docs(blog): security hardening April 2026 post#25101
docs(blog): security hardening April 2026 post#25101ishaan-berri merged 1 commit intolitellm_ishaan_docs_2from
Conversation
|
The latest updates on your projects. Learn more about Vercel for GitHub.
|
Greptile SummaryThis is a documentation-only PR adding the April 2026 security hardening blog post. It discloses three vulnerabilities fixed in v1.83.0 — a critical JWT/OIDC cache-key collision (CVE-2026-35030), a privilege escalation on
Confidence Score: 5/5Safe to merge — docs-only change with no code impact and accurate security disclosures. Single documentation file added; no code changes, no test changes, and no architectural impact. The only finding is a P2 style nit (severity label inconsistency in the bug bounty table) that does not block merge. No files require special attention.
|
| Filename | Overview |
|---|---|
| docs/my-website/blog/security_hardening_april_2026/index.md | New security blog post disclosing three vulnerabilities (CVE-2026-35030, CVE-2026-35029, GHSA-69x8-hrgq-fjj8) fixed in v1.83.0; content is accurate and links are internally consistent, with one minor P0/P1 vs Critical/High label mismatch in the bug bounty table. |
Flowchart
%%{init: {'theme': 'neutral'}}%%
flowchart TD
A[Request with JWT] --> B{enable_jwt_auth enabled?}
B -- No --> C[Standard API key auth]
B -- Yes --> D[OIDC UserInfo lookup]
D --> E{Cache hit?}
E -- Hit OLD --> F[Return cached userinfo\nVulnerable: cache keyed on first 20 chars\nCVE-2026-35030]
E -- Miss --> G[Fetch from OIDC provider]
G --> H[Store in cache\nFixed: cache keyed on full hash\nv1.83.0]
H --> I[Return userinfo]
Reviews (1): Last reviewed commit: "docs(blog): add security hardening April..." | Re-trigger Greptile
|
|
| Bounties are currently paid for P0 (supply chain) and P1 (unauthenticated proxy access) vulnerabilities: | ||
|
|
||
| | Severity | Bounty | Example | | ||
| |----------|--------|---------| | ||
| | Critical | $1,500 – $3,000 | Supply chain compromise | | ||
| | High | $500 – $1,500 | Unauthenticated access to protected data | |
There was a problem hiding this comment.
Severity label mismatch in bug bounty section
The introductory sentence uses P0/P1 priority labels, but the table immediately below uses Critical/High severity labels — these are different classification schemes and a researcher reading this might be confused about which system applies. Consider aligning them to one vocabulary throughout (CVSS-style Critical/High is the standard used by the rest of the post).
| Bounties are currently paid for P0 (supply chain) and P1 (unauthenticated proxy access) vulnerabilities: | |
| | Severity | Bounty | Example | | |
| |----------|--------|---------| | |
| | Critical | $1,500 – $3,000 | Supply chain compromise | | |
| | High | $500 – $1,500 | Unauthenticated access to protected data | | |
| Bounties are currently paid for Critical (supply chain) and High (unauthenticated proxy access) vulnerabilities: | |
| | Severity | Bounty | Example | | |
| |----------|--------|---------| | |
| | Critical | $1,500 – $3,000 | Supply chain compromise | | |
| | High | $500 – $1,500 | Unauthenticated access to protected data | |
Codecov Report✅ All modified and coverable lines are covered by tests. 📢 Thoughts on this report? Let us know! |
Relevant issues
N/A
What
Adds the April 2026 security hardening blog post disclosing:
/config/update(High)All fixed in v1.83.0. Also announces the bug bounty program.
Pre-Submission checklist