Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
26 changes: 7 additions & 19 deletions .iyarc
Original file line number Diff line number Diff line change
Expand Up @@ -68,22 +68,10 @@ GHSA-9ppj-qmqm-q256
GHSA-2w8x-224x-785m

# Excluded because:
# - Arbitrary code execution in protobufjs via malicious protobuf definition files (severity: critical)
# - Affects protobufjs < 7.5.5; installed versions: 6.11.4 (@cosmjs/stargate), 7.2.5 (@hashgraph/sdk,
# sdk-coin-islm, sdk-coin-trx, sdk-coin-hbar), 7.5.4 (abstract-cosmos, sdk-coin-icp)
# - Exploitation requires attacker-controlled .proto definition files; all protobuf definitions in this
# repo are static files bundled within trusted upstream dependencies — not user-supplied
# - Versions 6.11.4 and 7.2.5 are pinned by upstream deps (@cosmjs ~6.11.x, @hashgraph/sdk 7.2.5)
# that do not yet support 7.5.5
GHSA-xq3m-2v4x-88gg

# Excluded because:
# - DoS via memory exhaustion in basic-ftp <= 5.2.2 (severity: high, CVSS 7.5)
# - Client.list() buffers entire directory listings without size limits; a malicious FTP server
# can send unbounded data to exhaust client memory
# - Transitive dependency through pac-proxy-agent > get-uri > basic-ftp; used for PAC-based
# proxy resolution, not direct FTP operations
# - Exploitation requires connecting to a malicious FTP server; all proxy targets in this
# project are controlled internal endpoints, not user-supplied FTP URLs
# - Pinned at 5.2.2 in root resolutions; upstream get-uri has not yet updated to require 5.3.0
GHSA-rp42-5vxx-qpwr
# - XSS via xmp raw-text passthrough in sanitize-html (severity: critical, CVE-2026-44990)
# - patched_versions: "<0.0.0" — no upstream fix exists yet
# - Used in @bitgo/sdk-api to strip all HTML from API error response text (allowedTags: [])
# - Output is appended to a JavaScript error string server-side, never rendered as HTML in a browser
# - The xmp bypass produces live HTML markup in output, but since we discard all tags and use
# the result as plain text in Error messages, there is no DOM rendering path and no XSS risk
GHSA-rpr9-rxv7-x643
Loading