Skip to content

Conversation

@q1blue
Copy link
Collaborator

@q1blue q1blue commented Nov 13, 2025

snyk-top-banner

Snyk has created this PR to upgrade @swc/core from 1.3.68 to 1.13.20.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


  • The recommended version is 457 versions ahead of your current version.

  • The recommended version was released 2 months ago.


Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:


EntelligenceAI PR Summary

Upgrades @swc/core dependency from version 1.3.46 to 1.13.20 in the microsite package.

  • Updated @swc/core version constraint in package.json from ^1.3.46 to ^1.13.20
  • Updated all platform-specific @swc/core binaries from 1.3.68 to 1.15.1 in yarn.lock
  • Added two new dependencies: @swc/counter (^0.1.3) and @swc/types (^0.1.25)
  • Relaxed @swc/helpers peer dependency requirement from ^0.5.0 to >=0.5.17
  • Updated package checksums to reflect new versions

@codesandbox
Copy link

codesandbox bot commented Nov 13, 2025

Review or Edit in CodeSandbox

Open the branch in Web EditorVS CodeInsiders

Open Preview

@snyk-io
Copy link

snyk-io bot commented Nov 13, 2025

Snyk checks have passed. No issues have been found so far.

Status Scanner Critical High Medium Low Total (0)
Open Source Security 0 0 0 0 0 issues

💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse.

@entelligence-ai-pr-reviews
Copy link

🔒 Entelligence AI Vulnerability Scanner

No security vulnerabilities found!

Your code passed our comprehensive security analysis.


@entelligence-ai-pr-reviews
Copy link

Walkthrough

This PR upgrades the @swc/core dependency in the microsite package from version 1.3.46 to 1.13.20, representing a significant version jump of approximately 10 minor versions. The update brings in newer SWC compiler features, performance improvements, and bug fixes. The yarn.lock file reflects comprehensive updates across all platform-specific binaries (Darwin, Linux, Windows) from version 1.3.68 to 1.15.1. Two new dependencies are introduced: @swc/counter and @swc/types. The peer dependency requirement for @swc/helpers is relaxed from ^0.5.0 to >=0.5.17, providing greater version compatibility flexibility.

Changes

File(s) Summary
microsite/package.json Updated @swc/core dependency from ^1.3.46 to ^1.13.20, maintaining caret semver range for compatible updates.
microsite/yarn.lock Updated @swc/core and all platform-specific binaries from 1.3.68 to 1.15.1; added @swc/counter (^0.1.3) and @swc/types (^0.1.25) as new dependencies; relaxed @swc/helpers peer dependency from ^0.5.0 to >=0.5.17; updated checksums for all modified packages.

Sequence Diagram

This diagram shows the interactions between components:

sequenceDiagram
    participant Dev as Developer
    participant PM as Package Manager
    participant MS as Microsite App
    participant SWC as @swc/core
    participant Bins as Platform Binaries
    participant Utils as Utility Packages

    Dev->>PM: Update @swc/core: ^1.3.46 → ^1.13.20
    activate PM
    
    PM->>PM: Resolve dependency tree
    PM->>SWC: Fetch @swc/core@1.15.1
    activate SWC
    
    Note over PM,SWC: Version upgrade: 1.3.68 → 1.15.1
    
    SWC->>PM: Declare dependencies
    Note over SWC,PM: New dependencies:<br/>@swc/counter@^0.1.3<br/>@swc/types@^0.1.25
    
    PM->>Utils: Fetch @swc/counter@0.1.3
    activate Utils
    Utils-->>PM: Package installed
    deactivate Utils
    
    PM->>Utils: Fetch @swc/types@0.1.25
    activate Utils
    Utils->>Utils: Depends on @swc/counter@^0.1.3
    Utils-->>PM: Package installed
    deactivate Utils
    
    loop For each platform (darwin, linux, win32)
        PM->>Bins: Fetch platform-specific binary@1.15.1
        activate Bins
        Note over Bins: arm64, x64, ia32 variants<br/>glibc/musl variants
        Bins-->>PM: Binary installed (optional)
        deactivate Bins
    end
    
    PM->>PM: Update yarn.lock with resolved versions
    PM->>PM: Verify peer dependency: @swc/helpers >=0.5.17
    
    deactivate SWC
    PM-->>MS: Dependencies updated
    deactivate PM
    
    MS->>SWC: Use updated compiler
    Note over MS,SWC: Microsite now uses<br/>@swc/core@1.15.1
Loading

▶️AI Code Reviews for VS Code, Cursor, Windsurf
Install the extension

Note for Windsurf Please change the default marketplace provider to the following in the windsurf settings:

Marketplace Extension Gallery Service URL: https://marketplace.visualstudio.com/_apis/public/gallery

Marketplace Gallery Item URL: https://marketplace.visualstudio.com/items

Entelligence.ai can learn from your feedback. Simply add 👍 / 👎 emojis to teach it your preferences. More shortcuts below

Emoji Descriptions:

  • ⚠️ Potential Issue - May require further investigation.
  • 🔒 Security Vulnerability - Fix to ensure system safety.
  • 💻 Code Improvement - Suggestions to enhance code quality.
  • 🔨 Refactor Suggestion - Recommendations for restructuring code.
  • ℹ️ Others - General comments and information.

Interact with the Bot:

  • Send a message or request using the format:
    @entelligenceai + *your message*
Example: @entelligenceai Can you suggest improvements for this code?
  • Help the Bot learn by providing feedback on its responses.
    @entelligenceai + *feedback*
Example: @entelligenceai Do not comment on `save_auth` function !

Also you can trigger various commands with the bot by doing
@entelligenceai command

The current supported commands are

  1. config - shows the current config
  2. retrigger_review - retriggers the review

More commands to be added soon.

@socket-security
Copy link

Review the following changes in direct dependencies. Learn more about Socket for GitHub.

Diff Package Supply Chain
Security
Vulnerability Quality Maintenance License
Added@​stoplight/​spectral-parsers@​1.0.21001006383100
Added@​kubernetes-models/​base@​4.0.31001006679100
Added@​aws-sdk/​util-arn-parser@​3.310.01001006685100
Added@​aws-sdk/​abort-controller@​3.370.01001006780100
Added@​graphql-codegen/​typescript-resolvers@​3.2.01001006799100
Added@​graphql-codegen/​graphql-modules-preset@​3.1.2901006899100
Added@​stoplight/​spectral-runtime@​1.1.21001006883100
Added@​graphql-codegen/​typescript@​3.0.31001006899100
Added@​frsource/​cypress-plugin-visual-regression-diff@​3.3.10981006977100
Added@​stoplight/​spectral-functions@​1.7.21001007086100
Added@​aws-sdk/​util-stream-node@​3.370.01001007180100
Added@​aws-sdk/​types@​3.370.01001007295100
Added@​stoplight/​spectral-core@​1.18.0991007285100
Added@​graphql-tools/​schema@​9.0.191001007299100
Added@​aws-sdk/​node-http-handler@​3.370.0991007380100
Added@​spotify/​eslint-config-typescript@​14.0.11001007378100
Added@​aws-sdk/​signature-v4@​3.370.01001007380100
Added@​swc/​helpers@​0.5.11001007379100
Added@​spotify/​eslint-config-react@​14.0.11001007478100
Added@​stoplight/​spectral-rulesets@​1.16.0991007486100
Added@​svgr/​plugin-svgo@​6.5.01001007478100
Added@​graphql-codegen/​cli@​3.3.0961007499100
Added@​trendyol-js/​openstack-swift-sdk@​0.0.61001007577100
Added@​sucrase/​webpack-loader@​2.0.0991007677100
Added@​maxim_mazurok/​gapi.client.calendar@​3.0.202208059710010077100
Added@​kubernetes-models/​apimachinery@​1.2.11001007781100
Added@​spotify/​eslint-config-base@​14.0.11001008378100
Added@​material-ui/​pickers@​3.3.10981009578100
Added@​material-ui/​styles@​4.11.5941007978100
Added@​gitbeaker/​node@​35.8.11001008278100
See 69 more rows in the dashboard

View full report

@socket-security
Copy link

Warning

Review the following alerts detected in dependencies.

According to your organization's Security Policy, it is recommended to resolve "Warn" alerts. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Warn Critical
Critical CVE: Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code in npm @babel/traverse

CVE: GHSA-67hx-6x53-jw92 Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code (CRITICAL)

Affected versions: < 7.23.2; >= 8.0.0-alpha.0 < 8.0.0-alpha.4

Patched version: 7.23.2

From: ?npm/@graphql-codegen/cli@3.3.0npm/@graphql-codegen/typescript@3.0.3npm/@graphql-codegen/typescript-resolvers@3.2.0npm/@svgr/core@6.5.0npm/@svgr/plugin-jsx@6.5.0npm/@svgr/webpack@6.5.0npm/@graphql-codegen/graphql-modules-preset@3.1.2npm/@svgr/rollup@6.5.0npm/@babel/traverse@7.19.1

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@babel/traverse@7.19.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
Critical CVE: JSONPath Plus Remote Code Execution (RCE) Vulnerability in npm jsonpath-plus

CVE: GHSA-pppg-cpfq-h7wr JSONPath Plus Remote Code Execution (RCE) Vulnerability (CRITICAL)

Affected versions: < 10.2.0

Patched version: 10.2.0

From: ?npm/@stoplight/spectral-core@1.18.0npm/jsonpath-plus@7.1.0

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/jsonpath-plus@7.1.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

@github-actions
Copy link

This PR has been automatically marked as stale because it has not had recent activity from the author. It will be closed if no further activity occurs. If the PR was closed and you want it re-opened, let us know and we'll re-open the PR so that you can continue the contribution!

@github-actions github-actions bot added the stale label Nov 20, 2025
@github-actions github-actions bot closed this Nov 27, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants