mediawiki/extensions/WikibaseQualityConstraints: REL1_45 (log #2457585)

sourcepatches

This run took 38 seconds.

From 6a6ad5cb59f1fd94934ffbe27c7c8f2d1fef4e02 Mon Sep 17 00:00:00 2001
From: libraryupgrader <tools.libraryupgrader@tools.wmflabs.org>
Date: Fri, 1 May 2026 01:23:05 +0000
Subject: [PATCH] build: Updating npm dependencies
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

* @xmldom/xmldom: 0.8.12 → 0.8.13
  * https://github.com/advisories/GHSA-2v35-w6hq-6mfw
  * https://github.com/advisories/GHSA-f6ww-3ggp-fr8h
  * https://github.com/advisories/GHSA-j759-j44w-7fr8
  * https://github.com/advisories/GHSA-x6wf-f3px-wcqx
* postcss: 8.4.49 → 8.5.13
  * https://github.com/advisories/GHSA-qx2v-qp2m-jg93

Change-Id: I342ce8ecdcc1d2e023bad6a60117e8f9d2b87a45
---
 package-lock.json | 40 ++++++++++++++++++++--------------------
 1 file changed, 20 insertions(+), 20 deletions(-)

diff --git a/package-lock.json b/package-lock.json
index 3517561..e93d1ec 100644
--- a/package-lock.json
+++ b/package-lock.json
@@ -1114,9 +1114,9 @@
 			"dev": true
 		},
 		"node_modules/@xmldom/xmldom": {
-			"version": "0.8.12",
-			"resolved": "https://registry.npmjs.org/@xmldom/xmldom/-/xmldom-0.8.12.tgz",
-			"integrity": "sha512-9k/gHF6n/pAi/9tqr3m3aqkuiNosYTurLLUtc7xQ9sxB/wm7WPygCv8GYa6mS0fLJEHhqMC1ATYhz++U/lRHqg==",
+			"version": "0.8.13",
+			"resolved": "https://registry.npmjs.org/@xmldom/xmldom/-/xmldom-0.8.13.tgz",
+			"integrity": "sha512-KRYzxepc14G/CEpEGc3Yn+JKaAeT63smlDr+vjB8jRfgTBBI9wRj/nkQEO+ucV8p8I9bfKLWp37uHgFrbntPvw==",
 			"dev": true,
 			"engines": {
 				"node": ">=10.0.0"
@@ -4387,9 +4387,9 @@
 			}
 		},
 		"node_modules/nanoid": {
-			"version": "3.3.8",
-			"resolved": "https://registry.npmjs.org/nanoid/-/nanoid-3.3.8.tgz",
-			"integrity": "sha512-WNLf5Sd8oZxOm+TzppcYk8gVOgP+l58xNy58D0nbUnOxOWRWvlcCV4kUF7ltmI6PsrLl/BgKEyS4mqsGChFN0w==",
+			"version": "3.3.12",
+			"resolved": "https://registry.npmjs.org/nanoid/-/nanoid-3.3.12.tgz",
+			"integrity": "sha512-ZB9RH/39qpq5Vu6Y+NmUaFhQR6pp+M2Xt76XBnEwDaGcVAqhlvxrl3B2bKS5D3NH3QR76v3aSrKaF/Kiy7lEtQ==",
 			"dev": true,
 			"funding": [
 				{
@@ -4793,9 +4793,9 @@
 			}
 		},
 		"node_modules/postcss": {
-			"version": "8.4.49",
-			"resolved": "https://registry.npmjs.org/postcss/-/postcss-8.4.49.tgz",
-			"integrity": "sha512-OCVPnIObs4N29kxTjzLfUryOkvZEq+pf8jTF0lg8E7uETuWHA+v7j3c/xJmiqpX450191LlmZfUKkXxkTry7nA==",
+			"version": "8.5.13",
+			"resolved": "https://registry.npmjs.org/postcss/-/postcss-8.5.13.tgz",
+			"integrity": "sha512-qif0+jGGZoLWdHey3UFHHWP0H7Gbmsk8T5VEqyYFbWqPr1XqvLGBbk/sl8V5exGmcYJklJOhOQq1pV9IcsiFag==",
 			"dev": true,
 			"funding": [
 				{
@@ -4812,7 +4812,7 @@
 				}
 			],
 			"dependencies": {
-				"nanoid": "^3.3.7",
+				"nanoid": "^3.3.11",
 				"picocolors": "^1.1.1",
 				"source-map-js": "^1.2.1"
 			},
@@ -7174,9 +7174,9 @@
 			"dev": true
 		},
 		"@xmldom/xmldom": {
-			"version": "0.8.12",
-			"resolved": "https://registry.npmjs.org/@xmldom/xmldom/-/xmldom-0.8.12.tgz",
-			"integrity": "sha512-9k/gHF6n/pAi/9tqr3m3aqkuiNosYTurLLUtc7xQ9sxB/wm7WPygCv8GYa6mS0fLJEHhqMC1ATYhz++U/lRHqg==",
+			"version": "0.8.13",
+			"resolved": "https://registry.npmjs.org/@xmldom/xmldom/-/xmldom-0.8.13.tgz",
+			"integrity": "sha512-KRYzxepc14G/CEpEGc3Yn+JKaAeT63smlDr+vjB8jRfgTBBI9wRj/nkQEO+ucV8p8I9bfKLWp37uHgFrbntPvw==",
 			"dev": true
 		},
 		"abbrev": {
@@ -9570,9 +9570,9 @@
 			}
 		},
 		"nanoid": {
-			"version": "3.3.8",
-			"resolved": "https://registry.npmjs.org/nanoid/-/nanoid-3.3.8.tgz",
-			"integrity": "sha512-WNLf5Sd8oZxOm+TzppcYk8gVOgP+l58xNy58D0nbUnOxOWRWvlcCV4kUF7ltmI6PsrLl/BgKEyS4mqsGChFN0w==",
+			"version": "3.3.12",
+			"resolved": "https://registry.npmjs.org/nanoid/-/nanoid-3.3.12.tgz",
+			"integrity": "sha512-ZB9RH/39qpq5Vu6Y+NmUaFhQR6pp+M2Xt76XBnEwDaGcVAqhlvxrl3B2bKS5D3NH3QR76v3aSrKaF/Kiy7lEtQ==",
 			"dev": true
 		},
 		"natural-compare": {
@@ -9868,12 +9868,12 @@
 			"dev": true
 		},
 		"postcss": {
-			"version": "8.4.49",
-			"resolved": "https://registry.npmjs.org/postcss/-/postcss-8.4.49.tgz",
-			"integrity": "sha512-OCVPnIObs4N29kxTjzLfUryOkvZEq+pf8jTF0lg8E7uETuWHA+v7j3c/xJmiqpX450191LlmZfUKkXxkTry7nA==",
+			"version": "8.5.13",
+			"resolved": "https://registry.npmjs.org/postcss/-/postcss-8.5.13.tgz",
+			"integrity": "sha512-qif0+jGGZoLWdHey3UFHHWP0H7Gbmsk8T5VEqyYFbWqPr1XqvLGBbk/sl8V5exGmcYJklJOhOQq1pV9IcsiFag==",
 			"dev": true,
 			"requires": {
-				"nanoid": "^3.3.7",
+				"nanoid": "^3.3.11",
 				"picocolors": "^1.1.1",
 				"source-map-js": "^1.2.1"
 			}
-- 
2.47.3

$ date
--- stdout ---
Fri May  1 01:22:31 UTC 2026

--- end ---
$ git clone file:///srv/git/mediawiki-extensions-WikibaseQualityConstraints.git /src/repo --depth=1 -b REL1_45
--- stderr ---
Cloning into '/src/repo'...
--- stdout ---

--- end ---
$ git config user.name libraryupgrader
--- stdout ---

--- end ---
$ git config user.email tools.libraryupgrader@tools.wmflabs.org
--- stdout ---

--- end ---
$ git submodule update --init
--- stdout ---

--- end ---
$ grr init
--- stdout ---
Installed commit-msg hook.

--- end ---
$ git show-ref refs/heads/REL1_45
--- stdout ---
5bbd5ed9a0d888e6fcf22c743b92e674ff875362 refs/heads/REL1_45

--- end ---
$ /usr/bin/npm audit --json
--- stdout ---
{
  "auditReportVersion": 2,
  "vulnerabilities": {
    "@xmldom/xmldom": {
      "name": "@xmldom/xmldom",
      "severity": "high",
      "isDirect": false,
      "via": [
        {
          "source": 1116960,
          "name": "@xmldom/xmldom",
          "dependency": "@xmldom/xmldom",
          "title": "xmldom: Uncontrolled recursion in XML serialization leads to DoS",
          "url": "https://github.com/advisories/GHSA-2v35-w6hq-6mfw",
          "severity": "high",
          "cwe": [
            "CWE-674"
          ],
          "cvss": {
            "score": 0,
            "vectorString": null
          },
          "range": "<0.8.13"
        },
        {
          "source": 1116963,
          "name": "@xmldom/xmldom",
          "dependency": "@xmldom/xmldom",
          "title": "xmldom has XML injection through unvalidated DocumentType serialization",
          "url": "https://github.com/advisories/GHSA-f6ww-3ggp-fr8h",
          "severity": "high",
          "cwe": [
            "CWE-91"
          ],
          "cvss": {
            "score": 0,
            "vectorString": null
          },
          "range": "<0.8.13"
        },
        {
          "source": 1116966,
          "name": "@xmldom/xmldom",
          "dependency": "@xmldom/xmldom",
          "title": "xmldom has XML node injection through unvalidated processing instruction serialization",
          "url": "https://github.com/advisories/GHSA-x6wf-f3px-wcqx",
          "severity": "high",
          "cwe": [
            "CWE-91"
          ],
          "cvss": {
            "score": 0,
            "vectorString": null
          },
          "range": "<0.8.13"
        },
        {
          "source": 1116969,
          "name": "@xmldom/xmldom",
          "dependency": "@xmldom/xmldom",
          "title": "xmldom has XML node injection through unvalidated comment serialization",
          "url": "https://github.com/advisories/GHSA-j759-j44w-7fr8",
          "severity": "high",
          "cwe": [
            "CWE-91"
          ],
          "cvss": {
            "score": 0,
            "vectorString": null
          },
          "range": "<0.8.13"
        }
      ],
      "effects": [],
      "range": "<=0.8.12",
      "nodes": [
        "node_modules/@xmldom/xmldom"
      ],
      "fixAvailable": true
    },
    "diff": {
      "name": "diff",
      "severity": "low",
      "isDirect": false,
      "via": [
        {
          "source": 1112706,
          "name": "diff",
          "dependency": "diff",
          "title": "jsdiff has a Denial of Service vulnerability in parsePatch and applyPatch",
          "url": "https://github.com/advisories/GHSA-73rr-hh4g-fpgx",
          "severity": "low",
          "cwe": [
            "CWE-400",
            "CWE-1333"
          ],
          "cvss": {
            "score": 0,
            "vectorString": null
          },
          "range": ">=6.0.0 <8.0.3"
        }
      ],
      "effects": [
        "sinon"
      ],
      "range": "6.0.0 - 8.0.2",
      "nodes": [
        "node_modules/sinon/node_modules/diff"
      ],
      "fixAvailable": {
        "name": "sinon",
        "version": "21.1.2",
        "isSemVerMajor": true
      }
    },
    "grunt": {
      "name": "grunt",
      "severity": "high",
      "isDirect": true,
      "via": [
        "minimatch"
      ],
      "effects": [
        "grunt-jasmine-nodejs"
      ],
      "range": "0.4.0-a - 1.6.1",
      "nodes": [
        "node_modules/grunt"
      ],
      "fixAvailable": false
    },
    "grunt-jasmine-nodejs": {
      "name": "grunt-jasmine-nodejs",
      "severity": "high",
      "isDirect": true,
      "via": [
        "grunt"
      ],
      "effects": [],
      "range": "*",
      "nodes": [
        "node_modules/grunt-jasmine-nodejs"
      ],
      "fixAvailable": false
    },
    "minimatch": {
      "name": "minimatch",
      "severity": "high",
      "isDirect": false,
      "via": [
        {
          "source": 1113459,
          "name": "minimatch",
          "dependency": "minimatch",
          "title": "minimatch has a ReDoS via repeated wildcards with non-matching literal in pattern",
          "url": "https://github.com/advisories/GHSA-3ppc-4f35-3m26",
          "severity": "high",
          "cwe": [
            "CWE-1333"
          ],
          "cvss": {
            "score": 0,
            "vectorString": null
          },
          "range": "<3.1.3"
        },
        {
          "source": 1113538,
          "name": "minimatch",
          "dependency": "minimatch",
          "title": "minimatch has ReDoS: matchOne() combinatorial backtracking via multiple non-adjacent GLOBSTAR segments",
          "url": "https://github.com/advisories/GHSA-7r86-cg39-jmmj",
          "severity": "high",
          "cwe": [
            "CWE-407"
          ],
          "cvss": {
            "score": 7.5,
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
          },
          "range": "<3.1.3"
        },
        {
          "source": 1113546,
          "name": "minimatch",
          "dependency": "minimatch",
          "title": "minimatch ReDoS: nested *() extglobs generate catastrophically backtracking regular expressions",
          "url": "https://github.com/advisories/GHSA-23c5-xmqv-rm74",
          "severity": "high",
          "cwe": [
            "CWE-1333"
          ],
          "cvss": {
            "score": 7.5,
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
          },
          "range": "<3.1.4"
        }
      ],
      "effects": [
        "grunt"
      ],
      "range": "<=3.1.3",
      "nodes": [
        "node_modules/minimatch"
      ],
      "fixAvailable": false
    },
    "postcss": {
      "name": "postcss",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        {
          "source": 1117015,
          "name": "postcss",
          "dependency": "postcss",
          "title": "PostCSS has XSS via Unescaped </style> in its CSS Stringify Output",
          "url": "https://github.com/advisories/GHSA-qx2v-qp2m-jg93",
          "severity": "moderate",
          "cwe": [
            "CWE-79"
          ],
          "cvss": {
            "score": 6.1,
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
          },
          "range": "<8.5.10"
        }
      ],
      "effects": [],
      "range": "<8.5.10",
      "nodes": [
        "node_modules/postcss"
      ],
      "fixAvailable": true
    },
    "sinon": {
      "name": "sinon",
      "severity": "low",
      "isDirect": true,
      "via": [
        "diff"
      ],
      "effects": [],
      "range": "19.0.0 - 21.0.0",
      "nodes": [
        "node_modules/sinon"
      ],
      "fixAvailable": {
        "name": "sinon",
        "version": "21.1.2",
        "isSemVerMajor": true
      }
    }
  },
  "metadata": {
    "vulnerabilities": {
      "info": 0,
      "low": 2,
      "moderate": 1,
      "high": 4,
      "critical": 0,
      "total": 7
    },
    "dependencies": {
      "prod": 1,
      "dev": 525,
      "optional": 5,
      "peer": 5,
      "peerOptional": 0,
      "total": 525
    }
  }
}

--- end ---
$ /usr/bin/composer install
--- stderr ---
No composer.lock file present. Updating dependencies to latest instead of installing from lock file. See https://getcomposer.org/install for more information.
Loading composer repositories with package information
Updating dependencies
Lock file operations: 47 installs, 0 updates, 0 removals
  - Locking composer/pcre (3.3.2)
  - Locking composer/semver (3.4.4)
  - Locking composer/spdx-licenses (1.5.10)
  - Locking composer/xdebug-handler (3.0.5)
  - Locking data-values/common (1.2.0)
  - Locking data-values/data-values (3.1.1)
  - Locking data-values/geo (4.6.0)
  - Locking data-values/interfaces (1.2.0)
  - Locking data-values/number (0.13.0)
  - Locking data-values/serialization (1.2.5)
  - Locking data-values/time (1.2.0)
  - Locking dealerdirect/phpcodesniffer-composer-installer (v1.2.0)
  - Locking doctrine/deprecations (1.1.6)
  - Locking felixfbecker/advanced-json-rpc (v3.2.1)
  - Locking mediawiki/mediawiki-codesniffer (v48.0.0)
  - Locking mediawiki/mediawiki-phan-config (0.17.0)
  - Locking mediawiki/minus-x (1.1.3)
  - Locking mediawiki/phan-taint-check-plugin (7.0.0)
  - Locking microsoft/tolerant-php-parser (v0.1.2)
  - Locking netresearch/jsonmapper (v4.5.0)
  - Locking phan/phan (5.5.1)
  - Locking php-parallel-lint/php-console-color (v1.0.1)
  - Locking php-parallel-lint/php-console-highlighter (v1.0.0)
  - Locking php-parallel-lint/php-parallel-lint (v1.4.0)
  - Locking phpcsstandards/phpcsextra (1.4.0)
  - Locking phpcsstandards/phpcsutils (1.1.1)
  - Locking phpdocumentor/reflection-common (2.2.0)
  - Locking phpdocumentor/reflection-docblock (5.6.7)
  - Locking phpdocumentor/type-resolver (1.12.0)
  - Locking phpstan/phpdoc-parser (2.3.2)
  - Locking psr/container (2.0.2)
  - Locking psr/log (3.0.2)
  - Locking sabre/event (5.1.8)
  - Locking serialization/serialization (4.1.0)
  - Locking squizlabs/php_codesniffer (3.13.2)
  - Locking symfony/console (v7.4.8)
  - Locking symfony/deprecation-contracts (v3.6.0)
  - Locking symfony/polyfill-ctype (v1.37.0)
  - Locking symfony/polyfill-intl-grapheme (v1.37.0)
  - Locking symfony/polyfill-intl-normalizer (v1.37.0)
  - Locking symfony/polyfill-mbstring (v1.37.0)
  - Locking symfony/polyfill-php80 (v1.37.0)
  - Locking symfony/service-contracts (v3.6.1)
  - Locking symfony/string (v8.0.8)
  - Locking tysonandre/var_representation_polyfill (0.1.3)
  - Locking webmozart/assert (2.3.0)
  - Locking wikimedia/purtle (v2.0.0)
Writing lock file
Installing dependencies from lock file (including require-dev)
Package operations: 47 installs, 0 updates, 0 removals
    0 [>---------------------------]    0 [->--------------------------]
  - Installing squizlabs/php_codesniffer (3.13.2): Extracting archive
  - Installing dealerdirect/phpcodesniffer-composer-installer (v1.2.0): Extracting archive
  - Installing composer/pcre (3.3.2): Extracting archive
  - Installing data-values/interfaces (1.2.0): Extracting archive
  - Installing data-values/data-values (3.1.1): Extracting archive
  - Installing data-values/geo (4.6.0): Extracting archive
  - Installing data-values/common (1.2.0): Extracting archive
  - Installing data-values/number (0.13.0): Extracting archive
  - Installing serialization/serialization (4.1.0): Extracting archive
  - Installing data-values/serialization (1.2.5): Extracting archive
  - Installing data-values/time (1.2.0): Extracting archive
  - Installing phpcsstandards/phpcsutils (1.1.1): Extracting archive
  - Installing phpcsstandards/phpcsextra (1.4.0): Extracting archive
  - Installing symfony/polyfill-mbstring (v1.37.0): Extracting archive
  - Installing composer/spdx-licenses (1.5.10): Extracting archive
  - Installing composer/semver (3.4.4): Extracting archive
  - Installing mediawiki/mediawiki-codesniffer (v48.0.0): Extracting archive
  - Installing tysonandre/var_representation_polyfill (0.1.3): Extracting archive
  - Installing symfony/polyfill-php80 (v1.37.0): Extracting archive
  - Installing symfony/polyfill-intl-normalizer (v1.37.0): Extracting archive
  - Installing symfony/polyfill-intl-grapheme (v1.37.0): Extracting archive
  - Installing symfony/polyfill-ctype (v1.37.0): Extracting archive
  - Installing symfony/string (v8.0.8): Extracting archive
  - Installing symfony/deprecation-contracts (v3.6.0): Extracting archive
  - Installing psr/container (2.0.2): Extracting archive
  - Installing symfony/service-contracts (v3.6.1): Extracting archive
  - Installing symfony/console (v7.4.8): Extracting archive
  - Installing sabre/event (5.1.8): Extracting archive
  - Installing netresearch/jsonmapper (v4.5.0): Extracting archive
  - Installing microsoft/tolerant-php-parser (v0.1.2): Extracting archive
  - Installing webmozart/assert (2.3.0): Extracting archive
  - Installing phpstan/phpdoc-parser (2.3.2): Extracting archive
  - Installing phpdocumentor/reflection-common (2.2.0): Extracting archive
  - Installing doctrine/deprecations (1.1.6): Extracting archive
  - Installing phpdocumentor/type-resolver (1.12.0): Extracting archive
  - Installing phpdocumentor/reflection-docblock (5.6.7): Extracting archive
  - Installing felixfbecker/advanced-json-rpc (v3.2.1): Extracting archive
  - Installing psr/log (3.0.2): Extracting archive
  - Installing composer/xdebug-handler (3.0.5): Extracting archive
  - Installing phan/phan (5.5.1): Extracting archive
  - Installing mediawiki/phan-taint-check-plugin (7.0.0): Extracting archive
  - Installing mediawiki/mediawiki-phan-config (0.17.0): Extracting archive
  - Installing mediawiki/minus-x (1.1.3): Extracting archive
  - Installing php-parallel-lint/php-console-color (v1.0.1): Extracting archive
  - Installing php-parallel-lint/php-console-highlighter (v1.0.0): Extracting archive
  - Installing php-parallel-lint/php-parallel-lint (v1.4.0): Extracting archive
  - Installing wikimedia/purtle (v2.0.0): Extracting archive
  0/45 [>---------------------------]   0%
 30/45 [==================>---------]  66%
 44/45 [===========================>]  97%
 45/45 [============================] 100%
1 package suggestions were added by new dependencies, use `composer suggest` to see details.
Generating autoload files
19 packages you are using are looking for funding.
Use the `composer fund` command to find out more!
--- stdout ---
PHP CodeSniffer Config installed_paths set to ../../mediawiki/mediawiki-codesniffer,../../phpcsstandards/phpcsextra,../../phpcsstandards/phpcsutils

--- end ---
$ /usr/bin/npm audit --json
--- stdout ---
{
  "auditReportVersion": 2,
  "vulnerabilities": {
    "@xmldom/xmldom": {
      "name": "@xmldom/xmldom",
      "severity": "high",
      "isDirect": false,
      "via": [
        {
          "source": 1116960,
          "name": "@xmldom/xmldom",
          "dependency": "@xmldom/xmldom",
          "title": "xmldom: Uncontrolled recursion in XML serialization leads to DoS",
          "url": "https://github.com/advisories/GHSA-2v35-w6hq-6mfw",
          "severity": "high",
          "cwe": [
            "CWE-674"
          ],
          "cvss": {
            "score": 0,
            "vectorString": null
          },
          "range": "<0.8.13"
        },
        {
          "source": 1116963,
          "name": "@xmldom/xmldom",
          "dependency": "@xmldom/xmldom",
          "title": "xmldom has XML injection through unvalidated DocumentType serialization",
          "url": "https://github.com/advisories/GHSA-f6ww-3ggp-fr8h",
          "severity": "high",
          "cwe": [
            "CWE-91"
          ],
          "cvss": {
            "score": 0,
            "vectorString": null
          },
          "range": "<0.8.13"
        },
        {
          "source": 1116966,
          "name": "@xmldom/xmldom",
          "dependency": "@xmldom/xmldom",
          "title": "xmldom has XML node injection through unvalidated processing instruction serialization",
          "url": "https://github.com/advisories/GHSA-x6wf-f3px-wcqx",
          "severity": "high",
          "cwe": [
            "CWE-91"
          ],
          "cvss": {
            "score": 0,
            "vectorString": null
          },
          "range": "<0.8.13"
        },
        {
          "source": 1116969,
          "name": "@xmldom/xmldom",
          "dependency": "@xmldom/xmldom",
          "title": "xmldom has XML node injection through unvalidated comment serialization",
          "url": "https://github.com/advisories/GHSA-j759-j44w-7fr8",
          "severity": "high",
          "cwe": [
            "CWE-91"
          ],
          "cvss": {
            "score": 0,
            "vectorString": null
          },
          "range": "<0.8.13"
        }
      ],
      "effects": [],
      "range": "<=0.8.12",
      "nodes": [
        "node_modules/@xmldom/xmldom"
      ],
      "fixAvailable": true
    },
    "diff": {
      "name": "diff",
      "severity": "low",
      "isDirect": false,
      "via": [
        {
          "source": 1112706,
          "name": "diff",
          "dependency": "diff",
          "title": "jsdiff has a Denial of Service vulnerability in parsePatch and applyPatch",
          "url": "https://github.com/advisories/GHSA-73rr-hh4g-fpgx",
          "severity": "low",
          "cwe": [
            "CWE-400",
            "CWE-1333"
          ],
          "cvss": {
            "score": 0,
            "vectorString": null
          },
          "range": ">=6.0.0 <8.0.3"
        }
      ],
      "effects": [
        "sinon"
      ],
      "range": "6.0.0 - 8.0.2",
      "nodes": [
        "node_modules/sinon/node_modules/diff"
      ],
      "fixAvailable": {
        "name": "sinon",
        "version": "21.1.2",
        "isSemVerMajor": true
      }
    },
    "grunt": {
      "name": "grunt",
      "severity": "high",
      "isDirect": true,
      "via": [
        "minimatch"
      ],
      "effects": [
        "grunt-jasmine-nodejs"
      ],
      "range": "0.4.0-a - 1.6.1",
      "nodes": [
        "node_modules/grunt"
      ],
      "fixAvailable": false
    },
    "grunt-jasmine-nodejs": {
      "name": "grunt-jasmine-nodejs",
      "severity": "high",
      "isDirect": true,
      "via": [
        "grunt"
      ],
      "effects": [],
      "range": "*",
      "nodes": [
        "node_modules/grunt-jasmine-nodejs"
      ],
      "fixAvailable": false
    },
    "minimatch": {
      "name": "minimatch",
      "severity": "high",
      "isDirect": false,
      "via": [
        {
          "source": 1113459,
          "name": "minimatch",
          "dependency": "minimatch",
          "title": "minimatch has a ReDoS via repeated wildcards with non-matching literal in pattern",
          "url": "https://github.com/advisories/GHSA-3ppc-4f35-3m26",
          "severity": "high",
          "cwe": [
            "CWE-1333"
          ],
          "cvss": {
            "score": 0,
            "vectorString": null
          },
          "range": "<3.1.3"
        },
        {
          "source": 1113538,
          "name": "minimatch",
          "dependency": "minimatch",
          "title": "minimatch has ReDoS: matchOne() combinatorial backtracking via multiple non-adjacent GLOBSTAR segments",
          "url": "https://github.com/advisories/GHSA-7r86-cg39-jmmj",
          "severity": "high",
          "cwe": [
            "CWE-407"
          ],
          "cvss": {
            "score": 7.5,
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
          },
          "range": "<3.1.3"
        },
        {
          "source": 1113546,
          "name": "minimatch",
          "dependency": "minimatch",
          "title": "minimatch ReDoS: nested *() extglobs generate catastrophically backtracking regular expressions",
          "url": "https://github.com/advisories/GHSA-23c5-xmqv-rm74",
          "severity": "high",
          "cwe": [
            "CWE-1333"
          ],
          "cvss": {
            "score": 7.5,
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
          },
          "range": "<3.1.4"
        }
      ],
      "effects": [
        "grunt"
      ],
      "range": "<=3.1.3",
      "nodes": [
        "node_modules/minimatch"
      ],
      "fixAvailable": false
    },
    "postcss": {
      "name": "postcss",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        {
          "source": 1117015,
          "name": "postcss",
          "dependency": "postcss",
          "title": "PostCSS has XSS via Unescaped </style> in its CSS Stringify Output",
          "url": "https://github.com/advisories/GHSA-qx2v-qp2m-jg93",
          "severity": "moderate",
          "cwe": [
            "CWE-79"
          ],
          "cvss": {
            "score": 6.1,
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
          },
          "range": "<8.5.10"
        }
      ],
      "effects": [],
      "range": "<8.5.10",
      "nodes": [
        "node_modules/postcss"
      ],
      "fixAvailable": true
    },
    "sinon": {
      "name": "sinon",
      "severity": "low",
      "isDirect": true,
      "via": [
        "diff"
      ],
      "effects": [],
      "range": "19.0.0 - 21.0.0",
      "nodes": [
        "node_modules/sinon"
      ],
      "fixAvailable": {
        "name": "sinon",
        "version": "21.1.2",
        "isSemVerMajor": true
      }
    }
  },
  "metadata": {
    "vulnerabilities": {
      "info": 0,
      "low": 2,
      "moderate": 1,
      "high": 4,
      "critical": 0,
      "total": 7
    },
    "dependencies": {
      "prod": 1,
      "dev": 525,
      "optional": 5,
      "peer": 5,
      "peerOptional": 0,
      "total": 525
    }
  }
}

--- end ---
Attempting to npm audit fix
$ /usr/bin/npm audit fix --dry-run --only=dev --json
--- stderr ---
npm WARN invalid config only="dev" set in command line options
npm WARN invalid config Must be one of: null, prod, production
--- stdout ---
{
  "added": 525,
  "removed": 0,
  "changed": 0,
  "audited": 526,
  "funding": 123,
  "audit": {
    "auditReportVersion": 2,
    "vulnerabilities": {
      "@xmldom/xmldom": {
        "name": "@xmldom/xmldom",
        "severity": "high",
        "isDirect": false,
        "via": [
          {
            "source": 1116960,
            "name": "@xmldom/xmldom",
            "dependency": "@xmldom/xmldom",
            "title": "xmldom: Uncontrolled recursion in XML serialization leads to DoS",
            "url": "https://github.com/advisories/GHSA-2v35-w6hq-6mfw",
            "severity": "high",
            "cwe": [
              "CWE-674"
            ],
            "cvss": {
              "score": 0,
              "vectorString": null
            },
            "range": "<0.8.13"
          },
          {
            "source": 1116963,
            "name": "@xmldom/xmldom",
            "dependency": "@xmldom/xmldom",
            "title": "xmldom has XML injection through unvalidated DocumentType serialization",
            "url": "https://github.com/advisories/GHSA-f6ww-3ggp-fr8h",
            "severity": "high",
            "cwe": [
              "CWE-91"
            ],
            "cvss": {
              "score": 0,
              "vectorString": null
            },
            "range": "<0.8.13"
          },
          {
            "source": 1116966,
            "name": "@xmldom/xmldom",
            "dependency": "@xmldom/xmldom",
            "title": "xmldom has XML node injection through unvalidated processing instruction serialization",
            "url": "https://github.com/advisories/GHSA-x6wf-f3px-wcqx",
            "severity": "high",
            "cwe": [
              "CWE-91"
            ],
            "cvss": {
              "score": 0,
              "vectorString": null
            },
            "range": "<0.8.13"
          },
          {
            "source": 1116969,
            "name": "@xmldom/xmldom",
            "dependency": "@xmldom/xmldom",
            "title": "xmldom has XML node injection through unvalidated comment serialization",
            "url": "https://github.com/advisories/GHSA-j759-j44w-7fr8",
            "severity": "high",
            "cwe": [
              "CWE-91"
            ],
            "cvss": {
              "score": 0,
              "vectorString": null
            },
            "range": "<0.8.13"
          }
        ],
        "effects": [],
        "range": "<=0.8.12",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "diff": {
        "name": "diff",
        "severity": "low",
        "isDirect": false,
        "via": [
          {
            "source": 1112706,
            "name": "diff",
            "dependency": "diff",
            "title": "jsdiff has a Denial of Service vulnerability in parsePatch and applyPatch",
            "url": "https://github.com/advisories/GHSA-73rr-hh4g-fpgx",
            "severity": "low",
            "cwe": [
              "CWE-400",
              "CWE-1333"
            ],
            "cvss": {
              "score": 0,
              "vectorString": null
            },
            "range": ">=6.0.0 <8.0.3"
          }
        ],
        "effects": [
          "sinon"
        ],
        "range": "6.0.0 - 8.0.2",
        "nodes": [
          "node_modules/sinon/node_modules/diff"
        ],
        "fixAvailable": {
          "name": "sinon",
          "version": "21.1.2",
          "isSemVerMajor": true
        }
      },
      "grunt": {
        "name": "grunt",
        "severity": "high",
        "isDirect": true,
        "via": [
          "minimatch"
        ],
        "effects": [
          "grunt-jasmine-nodejs"
        ],
        "range": "0.4.0-a - 1.6.1",
        "nodes": [
          "node_modules/grunt"
        ],
        "fixAvailable": false
      },
      "grunt-jasmine-nodejs": {
        "name": "grunt-jasmine-nodejs",
        "severity": "high",
        "isDirect": true,
        "via": [
          "grunt"
        ],
        "effects": [],
        "range": "*",
        "nodes": [
          "node_modules/grunt-jasmine-nodejs"
        ],
        "fixAvailable": false
      },
      "minimatch": {
        "name": "minimatch",
        "severity": "high",
        "isDirect": false,
        "via": [
          {
            "source": 1113459,
            "name": "minimatch",
            "dependency": "minimatch",
            "title": "minimatch has a ReDoS via repeated wildcards with non-matching literal in pattern",
            "url": "https://github.com/advisories/GHSA-3ppc-4f35-3m26",
            "severity": "high",
            "cwe": [
              "CWE-1333"
            ],
            "cvss": {
              "score": 0,
              "vectorString": null
            },
            "range": "<3.1.3"
          },
          {
            "source": 1113538,
            "name": "minimatch",
            "dependency": "minimatch",
            "title": "minimatch has ReDoS: matchOne() combinatorial backtracking via multiple non-adjacent GLOBSTAR segments",
            "url": "https://github.com/advisories/GHSA-7r86-cg39-jmmj",
            "severity": "high",
            "cwe": [
              "CWE-407"
            ],
            "cvss": {
              "score": 7.5,
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
            },
            "range": "<3.1.3"
          },
          {
            "source": 1113546,
            "name": "minimatch",
            "dependency": "minimatch",
            "title": "minimatch ReDoS: nested *() extglobs generate catastrophically backtracking regular expressions",
            "url": "https://github.com/advisories/GHSA-23c5-xmqv-rm74",
            "severity": "high",
            "cwe": [
              "CWE-1333"
            ],
            "cvss": {
              "score": 7.5,
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
            },
            "range": "<3.1.4"
          }
        ],
        "effects": [
          "grunt"
        ],
        "range": "<=3.1.3",
        "nodes": [
          "node_modules/minimatch"
        ],
        "fixAvailable": false
      },
      "postcss": {
        "name": "postcss",
        "severity": "moderate",
        "isDirect": false,
        "via": [
          {
            "source": 1117015,
            "name": "postcss",
            "dependency": "postcss",
            "title": "PostCSS has XSS via Unescaped </style> in its CSS Stringify Output",
            "url": "https://github.com/advisories/GHSA-qx2v-qp2m-jg93",
            "severity": "moderate",
            "cwe": [
              "CWE-79"
            ],
            "cvss": {
              "score": 6.1,
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
            },
            "range": "<8.5.10"
          }
        ],
        "effects": [],
        "range": "<8.5.10",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      },
      "sinon": {
        "name": "sinon",
        "severity": "low",
        "isDirect": true,
        "via": [
          "diff"
        ],
        "effects": [],
        "range": "19.0.0 - 21.0.0",
        "nodes": [
          "node_modules/sinon"
        ],
        "fixAvailable": {
          "name": "sinon",
          "version": "21.1.2",
          "isSemVerMajor": true
        }
      }
    },
    "metadata": {
      "vulnerabilities": {
        "info": 0,
        "low": 2,
        "moderate": 1,
        "high": 4,
        "critical": 0,
        "total": 7
      },
      "dependencies": {
        "prod": 1,
        "dev": 525,
        "optional": 5,
        "peer": 5,
        "peerOptional": 0,
        "total": 525
      }
    }
  }
}

--- end ---
{"added": 525, "removed": 0, "changed": 0, "audited": 526, "funding": 123, "audit": {"auditReportVersion": 2, "vulnerabilities": {"@xmldom/xmldom": {"name": "@xmldom/xmldom", "severity": "high", "isDirect": false, "via": [{"source": 1116960, "name": "@xmldom/xmldom", "dependency": "@xmldom/xmldom", "title": "xmldom: Uncontrolled recursion in XML serialization leads to DoS", "url": "https://github.com/advisories/GHSA-2v35-w6hq-6mfw", "severity": "high", "cwe": ["CWE-674"], "cvss": {"score": 0, "vectorString": null}, "range": "<0.8.13"}, {"source": 1116963, "name": "@xmldom/xmldom", "dependency": "@xmldom/xmldom", "title": "xmldom has XML injection through unvalidated DocumentType serialization", "url": "https://github.com/advisories/GHSA-f6ww-3ggp-fr8h", "severity": "high", "cwe": ["CWE-91"], "cvss": {"score": 0, "vectorString": null}, "range": "<0.8.13"}, {"source": 1116966, "name": "@xmldom/xmldom", "dependency": "@xmldom/xmldom", "title": "xmldom has XML node injection through unvalidated processing instruction serialization", "url": "https://github.com/advisories/GHSA-x6wf-f3px-wcqx", "severity": "high", "cwe": ["CWE-91"], "cvss": {"score": 0, "vectorString": null}, "range": "<0.8.13"}, {"source": 1116969, "name": "@xmldom/xmldom", "dependency": "@xmldom/xmldom", "title": "xmldom has XML node injection through unvalidated comment serialization", "url": "https://github.com/advisories/GHSA-j759-j44w-7fr8", "severity": "high", "cwe": ["CWE-91"], "cvss": {"score": 0, "vectorString": null}, "range": "<0.8.13"}], "effects": [], "range": "<=0.8.12", "nodes": [""], "fixAvailable": true}, "diff": {"name": "diff", "severity": "low", "isDirect": false, "via": [{"source": 1112706, "name": "diff", "dependency": "diff", "title": "jsdiff has a Denial of Service vulnerability in parsePatch and applyPatch", "url": "https://github.com/advisories/GHSA-73rr-hh4g-fpgx", "severity": "low", "cwe": ["CWE-400", "CWE-1333"], "cvss": {"score": 0, "vectorString": null}, "range": ">=6.0.0 <8.0.3"}], "effects": ["sinon"], "range": "6.0.0 - 8.0.2", "nodes": ["node_modules/sinon/node_modules/diff"], "fixAvailable": {"name": "sinon", "version": "21.1.2", "isSemVerMajor": true}}, "grunt": {"name": "grunt", "severity": "high", "isDirect": true, "via": ["minimatch"], "effects": ["grunt-jasmine-nodejs"], "range": "0.4.0-a - 1.6.1", "nodes": ["node_modules/grunt"], "fixAvailable": false}, "grunt-jasmine-nodejs": {"name": "grunt-jasmine-nodejs", "severity": "high", "isDirect": true, "via": ["grunt"], "effects": [], "range": "*", "nodes": ["node_modules/grunt-jasmine-nodejs"], "fixAvailable": false}, "minimatch": {"name": "minimatch", "severity": "high", "isDirect": false, "via": [{"source": 1113459, "name": "minimatch", "dependency": "minimatch", "title": "minimatch has a ReDoS via repeated wildcards with non-matching literal in pattern", "url": "https://github.com/advisories/GHSA-3ppc-4f35-3m26", "severity": "high", "cwe": ["CWE-1333"], "cvss": {"score": 0, "vectorString": null}, "range": "<3.1.3"}, {"source": 1113538, "name": "minimatch", "dependency": "minimatch", "title": "minimatch has ReDoS: matchOne() combinatorial backtracking via multiple non-adjacent GLOBSTAR segments", "url": "https://github.com/advisories/GHSA-7r86-cg39-jmmj", "severity": "high", "cwe": ["CWE-407"], "cvss": {"score": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "range": "<3.1.3"}, {"source": 1113546, "name": "minimatch", "dependency": "minimatch", "title": "minimatch ReDoS: nested *() extglobs generate catastrophically backtracking regular expressions", "url": "https://github.com/advisories/GHSA-23c5-xmqv-rm74", "severity": "high", "cwe": ["CWE-1333"], "cvss": {"score": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "range": "<3.1.4"}], "effects": ["grunt"], "range": "<=3.1.3", "nodes": ["node_modules/minimatch"], "fixAvailable": false}, "postcss": {"name": "postcss", "severity": "moderate", "isDirect": false, "via": [{"source": 1117015, "name": "postcss", "dependency": "postcss", "title": "PostCSS has XSS via Unescaped </style> in its CSS Stringify Output", "url": "https://github.com/advisories/GHSA-qx2v-qp2m-jg93", "severity": "moderate", "cwe": ["CWE-79"], "cvss": {"score": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}, "range": "<8.5.10"}], "effects": [], "range": "<8.5.10", "nodes": [""], "fixAvailable": true}, "sinon": {"name": "sinon", "severity": "low", "isDirect": true, "via": ["diff"], "effects": [], "range": "19.0.0 - 21.0.0", "nodes": ["node_modules/sinon"], "fixAvailable": {"name": "sinon", "version": "21.1.2", "isSemVerMajor": true}}}, "metadata": {"vulnerabilities": {"info": 0, "low": 2, "moderate": 1, "high": 4, "critical": 0, "total": 7}, "dependencies": {"prod": 1, "dev": 525, "optional": 5, "peer": 5, "peerOptional": 0, "total": 525}}}}
$ /usr/bin/npm audit fix --only=dev
--- stderr ---
npm WARN invalid config only="dev" set in command line options
npm WARN invalid config Must be one of: null, prod, production
--- stdout ---

added 525 packages, and audited 526 packages in 6s

123 packages are looking for funding
  run `npm fund` for details

# npm audit report

diff  6.0.0 - 8.0.2
jsdiff has a Denial of Service vulnerability in parsePatch and applyPatch - https://github.com/advisories/GHSA-73rr-hh4g-fpgx
fix available via `npm audit fix --force`
Will install sinon@21.1.2, which is a breaking change
node_modules/sinon/node_modules/diff
  sinon  19.0.0 - 21.0.0
  Depends on vulnerable versions of diff
  node_modules/sinon

minimatch  <=3.1.3
Severity: high
minimatch has a ReDoS via repeated wildcards with non-matching literal in pattern - https://github.com/advisories/GHSA-3ppc-4f35-3m26
minimatch has ReDoS: matchOne() combinatorial backtracking via multiple non-adjacent GLOBSTAR segments - https://github.com/advisories/GHSA-7r86-cg39-jmmj
minimatch ReDoS: nested *() extglobs generate catastrophically backtracking regular expressions - https://github.com/advisories/GHSA-23c5-xmqv-rm74
No fix available
node_modules/minimatch
  grunt  0.4.0-a - 1.6.1
  Depends on vulnerable versions of minimatch
  node_modules/grunt
    grunt-jasmine-nodejs  *
    Depends on vulnerable versions of grunt
    node_modules/grunt-jasmine-nodejs

5 vulnerabilities (2 low, 3 high)

To address all issues possible (including breaking changes), run:
  npm audit fix --force

Some issues need review, and may require choosing
a different dependency.

--- end ---
Verifying that tests still pass
$ /usr/bin/npm ci
--- stdout ---

added 525 packages, and audited 526 packages in 7s

123 packages are looking for funding
  run `npm fund` for details

5 vulnerabilities (2 low, 3 high)

To address all issues possible (including breaking changes), run:
  npm audit fix --force

Some issues need review, and may require choosing
a different dependency.

Run `npm audit` for details.

--- end ---
$ /usr/bin/npm test
--- stdout ---

> test
> grunt test

Running "eslint:all" (eslint) task

Running "banana:WikibaseQualityConstraints" (banana) task
>> 2 message directories checked.

Running "jasmine_nodejs:all" (jasmine_nodejs) task

>> Executing 29 defined specs...

Test Suites & Specs:

1) wikibase.quality.constraints.gadget

   2) config
      ✔ has default values
      ✔ can be overwritten by constructor parameter

   3) _extractResultsForStatement
      ✔ finds constraint violation result in entity data

   4) default behavior
      ✔ checks if wbIsEditView true
      ✔ invokes mw loader and resumes once it is ready
      ✔ gets entity id from wbEntityId
      ✔ runs a fullCheck once mw loader is done and entityView.rendered fires
      ✔ sets entity from newFromEntityLoadedHook

   5) setting and getting an entity
      ✔ gets the same entity as set

   6) _addReportsToStatement
      ✔ extracts result for statement with property id and statement id
      ✔ adds results to references
      ✔ adds results to main snak
      ✔ adds results to qualifiers

   7) _aggregateMultipleWbcheckconstraintsResponses
      ✔ can combine multiple responses' entity information

   ✔ exports an invokable module

   8) _fullCheckAllIds
      ✔ chunks requests

   9) fullCheck
      ✔ calls api with correct parameters
      ✔ tracks usage
      ✔ uses api response to update DOM statements

   10) _getEntityDataByStatementId
      ✔ extracts the entity data when the statementId exists
      ✔ returns null when the statementId isn't present

   11) snackCheck
      ✔ adds reports to statement from response
      ✔ calls api with statement id
      ✔ runs a full check

12) wikibase.quality.constraints.suggestions.EntitySelectorHookHandler
   ✔ exports an invokable module

   13) getSearchHandler
      ✔ Returns a handler function

   14) returned search handler
      ✔ doesn't call passed callback for properties without qualifier context
      ✔ calls passed callback
      ✔ doesn't call passed callback for items with qualifier context

>> Done!


Summary:

Suites:  14 of 14
Specs:   29 of 29
Expects: 0 (0 failures)
Finished in 0.170 seconds

>> Successful!

Running "stylelint:all" (stylelint) task
>> Linted 4 files without errors

Done.

--- end ---
{"1116960": {"source": 1116960, "name": "@xmldom/xmldom", "dependency": "@xmldom/xmldom", "title": "xmldom: Uncontrolled recursion in XML serialization leads to DoS", "url": "https://github.com/advisories/GHSA-2v35-w6hq-6mfw", "severity": "high", "cwe": ["CWE-674"], "cvss": {"score": 0, "vectorString": null}, "range": "<0.8.13"}, "1116963": {"source": 1116963, "name": "@xmldom/xmldom", "dependency": "@xmldom/xmldom", "title": "xmldom has XML injection through unvalidated DocumentType serialization", "url": "https://github.com/advisories/GHSA-f6ww-3ggp-fr8h", "severity": "high", "cwe": ["CWE-91"], "cvss": {"score": 0, "vectorString": null}, "range": "<0.8.13"}, "1116966": {"source": 1116966, "name": "@xmldom/xmldom", "dependency": "@xmldom/xmldom", "title": "xmldom has XML node injection through unvalidated processing instruction serialization", "url": "https://github.com/advisories/GHSA-x6wf-f3px-wcqx", "severity": "high", "cwe": ["CWE-91"], "cvss": {"score": 0, "vectorString": null}, "range": "<0.8.13"}, "1116969": {"source": 1116969, "name": "@xmldom/xmldom", "dependency": "@xmldom/xmldom", "title": "xmldom has XML node injection through unvalidated comment serialization", "url": "https://github.com/advisories/GHSA-j759-j44w-7fr8", "severity": "high", "cwe": ["CWE-91"], "cvss": {"score": 0, "vectorString": null}, "range": "<0.8.13"}}
Upgrading n:@xmldom/xmldom from 0.8.12 -> 0.8.13
{"1117015": {"source": 1117015, "name": "postcss", "dependency": "postcss", "title": "PostCSS has XSS via Unescaped </style> in its CSS Stringify Output", "url": "https://github.com/advisories/GHSA-qx2v-qp2m-jg93", "severity": "moderate", "cwe": ["CWE-79"], "cvss": {"score": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}, "range": "<8.5.10"}}
Upgrading n:postcss from 8.4.49 -> 8.5.13
$ package-lock-lint /src/repo/package-lock.json
--- stdout ---
Checking /src/repo/package-lock.json

--- end ---
build: Updating npm dependencies

* @xmldom/xmldom: 0.8.12 → 0.8.13
  * https://github.com/advisories/GHSA-2v35-w6hq-6mfw
  * https://github.com/advisories/GHSA-f6ww-3ggp-fr8h
  * https://github.com/advisories/GHSA-j759-j44w-7fr8
  * https://github.com/advisories/GHSA-x6wf-f3px-wcqx
* postcss: 8.4.49 → 8.5.13
  * https://github.com/advisories/GHSA-qx2v-qp2m-jg93

$ git add .
--- stdout ---

--- end ---
$ git commit -F /tmp/tmptyfnqmsf
--- stdout ---
[REL1_45 6a6ad5c] build: Updating npm dependencies
 1 file changed, 20 insertions(+), 20 deletions(-)

--- end ---
$ git format-patch HEAD~1 --stdout
--- stdout ---
From 6a6ad5cb59f1fd94934ffbe27c7c8f2d1fef4e02 Mon Sep 17 00:00:00 2001
From: libraryupgrader <tools.libraryupgrader@tools.wmflabs.org>
Date: Fri, 1 May 2026 01:23:05 +0000
Subject: [PATCH] build: Updating npm dependencies
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

* @xmldom/xmldom: 0.8.12 → 0.8.13
  * https://github.com/advisories/GHSA-2v35-w6hq-6mfw
  * https://github.com/advisories/GHSA-f6ww-3ggp-fr8h
  * https://github.com/advisories/GHSA-j759-j44w-7fr8
  * https://github.com/advisories/GHSA-x6wf-f3px-wcqx
* postcss: 8.4.49 → 8.5.13
  * https://github.com/advisories/GHSA-qx2v-qp2m-jg93

Change-Id: I342ce8ecdcc1d2e023bad6a60117e8f9d2b87a45
---
 package-lock.json | 40 ++++++++++++++++++++--------------------
 1 file changed, 20 insertions(+), 20 deletions(-)

diff --git a/package-lock.json b/package-lock.json
index 3517561..e93d1ec 100644
--- a/package-lock.json
+++ b/package-lock.json
@@ -1114,9 +1114,9 @@
 			"dev": true
 		},
 		"node_modules/@xmldom/xmldom": {
-			"version": "0.8.12",
-			"resolved": "https://registry.npmjs.org/@xmldom/xmldom/-/xmldom-0.8.12.tgz",
-			"integrity": "sha512-9k/gHF6n/pAi/9tqr3m3aqkuiNosYTurLLUtc7xQ9sxB/wm7WPygCv8GYa6mS0fLJEHhqMC1ATYhz++U/lRHqg==",
+			"version": "0.8.13",
+			"resolved": "https://registry.npmjs.org/@xmldom/xmldom/-/xmldom-0.8.13.tgz",
+			"integrity": "sha512-KRYzxepc14G/CEpEGc3Yn+JKaAeT63smlDr+vjB8jRfgTBBI9wRj/nkQEO+ucV8p8I9bfKLWp37uHgFrbntPvw==",
 			"dev": true,
 			"engines": {
 				"node": ">=10.0.0"
@@ -4387,9 +4387,9 @@
 			}
 		},
 		"node_modules/nanoid": {
-			"version": "3.3.8",
-			"resolved": "https://registry.npmjs.org/nanoid/-/nanoid-3.3.8.tgz",
-			"integrity": "sha512-WNLf5Sd8oZxOm+TzppcYk8gVOgP+l58xNy58D0nbUnOxOWRWvlcCV4kUF7ltmI6PsrLl/BgKEyS4mqsGChFN0w==",
+			"version": "3.3.12",
+			"resolved": "https://registry.npmjs.org/nanoid/-/nanoid-3.3.12.tgz",
+			"integrity": "sha512-ZB9RH/39qpq5Vu6Y+NmUaFhQR6pp+M2Xt76XBnEwDaGcVAqhlvxrl3B2bKS5D3NH3QR76v3aSrKaF/Kiy7lEtQ==",
 			"dev": true,
 			"funding": [
 				{
@@ -4793,9 +4793,9 @@
 			}
 		},
 		"node_modules/postcss": {
-			"version": "8.4.49",
-			"resolved": "https://registry.npmjs.org/postcss/-/postcss-8.4.49.tgz",
-			"integrity": "sha512-OCVPnIObs4N29kxTjzLfUryOkvZEq+pf8jTF0lg8E7uETuWHA+v7j3c/xJmiqpX450191LlmZfUKkXxkTry7nA==",
+			"version": "8.5.13",
+			"resolved": "https://registry.npmjs.org/postcss/-/postcss-8.5.13.tgz",
+			"integrity": "sha512-qif0+jGGZoLWdHey3UFHHWP0H7Gbmsk8T5VEqyYFbWqPr1XqvLGBbk/sl8V5exGmcYJklJOhOQq1pV9IcsiFag==",
 			"dev": true,
 			"funding": [
 				{
@@ -4812,7 +4812,7 @@
 				}
 			],
 			"dependencies": {
-				"nanoid": "^3.3.7",
+				"nanoid": "^3.3.11",
 				"picocolors": "^1.1.1",
 				"source-map-js": "^1.2.1"
 			},
@@ -7174,9 +7174,9 @@
 			"dev": true
 		},
 		"@xmldom/xmldom": {
-			"version": "0.8.12",
-			"resolved": "https://registry.npmjs.org/@xmldom/xmldom/-/xmldom-0.8.12.tgz",
-			"integrity": "sha512-9k/gHF6n/pAi/9tqr3m3aqkuiNosYTurLLUtc7xQ9sxB/wm7WPygCv8GYa6mS0fLJEHhqMC1ATYhz++U/lRHqg==",
+			"version": "0.8.13",
+			"resolved": "https://registry.npmjs.org/@xmldom/xmldom/-/xmldom-0.8.13.tgz",
+			"integrity": "sha512-KRYzxepc14G/CEpEGc3Yn+JKaAeT63smlDr+vjB8jRfgTBBI9wRj/nkQEO+ucV8p8I9bfKLWp37uHgFrbntPvw==",
 			"dev": true
 		},
 		"abbrev": {
@@ -9570,9 +9570,9 @@
 			}
 		},
 		"nanoid": {
-			"version": "3.3.8",
-			"resolved": "https://registry.npmjs.org/nanoid/-/nanoid-3.3.8.tgz",
-			"integrity": "sha512-WNLf5Sd8oZxOm+TzppcYk8gVOgP+l58xNy58D0nbUnOxOWRWvlcCV4kUF7ltmI6PsrLl/BgKEyS4mqsGChFN0w==",
+			"version": "3.3.12",
+			"resolved": "https://registry.npmjs.org/nanoid/-/nanoid-3.3.12.tgz",
+			"integrity": "sha512-ZB9RH/39qpq5Vu6Y+NmUaFhQR6pp+M2Xt76XBnEwDaGcVAqhlvxrl3B2bKS5D3NH3QR76v3aSrKaF/Kiy7lEtQ==",
 			"dev": true
 		},
 		"natural-compare": {
@@ -9868,12 +9868,12 @@
 			"dev": true
 		},
 		"postcss": {
-			"version": "8.4.49",
-			"resolved": "https://registry.npmjs.org/postcss/-/postcss-8.4.49.tgz",
-			"integrity": "sha512-OCVPnIObs4N29kxTjzLfUryOkvZEq+pf8jTF0lg8E7uETuWHA+v7j3c/xJmiqpX450191LlmZfUKkXxkTry7nA==",
+			"version": "8.5.13",
+			"resolved": "https://registry.npmjs.org/postcss/-/postcss-8.5.13.tgz",
+			"integrity": "sha512-qif0+jGGZoLWdHey3UFHHWP0H7Gbmsk8T5VEqyYFbWqPr1XqvLGBbk/sl8V5exGmcYJklJOhOQq1pV9IcsiFag==",
 			"dev": true,
 			"requires": {
-				"nanoid": "^3.3.7",
+				"nanoid": "^3.3.11",
 				"picocolors": "^1.1.1",
 				"source-map-js": "^1.2.1"
 			}
-- 
2.47.3


--- end ---
Source code is licensed under the AGPL.