#8988: fix: resolve security vulnerabilities in dependencies
channel: telegram
app: web-ui
gateway
cli
scripts
docker
agents
stale
Cluster:
OpenClaw Plugin Enhancements
This PR addresses multiple security vulnerabilities identified in both the Node.js and Go dependency trees.
Key Security Fixes
* Node.js (High Severity): Forced an override for @isaacs/brace-expansion to ^5.0.1 to resolve an Uncontrolled Resource Consumption vulnerability
(GHSA-7h2j-956f-4vf2 (https://github.com/advisories/GHSA-7h2j-956f-4vf2)).
* Go (Multiple CVEs): Updated scripts/docs-i18n to Go 1.23.0 and bumped golang.org/x/net to v0.38.0. This resolves over 20 known vulnerabilities in the
Go networking stack, including potential request smuggling and memory exhaustion issues.
* Core Dependencies: Updated @mariozechner/pi-* packages, @agentclientprotocol/sdk, and @aws-sdk/client-bedrock to their latest stable releases.
Other Changes
* Updated .gitignore to ensure local runtime directories (config/ and workspace/) are not accidentally committed.
---
Verification: Verified via pnpm audit that the high-severity Node.js vulnerability is resolved. The Go dependency tree was verified against current OSV
security databases.
<!-- greptile_comment -->
<h2>Greptile Overview</h2>
<h3>Greptile Summary</h3>
This PR updates dependency versions in the Node.js (pnpm) and Go (`scripts/docs-i18n`) trees to address known security advisories, including adding a pnpm override for `@isaacs/brace-expansion` and bumping several core JS deps plus `golang.org/x/net`. It also attempts to extend `.gitignore` to exclude local runtime directories.
The dependency changes are localized to root `package.json`/`pnpm-lock.yaml` and the docs-i18n module’s `go.mod`, aligning with the repo’s dependency management patterns (pnpm overrides and Go module pinning) while reducing exposure to vulnerable transitive packages.
<h3>Confidence Score: 4/5</h3>
- Mostly safe to merge once the .gitignore corruption is fixed.
- Changes are primarily dependency bumps/lockfile updates plus a Go module bump; the only clear functional issue is the `.gitignore` file being committed with binary/NUL bytes at the end, which will break those ignore patterns and can cause tooling issues.
- .gitignore (fix encoding/NUL bytes); otherwise review dependency bumps as usual for compatibility.
<!-- greptile_other_comments_section -->
<sub>(2/5) Greptile learns from your feedback when you react with thumbs up/down!</sub>
<!-- /greptile_comment -->
Most Similar PRs
#11048: fix: address repository issues (env, author, CI comments, security ...
by cavula · 2026-02-07
82.5%
#19619: fix(deps): bump fast-xml-parser override to 5.3.6 to fix DoS vulnerab…
by Ilannuko · 2026-02-18
81.9%
#3973: fix: enhance npm package integrity checks and include critical files
by YeSuX · 2026-01-29
81.7%
#4243: fix: resolve Node.js punycode deprecation warning
by dylanneve1 · 2026-01-29
79.6%
#5649: fix(security): harden file permissions and header merging
by sfo2001 · 2026-01-31
78.9%
#10745: feat: Security improvements and Windows compatibility fixes
by lluviaoscuradeldoce-design · 2026-02-06
77.1%
#8876: Confirmaciones para equipo de IT
by m4xjunior · 2026-02-04
77.1%
#11951: Prepending Windows Node to PATH didn’t help
by tranhoangtu-it · 2026-02-08
77.0%
#17237: fix(update): guard post-install imports after npm global update
by tdjackey · 2026-02-15
76.9%
#15794: docs(security): comprehensive security audit report
by kinder-world · 2026-02-13
76.5%