← Back to PRs

#9476: fix: GitHub tarball dependency lacks integrity verification in pnpm-lock

by coygeek open 2026-02-05 08:04 View on GitHub →
stale
## Fix Summary The lockfile pulls `@whiskeysockets/libsignal-node` directly from a GitHub tarball URL without an integrity hash. This bypasses package integrity verification and allows tampering of the dependency artifact, enabling malicious code execution during installs. ## Issue Linkage Fixes #9475 ## Security Snapshot - CVSS v3.1: 9.4 (Critical) - CVSS v4.0: 9.3 (Critical) ## Implementation Details ### Files Changed - `pnpm-lock.yaml` (+1/-1) ### Technical Analysis The lockfile pulls `@whiskeysockets/libsignal-node` directly from a GitHub tarball URL without an integrity hash. This bypasses package integrity verification and allows tampering of the dependency artifact, enabling malicious code execution during installs. ## Validation Evidence - Command: `@whiskeysockets/libsignal-node` - Status: failed ## Risk and Compatibility non-breaking; compatibility impact was not explicitly documented in the original PR body. ## AI-Assisted Disclosure AI-assisted: Codex CLI This fix was generated with AI assistance (Codex CLI). <!-- greptile_comment --> <h2>Greptile Overview</h2> <h3>Greptile Summary</h3> - No reviewable files after applying ignore patterns. <h3>Confidence Score: N/A</h3> - Restored by toolkit audit from existing PR thread signals. <!-- greptile_other_comments_section --> <!-- /greptile_comment -->

Most Similar PRs