Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

build(deps): bump ruff from 0.5.0 to 0.6.2 #370

Closed
wants to merge 1 commit into from

build(deps): bump ruff from 0.5.0 to 0.6.2

3fc91d8
Select commit
Loading
Failed to load commit list.
Closed

build(deps): bump ruff from 0.5.0 to 0.6.2 #370

build(deps): bump ruff from 0.5.0 to 0.6.2
3fc91d8
Select commit
Loading
Failed to load commit list.
Socket Security / Socket Security: Pull Request Alerts failed Aug 23, 2024 in 19s

Pull Request #370 Alerts: Complete with warnings WARNING: Free tier size exceeded

Report Status Message
PR #370 Alerts ⚠️ Found 1 project alert

Pull request alerts notify when new issues are detected between the diff of the pull request and it's target branch.

Details

🚨 Potential security issues detected. Learn more about Socket for GitHub ↗︎

To accept the risk, merge this PR and you will not be notified again.

Alert Package NoteSourceCI
AI detected potential malware pypi/ruff@0.6.2
  • Notes: The presence of 'eval' and the use of 'require' for loading external modules are highly unusual and potentially indicative of malicious behavior. This code should be further reviewed and potentially avoided.
  • Confidence: 0.90
  • Severity: 0.82
🚫

View full report↗︎

Next steps

What is AI-detected potential malware?

AI has identified this package as malware. This is a strong signal that the package may be malicious.

Given the AI system's identification of this package as malware, extreme caution is advised. It is recommended to avoid downloading or installing this package until the threat is confirmed or flagged as a false positive.

Take a deeper look at the dependency

Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support [AT] socket [DOT] dev.

Remove the package

If you happen to install a dependency that Socket reports as Known Malware you should immediately remove it and select a different dependency. For other alert types, you may may wish to investigate alternative packages or consider if there are other ways to mitigate the specific risk posed by the dependency.

Mark a package as acceptable risk

To ignore an alert, reply with a comment starting with @SocketSecurity ignore followed by a space separated list of ecosystem/package-name@version specifiers. e.g. @SocketSecurity ignore npm/foo@1.0.0 or ignore all packages with @SocketSecurity ignore-all

  • @SocketSecurity ignore pypi/ruff@0.6.2