fix(deps): bump drizzle-orm to 0.45.2, bump mcp#4251
fix(deps): bump drizzle-orm to 0.45.2, bump mcp#4251waleedlatif1 wants to merge 31 commits intostagingfrom
Conversation
…ership workflow edits via sockets, ui improvements
…ng improvements, posthog, secrets mutations
…ration, signup method feature flags, SSO improvements
…nts, secrets performance, polling refactors, drag resources in mothership
…y invalidation, HITL docs
…endar triggers, docs updates, integrations/models pages improvements
…ions, jira forms endpoints
…mat, logs performance improvements fix(csp): add missing analytics domains, remove unsafe-eval, fix workspace CSP gap (#4179) fix(landing): return 404 for invalid dynamic route slugs (#4182) improvement(seo): optimize sitemaps, robots.txt, and core web vitals across sim and docs (#4170) fix(gemini): support structured output with tools on Gemini 3 models (#4184) feat(brightdata): add Bright Data integration with 8 tools (#4183) fix(mothership): fix superagent credentials (#4185) fix(logs): close sidebar when selected log disappears from filtered list; cleanup (#4186)
v0.6.46: mothership streaming fixes, brightdata integration
…m integration, atlassian triggers
Resolves Dependabot alert #98. Drizzle ORM <0.45.2 improperly escaped quoted SQL identifiers, allowing SQL injection via untrusted input passed to APIs like sql.identifier() or .as(). Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
|
The latest updates on your projects. Learn more about Vercel for GitHub.
|
PR SummaryMedium Risk Overview This is a security-motivated bump intended to pick up the upstream fix for identifier escaping in Drizzle ORM. Reviewed by Cursor Bugbot for commit 25bc827. Configure here. |
|
| GitGuardian id | GitGuardian status | Secret | Commit | Filename | |
|---|---|---|---|---|---|
| 29606901 | Triggered | Generic High Entropy Secret | a54dcbe | apps/sim/providers/utils.test.ts | View secret |
🛠 Guidelines to remediate hardcoded secrets
- Understand the implications of revoking this secret by investigating where it is used in your code.
- Replace and store your secret safely. Learn here the best practices.
- Revoke and rotate this secret.
- If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.
To avoid such incidents in the future consider
- following these best practices for managing and storing secrets including API keys and other credentials
- install secret detection on pre-commit to catch secret before it leaves your machine and ease remediation.
🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.
Greptile SummaryThis PR is a targeted security patch that bumps Confidence Score: 5/5Safe to merge — all five manifests are updated consistently and the lockfile pins the patched version. This is a single-purpose security dependency bump with no logic changes. All No files require special attention; the remaining smoke-test items in the checklist (CI, workflow integration tests) are a normal gate for any dependency update. Important Files Changed
Flowchart%%{init: {'theme': 'neutral'}}%%
flowchart TD
A["Untrusted input (user-controlled string)"]
B["sql.identifier() / .as() / escapeName()"]
C{"drizzle-orm version?"}
D["< 0.45.2 (VULNERABLE)\nDelimiter not escaped\n→ SQL injection possible"]
E[">= 0.45.2 (PATCHED)\nDelimiter correctly escaped\n→ identifier safely quoted"]
F["Query executed safely"]
G["SQL injection: data disclosure,\nschema enumeration, destructive ops"]
A --> B --> C
C -->|"^0.44.5 (old)"| D --> G
C -->|"^0.45.2 (new)"| E --> F
style D fill:#f66,color:#fff
style G fill:#f66,color:#fff
style E fill:#6a6,color:#fff
style F fill:#6a6,color:#fff
Reviews (1): Last reviewed commit: "fix(deps): bump drizzle-orm to 0.45.2 (G..." | Re-trigger Greptile |
Summary
drizzle-ormfrom^0.44.5to^0.45.2across the monorepo to resolve Dependabot alert #98 (GHSA-gpj5-g38j-94v9 / CVE-2026-39356, High, CVSS 7.5).package.jsonoverrides,apps/sim/package.json(deps + overrides),apps/docs/package.json,packages/db/package.json, andbun.lock.Vulnerability
Drizzle ORM
< 0.45.2failed to escape embedded identifier delimiters inescapeName()across the PostgreSQL, MySQL, SQLite, SingleStore, and Gel dialects. Untrusted input passed to identifier/alias APIs (e.g.sql.identifier(),.as()) could break out of the quoted identifier and inject SQL — potentially enabling data disclosure, schema enumeration, or destructive operations depending on context.0.45.2is the first patched version on the0.xline.Test plan
bun installregenerates lockfile cleanly withdrizzle-orm@0.45.2packages/dbtsc --noEmitpasses