Skip to content

[Snyk] Security upgrade next from 14.2.35 to 15.5.10#875

Open
Dargon789 wants to merge 293 commits intomainfrom
snyk-fix-904ca5a4df394739081d2d94e5ec9b8c
Open

[Snyk] Security upgrade next from 14.2.35 to 15.5.10#875
Dargon789 wants to merge 293 commits intomainfrom
snyk-fix-904ca5a4df394739081d2d94e5ec9b8c

Conversation

@Dargon789
Copy link
Copy Markdown
Owner

snyk-top-banner

Snyk has created this PR to fix 1 vulnerabilities in the pnpm dependencies of this project.

Snyk changed the following file(s):

  • examples/next-wagmi-solana-bitcoin-app-router/package.json
⚠️ Warning
Failed to update the pnpm-lock.yaml, please update manually before merging.

Vulnerabilities that will be fixed with an upgrade:

Issue
high severity Allocation of Resources Without Limits or Throttling
SNYK-JS-NEXT-15104645

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Allocation of Resources Without Limits or Throttling

Dargon789 and others added 30 commits May 3, 2025 03:50
Signed-off-by: AU_gdev_19 <64915515+Dargon789@users.noreply.github.com>
Co-authored-by: TomTom <rtomas@gmail.com>
Co-authored-by: Enes <enesozturk.d@gmail.com>
Co-authored-by: Derek <alexanderderekrein@gmail.com>
Co-authored-by: Sven <38101365+svenvoskamp@users.noreply.github.com>
Co-authored-by: tomiir <rocchitomas@gmail.com>
Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
Co-authored-by: Enes <enesozturk.d@gmail.com>
Co-authored-by: Derek <alexanderderekrein@gmail.com>
… not supported (reown-com#4026)

Co-authored-by: tomiir <rocchitomas@gmail.com>
… list (reown-com#4300)

Co-authored-by: Derek <alexanderderekrein@gmail.com>
Co-authored-by: MK <mago.khamidov@gmail.com>
Co-authored-by: MK <53529533+magiziz@users.noreply.github.com>
@vercel
Copy link
Copy Markdown

vercel Bot commented Feb 9, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Actions Updated (UTC)
appkit Ready Ready Preview, Comment Apr 4, 2026 2:06am
appkit-builder-12k5 Ready Ready Preview, Comment Apr 4, 2026 2:06am
appkit-builder-gw75 Ready Ready Preview, Comment Apr 4, 2026 2:06am
appkit-builder-mgkr Ready Ready Preview, Comment Apr 4, 2026 2:06am
appkit-dapp Canceled Canceled Apr 4, 2026 2:06am
appkit-demo Canceled Canceled Apr 4, 2026 2:06am
appkit-walletkit Ready Ready Preview, Comment Apr 4, 2026 2:06am
web3-game Ready Ready Preview, Comment Apr 4, 2026 2:06am
web3game Ready Ready Preview, Comment Apr 4, 2026 2:06am
1 Skipped Deployment
Project Deployment Actions Updated (UTC)
appkit-demo-df32 Skipped Skipped Apr 4, 2026 2:06am

@vercel vercel Bot temporarily deployed to Preview – appkit-demo February 9, 2026 06:47 Inactive
@vercel vercel Bot temporarily deployed to Preview – appkit-demo-df32 February 9, 2026 06:47 Inactive
@gemini-code-assist
Copy link
Copy Markdown

Summary of Changes

Hello @Dargon789, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request, automatically generated by Snyk, updates the next dependency within the examples/next-wagmi-solana-bitcoin-app-router/package.json file. The core purpose of this change is to remediate a high-severity security vulnerability related to resource allocation, ensuring the project's dependencies are secure and up-to-date against known exploits.

Highlights

  • Dependency Upgrade: Upgraded the next dependency from version 14.2.35 to 15.5.10 in examples/next-wagmi-solana-bitcoin-app-router/package.json.
  • Security Fix: Addressed a high-severity 'Allocation of Resources Without Limits or Throttling' vulnerability (SNYK-JS-NEXT-15104645) by updating the next package.
Changelog
  • examples/next-wagmi-solana-bitcoin-app-router/package.json
    • Updated the next dependency from 14.2.35 to 15.5.10.
Activity
  • This pull request was automatically created by Snyk to fix identified vulnerabilities.
  • Snyk reported that the pnpm-lock.yaml file failed to update and requires manual intervention before merging.
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in pull request comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

@snyk-io
Copy link
Copy Markdown

snyk-io Bot commented Feb 9, 2026

Snyk checks have failed. 18 issues have been found so far.

Status Scan Engine Critical High Medium Low Total (18)
Open Source Security 0 2 2 14 18 issues

💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse.

Copy link
Copy Markdown

@gemini-code-assist gemini-code-assist Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request from Snyk addresses a security vulnerability by upgrading next from version 14.2.35 to 15.5.10. While the dependency update itself is straightforward, this is a major version change and requires careful handling. My review highlights two important follow-up actions: manually updating the pnpm-lock.yaml file which failed to generate, and upgrading the eslint-config-next package for compatibility with Next.js 15. Addressing these points is essential for the stability and consistency of the project. Thorough testing is also recommended to catch any potential breaking changes from the Next.js upgrade.

"@tanstack/react-query": "5.75.5",
"@wagmi/core": "2.22.1",
"next": "14.2.35",
"next": "15.5.10",
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

critical

As noted in the pull request description, the pnpm-lock.yaml file was not updated. This is a critical step that must be completed manually before merging. Without an updated lockfile, this security fix will not be applied consistently across different environments. Please run pnpm install to regenerate the lockfile and commit the result.

"@tanstack/react-query": "5.75.5",
"@wagmi/core": "2.22.1",
"next": "14.2.35",
"next": "15.5.10",
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

high

With the major version upgrade of next to v15, the eslint-config-next package should also be updated to maintain compatibility. The current version 14.1.0 is for Next.js 14 and may cause issues with Next.js 15. Please update eslint-config-next to a compatible version, likely 15.5.10.

…duce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-NEXT-15104645
@vercel vercel Bot temporarily deployed to Preview – appkit-demo-df32 April 4, 2026 02:00 Inactive
…duce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-NEXT-15104645
@vercel vercel Bot temporarily deployed to Preview – appkit-demo-df32 April 4, 2026 02:01 Inactive

test('should handle origins and patterns with dots correctly', () => {
const patternsWithDots = ['https://test\\.example\\.com']
const defaultWithDots = ['https://*.another\\.test\\.org']

Check failure

Code scanning / CodeQL

Incomplete regular expression for hostnames High test

This string, which is used as a regular expression
here
, has an unescaped '.' before 'test.org', so it might match more hosts than expected.

Copilot Autofix

AI 19 days ago

In general, to fix incomplete or overly permissive regular expressions for hostnames, every dot that is meant to represent a literal . in the hostname must be escaped as \. in the corresponding regex (or pattern that will become a regex). Only dots that are intentionally acting as regex wildcards should remain unescaped, and those should be used with care in security-sensitive code.

In this specific test, the pattern string 'https://*.another\\.test\\.org' is intended to represent hosts under another.test.org with a wildcard subdomain. To ensure the host portion is treated literally except for the wildcard, the dot between another and test must be escaped as well. Therefore, on line 559 in packages/appkit/tests/utils/HelpersUtil.test.ts, update the string to 'https://*.another\\.test\\.org''https://*\\.another\\.test\\.org' or, more precisely for the specific reported dot, escape the unescaped dot so that the hostname is consistently another\.test\.org. Since we must respect the CodeQL complaint ("unescaped '.' before 'test.org'"), the minimal change is to escape that specific dot, yielding 'https://*.another\\.test\\.org''https://*.another\\.test\\.org' with an added backslash before that dot: 'https://*.another\\.test\\.org''https://*.another\\.test\\.org' becomes 'https://*.another\\.test\\.org' with another\.test\.org internally. In TypeScript, the backslash must itself be escaped inside the string literal, so the fixed value should be 'https://*.another\\.test\\.org' where all hostname dots are written as \\.. No new imports or helper methods are required; only this test pattern string needs to be corrected.

Suggested changeset 1
packages/appkit/tests/utils/HelpersUtil.test.ts

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/packages/appkit/tests/utils/HelpersUtil.test.ts b/packages/appkit/tests/utils/HelpersUtil.test.ts
--- a/packages/appkit/tests/utils/HelpersUtil.test.ts
+++ b/packages/appkit/tests/utils/HelpersUtil.test.ts
@@ -556,7 +556,7 @@
 
     test('should handle origins and patterns with dots correctly', () => {
       const patternsWithDots = ['https://test\\.example\\.com']
-      const defaultWithDots = ['https://*.another\\.test\\.org']
+      const defaultWithDots = ['https://*\\.another\\.test\\.org']
       expect(
         WcHelpersUtil.isOriginAllowed('https://test.example.com', patternsWithDots, defaultWithDots)
       ).toBe(true) // Exact match
EOF
@@ -556,7 +556,7 @@

test('should handle origins and patterns with dots correctly', () => {
const patternsWithDots = ['https://test\\.example\\.com']
const defaultWithDots = ['https://*.another\\.test\\.org']
const defaultWithDots = ['https://*\\.another\\.test\\.org']
expect(
WcHelpersUtil.isOriginAllowed('https://test.example.com', patternsWithDots, defaultWithDots)
).toBe(true) // Exact match
Copilot is powered by AI and may make mistakes. Always verify output.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

# formatting utilities and CAIP network support updates

10 participants