser
  • Location: src/applications/lambda/petfood-cleanup-processor-node/package-lock.json:1

Description:
A high vulnerability in npm package: fast-xml-parser, version 5.3.6 was found at: /src/applications/lambda/petfood-cleanup-processor-node/package-lock.json


Finding 3: GHSA-8gc5-j5rx-235r-fast-xml-parser

  • Severity: HIGH
  • Scanner: grype
  • Rule ID: GHSA-8gc5-j5rx-235r-fast-xml-parser
  • Location: src/applications/lambda/petstatusupdater-node/package-lock.json:1

Description:
A high vulnerability in npm package: fast-xml-parser, version 5.3.6 was found at: /src/applications/lambda/petstatusupdater-node/package-lock.json


Finding 4: GHSA-8gc5-j5rx-235r-fast-xml-parser

  • Severity: HIGH
  • Scanner: grype
  • Rule ID: GHSA-8gc5-j5rx-235r-fast-xml-parser
  • Location: src/cdk/package-lock.json:1

Description:
A high vulnerability in npm package: fast-xml-parser, version 5.3.6 was found at: /src/cdk/package-lock.json


Finding 5: GHSA-8gc5-j5rx-235r-fast-xml-parser

  • Severity: HIGH
  • Scanner: grype
  • Rule ID: GHSA-8gc5-j5rx-235r-fast-xml-parser
  • Location: src/applications/lambda/traffic-generator-node/package-lock.json:1

Description:
A high vulnerability in npm package: fast-xml-parser, version 5.4.1 was found at: /src/applications/lambda/traffic-generator-node/package-lock.json


Finding 6: GHSA-8gc5-j5rx-235r-fast-xml-parser

  • Severity: HIGH
  • Scanner: grype
  • Rule ID: GHSA-8gc5-j5rx-235r-fast-xml-parser
  • Location: src/applications/lambda/petfood-stock-processor-node/package-lock.json:1

Description:
A high vulnerability in npm package: fast-xml-parser, version 5.4.1 was found at: /src/applications/lambda/petfood-stock-processor-node/package-lock.json


Finding 7: GHSA-rf6f-7fwh-wjgh-flatted

  • Severity: HIGH
  • Scanner: grype
  • Rule ID: GHSA-rf6f-7fwh-wjgh-flatted
  • Location: package-lock.json:1

Description:
A high vulnerability in npm package: flatted, version 3.3.3 was found at: /package-lock.json


Finding 8: GHSA-25h7-pfq9-p65f-flatted

  • Severity: HIGH
  • Scanner: grype
  • Rule ID: GHSA-25h7-pfq9-p65f-flatted
  • Location: package-lock.json:1

Description:
A high vulnerability in npm package: flatted, version 3.3.3 was found at: /package-lock.json


Finding 9: GHSA-p77j-4mvh-x3m3-google.golang.org/grpc

  • Severity: HIGH
  • Scanner: grype
  • Rule ID: GHSA-p77j-4mvh-x3m3-google.golang.org/grpc
  • Location: src/applications/microservices/payforadoption-go/go.mod:1

Description:
A critical vulnerability in go-module package: google.golang.org/grpc, version v1.76.0 was found at: /src/applications/microservices/payforadoption-go/go.mod


Finding 10: GHSA-394x-vwmw-crm3-aws-lc-sys

  • Severity: HIGH
  • Scanner: grype
  • Rule ID: GHSA-394x-vwmw-crm3-aws-lc-sys
  • Location: src/applications/microservices/petfood-rs/Cargo.lock:1

Description:
A high vulnerability in rust-crate package: aws-lc-sys, version 0.38.0 was found at: /src/applications/microservices/petfood-rs/Cargo.lock


Finding 11: GHSA-9f94-5g5w-gf6r-aws-lc-sys

  • Severity: HIGH
  • Scanner: grype
  • Rule ID: GHSA-9f94-5g5w-gf6r-aws-lc-sys
  • Location: src/applications/microservices/petfood-rs/Cargo.lock:1

Description:
A high vulnerability in rust-crate package: aws-lc-sys, version 0.38.0 was found at: /src/applications/microservices/petfood-rs/Cargo.lock


Finding 12: GHSA-jp2q-39xq-3w4g-fast-xml-parser

  • Severity: MEDIUM
  • Scanner: grype
  • Rule ID: GHSA-jp2q-39xq-3w4g-fast-xml-parser
  • Location: src/applications/lambda/petfood-cleanup-processor-node/package-lock.json:1

Description:
A medium vulnerability in npm package: fast-xml-parser, version 5.3.6 was found at: /src/applications/lambda/petfood-cleanup-processor-node/package-lock.json


Finding 13: GHSA-jp2q-39xq-3w4g-fast-xml-parser

  • Severity: MEDIUM
  • Scanner: grype
  • Rule ID: GHSA-jp2q-39xq-3w4g-fast-xml-parser
  • Location: src/applications/lambda/petstatusupdater-node/package-lock.json:1

Description:
A medium vulnerability in npm package: fast-xml-parser, version 5.3.6 was found at: /src/applications/lambda/petstatusupdater-node/package-lock.json


Finding 14: GHSA-jp2q-39xq-3w4g-fast-xml-parser

  • Severity: MEDIUM
  • Scanner: grype
  • Rule ID: GHSA-jp2q-39xq-3w4g-fast-xml-parser
  • Location: src/cdk/package-lock.json:1

Description:
A medium vulnerability in npm package: fast-xml-parser, version 5.3.6 was found at: /src/cdk/package-lock.json


Finding 15: GHSA-jp2q-39xq-3w4g-fast-xml-parser

  • Severity: MEDIUM
  • Scanner: grype
  • Rule ID: GHSA-jp2q-39xq-3w4g-fast-xml-parser
  • Location: src/applications/lambda/petfood-stock-processor-node/package-lock.json:1

Description:
A medium vulnerability in npm package: fast-xml-parser, version 5.4.1 was found at: /src/applications/lambda/petfood-stock-processor-node/package-lock.json


Finding 16: GHSA-jp2q-39xq-3w4g-fast-xml-parser

  • Severity: MEDIUM
  • Scanner: grype
  • Rule ID: GHSA-jp2q-39xq-3w4g-fast-xml-parser
  • Location: src/applications/lambda/traffic-generator-node/package-lock.json:1

Description:
A medium vulnerability in npm package: fast-xml-parser, version 5.4.1 was found at: /src/applications/lambda/traffic-generator-node/package-lock.json


Finding 17: GHSA-pwjx-qhcg-rvj4-rustls-webpki

  • Severity: MEDIUM
  • Scanner: grype
  • Rule ID: GHSA-pwjx-qhcg-rvj4-rustls-webpki
  • Location: src/applications/microservices/petfood-rs/Cargo.lock:1

Description:
A medium vulnerability in rust-crate package: rustls-webpki, version 0.101.7 was found at: /src/applications/microservices/petfood-rs/Cargo.lock


Finding 18: GHSA-pwjx-qhcg-rvj4-rustls-webpki

  • Severity: MEDIUM
  • Scanner: grype
  • Rule ID: GHSA-pwjx-qhcg-rvj4-rustls-webpki
  • Location: src/applications/microservices/petfood-rs/Cargo.lock:1

Description:
A medium vulnerability in rust-crate package: rustls-webpki, version 0.103.9 was found at: /src/applications/microservices/petfood-rs/Cargo.lock


Report generated by Automated Security Helper (ASH) at 2026-03-26T00:35:03+00:00

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file javascript Pull requests that update Javascript code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants