chore(deps): bump pygments from 2.19.2 to 2.20.0 in /integration-tests/cases/13-requirements-unfixable #123
Annotations
4 warnings and 10 notices
|
Test
Node.js 20 actions are deprecated. The following actions are running on Node.js 20 and may not work as expected: astral-sh/setup-uv@d4b2f3b6ecc6e67c4457f6d3e41ec42d3d0fcb86. Actions will be forced to run with Node.js 24 by default starting June 2nd, 2026. Node.js 20 will be removed from the runner on September 16th, 2026. Please check if updated versions of these actions are available that support Node.js 24. To opt into Node.js 24 now, set the FORCE_JAVASCRIPT_ACTIONS_TO_NODE24=true environment variable on the runner or in your workflow file. Once Node.js 24 becomes the default, you can temporarily opt out by setting ACTIONS_ALLOW_USE_UNSECURE_NODE_VERSION=true. For more information see: https://github.blog/changelog/2025-09-19-deprecation-of-node-20-on-github-actions-runners/
|
|
Security audit
Failed to save: Unable to reserve cache with key setup-uv-2-x86_64-unknown-linux-gnu-ubuntu-24.04-3.13-pruned-7167548bc2b65ee15b2b3612fc52ef38e9aaee7c410fca9b255694b2d8bb8d62, another job may be creating this cache.
|
|
Security audit
pip-audit: pygments@2.19.2 — CVE-2026-4539 (fix: no fix available)
|
|
Pre-commit
Node.js 20 actions are deprecated. The following actions are running on Node.js 20 and may not work as expected: astral-sh/setup-uv@d4b2f3b6ecc6e67c4457f6d3e41ec42d3d0fcb86. Actions will be forced to run with Node.js 24 by default starting June 2nd, 2026. Node.js 20 will be removed from the runner on September 16th, 2026. Please check if updated versions of these actions are available that support Node.js 24. To opt into Node.js 24 now, set the FORCE_JAVASCRIPT_ACTIONS_TO_NODE24=true environment variable on the runner or in your workflow file. Once Node.js 24 becomes the default, you can temporarily opt out by setting ACTIONS_ALLOW_USE_UNSECURE_NODE_VERSION=true. For more information see: https://github.blog/changelog/2025-09-19-deprecation-of-node-20-on-github-actions-runners/
|
|
Security audit:
src/python_security_auditing/runners.py#L86
[B603] subprocess call - check for execution of untrusted input.
|
|
Security audit:
src/python_security_auditing/runners.py#L79
[B603] subprocess call - check for execution of untrusted input.
|
|
Security audit:
src/python_security_auditing/runners.py#L71
[B603] subprocess call - check for execution of untrusted input.
|
|
Security audit:
src/python_security_auditing/runners.py#L53
[B603] subprocess call - check for execution of untrusted input.
|
|
Security audit:
src/python_security_auditing/runners.py#L7
[B404] Consider possible security implications associated with the subprocess module.
|
|
Security audit:
src/python_security_auditing/pr_comment.py#L101
[B603] subprocess call - check for execution of untrusted input.
|
|
Security audit:
src/python_security_auditing/pr_comment.py#L88
[B603] subprocess call - check for execution of untrusted input.
|
|
Security audit:
src/python_security_auditing/pr_comment.py#L76
[B603] subprocess call - check for execution of untrusted input.
|
|
Security audit:
src/python_security_auditing/pr_comment.py#L35
[B603] subprocess call - check for execution of untrusted input.
|
|
Security audit:
src/python_security_auditing/pr_comment.py#L7
[B404] Consider possible security implications associated with the subprocess module.
|
Artifacts
Produced during runtime
| Name | Size | Digest | |
|---|---|---|---|
|
security-audit-reports
|
3.24 KB |
sha256:3b987a5e898fb9f0cc5a7d9245b152310d3a9572cee63427467a3b16cf918f7f
|
|