Bump axios from 1.13.5 to 1.15.2 in /tests/ctst#2389
Bump axios from 1.13.5 to 1.15.2 in /tests/ctst#2389dependabot[bot] wants to merge 1 commit intodevelopment/2.14from
Conversation
Bumps [axios](https://github.com/axios/axios) from 1.13.5 to 1.15.2. - [Release notes](https://github.com/axios/axios/releases) - [Changelog](https://github.com/axios/axios/blob/v1.x/CHANGELOG.md) - [Commits](axios/axios@v1.13.5...v1.15.2) --- updated-dependencies: - dependency-name: axios dependency-version: 1.15.2 dependency-type: indirect ... Signed-off-by: dependabot[bot] <support@github.com>
Hello dependabot[bot],My role is to assist you with the merge of this Available options
Available commands
Status report is not available. The following options are set: bypass_author_approval, bypass_jira_check |
Waiting for approvalThe following approvals are needed before I can proceed with the merge:
The following options are set: bypass_author_approval, bypass_jira_check |
There was a problem hiding this comment.
Dependency Bump Evaluation
Version change: axios 1.13.5 -> 1.15.2 (minor, spans v1.14.x through v1.15.2)
Files changed: tests/ctst/yarn.lock only
Changes:
- Multiple security hardening fixes: prototype pollution in HTTP adapter/config merging, header injection, CRLF injection in multipart headers, SSRF via
socketPath,withXSRFTokencross-origin leakage,maxBodyLength/maxContentLengthbypass fixes - New opt-in
allowedSocketPathsconfig option (backwards compatible when unset) - Keep-alive socket memory leak fix (
MaxListenersExceededWarning/ linear heap growth) - FormData handling improvements, progress event clamping, type fixes
- Supply-chain hardening (
.npmrcwithignore-scripts=true, lockfile lint, provenance verification)
Breaking changes: None. All security fixes are backwards-compatible hardening. New features are opt-in.
Security concerns: None negative — this update fixes multiple security vulnerabilities (prototype pollution, header injection, CRLF injection, SSRF, XSRF token leakage). The prepare install script change flagged by dependabot is standard for axios builds and not a concern for this well-maintained package.
Impact on codebase: tests/ctst/world/Zenko.ts uses axios for basic HTTP requests (method, url, headers, data) via axios() and axios.create() with aws4-axios interceptors. None of the security-affected config options (socketPath, withXSRFToken, maxBodyLength, maxContentLength, maxRedirects, beforeRedirect, insecureHTTPParser) are used. No prototype manipulation patterns found.
Recommendation: SAFE TO MERGE
Notes: CI checks are in progress at time of review; no failures observed. This is a security-focused update that should be merged promptly.
— Claude Code
Bumps axios from 1.13.5 to 1.15.2.
Release notes
Sourced from axios's releases.
... (truncated)
Changelog
Sourced from axios's changelog.
... (truncated)
Commits
5829343chore(release): prepare release 1.15.2 (#10789)4709a48fix: added fix for memory leak in sockets (#10788)be33360chore: update changelog (#10781)4791514fix: more header pollutions (#10779)6feafcffix: socket issue (#10777)302e273docs: update docs, add a couple actions etc (#10776)ac42446chore(release): prepare release 1.15.1 (#10767)908f220docs: update threatmodel (#10765)f93f815docs: added docs around potential decompressions bomb (#10763)1728aa1fix: short-circuits on any truthy non-boolean in withXSRFToken (#10762)Install script changes
This version modifies
preparescript that runs during installation. Review the package contents before updating.Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)You can disable automated security fix PRs for this repo from the Security Alerts page.