Skip to content

Bump fast-xml-parser and @aws-sdk/credential-providers in /.github/actions#17

Closed
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/npm_and_yarn/dot-github/actions/multi-a2292c97b6
Closed

Bump fast-xml-parser and @aws-sdk/credential-providers in /.github/actions#17
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/npm_and_yarn/dot-github/actions/multi-a2292c97b6

Conversation

@dependabot
Copy link

@dependabot dependabot bot commented on behalf of github Mar 3, 2026

Bumps fast-xml-parser and @aws-sdk/credential-providers. These dependencies needed to be updated together.
Updates fast-xml-parser from 4.5.0 to 4.5.4

Release notes

Sourced from fast-xml-parser's releases.

Summary update on all the previous releases from v4.2.4

  • Multiple minor fixes provided in the validator and parser
  • v6 is added for experimental use.
  • ignoreAttributes support function, and array of string or regex
  • Add support for parsing HTML numeric entities
  • v5 of the application is ESM module now. However, JS is also supported

Note: Release section in not updated frequently. Please check CHANGELOG or Tags for latest release information.

Changelog

Sourced from fast-xml-parser's changelog.

Note: If you find missing information about particular minor version, that version must have been changed without any functional change in this library.

Note: Due to some last quick changes on v4, detail of v4.5.3 & v4.5.4 are not updated here. v4.5.4x is the last tag of v4 in github repository. I'm extremely sorry for the confusion

5.4.2 / 2026-03-03

  • support maxEntityCount option

5.4.1 / 2026-02-25

  • fix (#785) unpairedTag node should not have tag content

5.4.0 / 2026-02-25

  • migrate to fast-xml-builder

5.3.9 / 2026-02-25

  • support strictReservedNames

5.3.8 / 2026-02-25

  • support maxNestedTags
  • handle non-array input for XML builder when preserveOrder is true (By Angelo Coetzee)
  • save use of js properies

5.3.7 / 2026-02-20

5.3.6 / 2026-02-14

  • Improve security and performance of entity processing
    • new options maxEntitySize, maxExpansionDepth, maxTotalExpansions, maxExpandedLength, allowedTags,tagFilter
    • fast return when no edtity is present
    • improvement replacement logic to reduce number of calls

5.3.5 / 2026-02-08

  • fix: Escape regex char in entity name
  • update strnum to 2.1.2
  • add missing exports in CJS typings

5.3.4 / 2026-01-30

  • fix: handle HTML numeric and hex entities when out of range

5.3.3 / 2025-12-12

  • fix #775: transformTagName with allowBooleanAttributes adds an unnecessary attribute

5.3.2 / 2025-11-14

  • fix for import statement for v6

5.3.1 / 2025-11-03

... (truncated)

Commits
  • f8d4d42 update strnum to fix parsing issues of 0 when skiplike is used
  • ab00cdc update package bundle for minor fixes
  • 57c6187 Update ReadMe
  • caeda37 fix: emit full JSON string from CLI when no output filename specified (#710)
  • eadeb7e fix(performance): Update check for leaf node in saveTextToParentTag function ...
  • 682066c Update disclaimer
  • 280cd63 Fix null CDATA to comply with undefined behavior (#701)
  • e132656 update release detail
  • 74e2651 Fixes entity parsing when used in strict mode (#699)
  • 4082902 Fix empty tag key name for v5 (#697)
  • Additional commits viewable in compare view

Updates @aws-sdk/credential-providers from 3.658.1 to 3.1000.0

Release notes

Sourced from @​aws-sdk/credential-providers's releases.

v3.1000.0

3.1000.0(2026-02-27)

New Features
  • client-arc-region-switch: Post-Recovery Workflows enable customers to maintain comprehensive disaster recovery automation. This allows customer SREs and leadership to have complete recovery orchestration from failover through post-recovery preparation, ensuring Regions remain ready for subsequent recovery events. (3abb5202)
  • client-keyspacesstreams: Added support for Change Data Capture (CDC) streams with Duration DataType. (59b94328)
  • client-batch: This feature allows customers to specify the minimum time (in minutes) that AWS Batch keeps instances running in a compute environment after all jobs on the instance complete (25f4947a)
  • client-cognito-identity-provider: Cognito is introducing a two-secret rotation model for app clients, enabling seamless credential rotation without downtime. Dedicated APIs support passing in a custom secret. Custom secrets need to be at least 24 characters. This eliminates reconfiguration needs and reduces security risks. (582a3813)
  • client-bedrock: Added four new model lifecycle date fields, startOfLifeTime, endOfLifeTime, legacyTime, and publicExtendedAccessTime. Adds support for using the Converse API with Bedrock Batch inference jobs. (29b1fe6d)
  • client-odb: ODB Networking Route Management is a feature improvement which allows for implicit creation and deletion of EC2 Routes in the Peer Network Route Table designated by the customer via new optional input. This feature release is combined with Multiple App-VPC functionality for ODB Network Peering(s). (d372d85d)
  • client-customer-profiles: This release introduces an optional SourcePriority parameter to the ProfileObjectType APIs, allowing you to control the precedence of object types when ingesting data from multiple sources. Additionally, WebAnalytics and Device have been added as new StandardIdentifier values. (6166dfb7)
  • client-connect: Deprecate EvaluationReviewMetadata's CreatedBy and CreatedTime, add EvaluationReviewMetadata's RequestedBy and RequestedTime (df058ded)
  • client-ram: Resource owners can now specify ResourceShareConfiguration request parameter for CreateResourceShare API including RetainSharingOnAccountLeaveOrganization boolean parameter (3cc0ca9d)
  • client-health: Updates the regex for validating availabilityZone strings used in the describe events filters. (eded08f6)
  • client-transcribe-streaming: AWS Transcribe Streaming now supports specifying a resumption window for the stream through the SessionResumeWindow parameter, allowing customers to reconnect to their streams for a longer duration beyond stream start time. (56168c57)
Tests
  • clients: enable snapshots for small subset of clients (#7790) (822c995d)

For list of updated packages, view updated-packages.md in assets-3.1000.0.zip

v3.999.0

3.999.0(2026-02-26)

Chores
New Features
  • client-securityhub: Security Hub added EXTENDED PLAN integration type to DescribeProductsV2 and added metadata.product.vendor name GroupBy support to GetFindingStatisticsV2 (1d1c9825)
  • client-ec2: Add c8id, m8id and hpc8a instance types. (f49cb0c1)
  • client-ecs: Adding support for Capacity Reservations for ECS Managed Instances by introducing a new "capacityOptionType" value of "RESERVED" and new field "capacityReservations" for CreateCapacityProvider and UpdateCapacityProvider APIs. (4a7cfd05)
  • client-marketplace-entitlement-service: Added License Arn as a new optional filter for GetEntitlements and LicenseArn field in each entitlement in the response. (b884b35b)
  • client-marketplace-metering: Added LicenseArn to ResolveCustomer response and BatchMeterUsage usage records. BatchMeterUsage now accepts LicenseArn in each UsageRecord to report usage at the license level. Added InvalidLicenseException error response for invalid license parameters. (f5f5c096)
  • client-backup-gateway: This release updates GetGateway API to include deprecationDate and softwareVersion in the response, enabling customers to track gateway software versions and upcoming deprecation dates. (9dd68ddc)
  • util-user-agent-node: populate typescript version in user agent when available (#7786) (0a5ab579)

For list of updated packages, view updated-packages.md in assets-3.999.0.zip

v3.998.0

... (truncated)

Changelog

Sourced from @​aws-sdk/credential-providers's changelog.

3.1000.0 (2026-02-27)

Note: Version bump only for package @​aws-sdk/credential-providers

3.999.0 (2026-02-26)

Note: Version bump only for package @​aws-sdk/credential-providers

3.998.0 (2026-02-25)

Note: Version bump only for package @​aws-sdk/credential-providers

3.997.0 (2026-02-24)

Note: Version bump only for package @​aws-sdk/credential-providers

3.996.0 (2026-02-23)

Note: Version bump only for package @​aws-sdk/credential-providers

3.995.0 (2026-02-20)

Note: Version bump only for package @​aws-sdk/credential-providers

3.994.0 (2026-02-19)

... (truncated)

Commits

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [fast-xml-parser](https://github.com/NaturalIntelligence/fast-xml-parser) and [@aws-sdk/credential-providers](https://github.com/aws/aws-sdk-js-v3/tree/HEAD/packages/credential-providers). These dependencies needed to be updated together.

Updates `fast-xml-parser` from 4.5.0 to 4.5.4
- [Release notes](https://github.com/NaturalIntelligence/fast-xml-parser/releases)
- [Changelog](https://github.com/NaturalIntelligence/fast-xml-parser/blob/master/CHANGELOG.md)
- [Commits](NaturalIntelligence/fast-xml-parser@v4.5.0...v4.5.4)

Updates `@aws-sdk/credential-providers` from 3.658.1 to 3.1000.0
- [Release notes](https://github.com/aws/aws-sdk-js-v3/releases)
- [Changelog](https://github.com/aws/aws-sdk-js-v3/blob/main/packages/credential-providers/CHANGELOG.md)
- [Commits](https://github.com/aws/aws-sdk-js-v3/commits/v3.1000.0/packages/credential-providers)

---
updated-dependencies:
- dependency-name: fast-xml-parser
  dependency-version: 4.5.4
  dependency-type: indirect
- dependency-name: "@aws-sdk/credential-providers"
  dependency-version: 3.1000.0
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file javascript Pull requests that update javascript code labels Mar 3, 2026
@socket-security
Copy link

Warning

Review the following alerts detected in dependencies.

According to your organization's Security Policy, it is recommended to resolve "Warn" alerts. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Warn Medium
Network access: npm @smithy/service-error-classification in module globalThis["fetch"]

Module: globalThis["fetch"]

Location: Package overview

From: .github/actions/package-lock.jsonnpm/@smithy/service-error-classification@4.2.10

ℹ Read more on: This package | This alert | What is network access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should remove all network access that is functionally unnecessary. Consumers should audit network access to ensure legitimate use.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@smithy/service-error-classification@4.2.10. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Medium
Network access: npm @smithy/util-stream in module globalThis["fetch"]

Module: globalThis["fetch"]

Location: Package overview

From: .github/actions/package-lock.jsonnpm/@smithy/util-stream@4.5.15

ℹ Read more on: This package | This alert | What is network access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should remove all network access that is functionally unnecessary. Consumers should audit network access to ensure legitimate use.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@smithy/util-stream@4.5.15. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Embedded URLs or IPs: npm @aws-sdk/client-cognito-identity

URLs: https://cognito-identity-fips.us-east-1.amazonaws.com, https://cognito-identity-fips.us-east-2.amazonaws.com, https://cognito-identity-fips.us-west-1.amazonaws.com, https://cognito-identity-fips.us-west-2.amazonaws.com, amazonaws.com, http://cognito-identity.amazonaws.com/doc/2014-06-30/, https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-smithy-util-retry/Enum/RETRY_MODES/, https://docs.aws.amazon.com/cognito/latest/developerguide/authentication-flow.html, https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-identity.html, https://docs.aws.amazon.com/cognito/latest/developerguide/external-identity-providers.html

Location: Package overview

From: .github/actions/package-lock.jsonnpm/@aws-sdk/client-cognito-identity@3.1000.0

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@aws-sdk/client-cognito-identity@3.1000.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Embedded URLs or IPs: npm @aws-sdk/core with https://a.co/c895JFp

URLs: https://a.co/c895JFp

Location: Package overview

From: .github/actions/package-lock.jsonnpm/@aws-sdk/core@3.973.15

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@aws-sdk/core@3.973.15. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Embedded URLs or IPs: npm @aws-sdk/credential-provider-http

URLs: http://169.254.170.2, 127.0.0.0/8, 169.254.170.2, 169.254.170.23

Location: Package overview

From: .github/actions/package-lock.jsonnpm/@aws-sdk/credential-provider-http@3.972.15

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@aws-sdk/credential-provider-http@3.972.15. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Environment variable access: npm @aws-sdk/credential-provider-login reads AWS_REGION

Env Vars: AWS_REGION

Location: Package overview

From: .github/actions/package-lock.jsonnpm/@aws-sdk/credential-provider-login@3.972.13

ℹ Read more on: This package | This alert | What is environment variable access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should be clear about which environment variables they access, and care should be taken to ensure they only access environment variables they claim to.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@aws-sdk/credential-provider-login@3.972.13. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Environment variable access: npm @aws-sdk/credential-provider-login reads AWS_LOGIN_CACHE_DIRECTORY

Env Vars: AWS_LOGIN_CACHE_DIRECTORY

Location: Package overview

From: .github/actions/package-lock.jsonnpm/@aws-sdk/credential-provider-login@3.972.13

ℹ Read more on: This package | This alert | What is environment variable access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should be clear about which environment variables they access, and care should be taken to ensure they only access environment variables they claim to.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@aws-sdk/credential-provider-login@3.972.13. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Embedded URLs or IPs: npm @aws-sdk/credential-providers

URLs: graph.facebook.com, www.amazon.com, accounts.google.com, api.twitter.com, www.digits.com, https://d-abc123.awsapps.com/start, https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html

Location: Package overview

From: .github/actions/package-lock.jsonnpm/@aws-sdk/credential-providers@3.1000.0

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@aws-sdk/credential-providers@3.1000.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Environment variable access: npm @aws-sdk/credential-providers reads AWS_PROFILE

Env Vars: AWS_PROFILE

Location: Package overview

From: .github/actions/package-lock.jsonnpm/@aws-sdk/credential-providers@3.1000.0

ℹ Read more on: This package | This alert | What is environment variable access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should be clear about which environment variables they access, and care should be taken to ensure they only access environment variables they claim to.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@aws-sdk/credential-providers@3.1000.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Embedded URLs or IPs: npm @aws-sdk/nested-clients

URLs: https://sts.amazonaws.com/doc/2011-06-15/, signin.aws.amazon.com, signin.amazonaws.cn, signin.amazonaws-us-gov.com, amazonaws.com, https://portal.sso-fips., https://portal.sso., http://cognito-identity.amazonaws.com/doc/2014-06-30/, https://sts.amazonaws.com, https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-smithy-util-retry/Enum/RETRY_MODES/, https://tools.ietf.org/html/rfc8628, https://docs.aws.amazon.com/singlesignon/latest/userguide/configure-user-session.html, https://docs.aws.amazon.com/singlesignon/latest/PortalAPIReference/API_GetRoleCredentials.html, https://docs.aws.amazon.com/singlesignon/latest/userguide/what-is.html, https://cognito-identity-fips.us-east-1.amazonaws.com, https://cognito-identity-fips.us-east-2.amazonaws.com, https://cognito-identity-fips.us-west-1.amazonaws.com, https://cognito-identity-fips.us-west-2.amazonaws.com, https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp.html, https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html, https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html, https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session, https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html, https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html, https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html, https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining, https://docs.aws.amazon.com/IAM/latest/UserGuide/MFAProtectedAPI.html, https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length, https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html#sts-regions-activate-deactivate, https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-identity.html, http://aws.amazon.com/sdkforios/, http://aws.amazon.com/sdkforandroid/, https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_update-role-settings.html#id_roles_update-session-duration, https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html, https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_adding-assume-role-idp, https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length, http://openid.net/specs/openid-connect-core-1_0.html#Claims, http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes, https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html, https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity, www.amazon.com, client.5498841531868486423.1548@apps.example.com, https://docs.aws.amazon.com/singlesignon/latest/OIDCAPIReference/Welcome.html, https://docs.aws.amazon.com/cognito/latest/developerguide/authentication-flow.html, https://docs.aws.amazon.com/cognito/latest/developerguide/external-identity-providers.html, https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html, https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html, https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds, https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname, https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_enable-console-custom-url.html, https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_ctlogs, https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user_externalid.html, https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#iam-term-role-chaining, https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourceidentity, https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html, https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies-cross-account-resource-access.html, https://docs.aws.amazon.com/cognito/latest/developerguide/iam-roles.html#trust-policies, https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session, https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#id_roles_terms-and-concepts, https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-using-tokens-with-identity-providers.html, https://docs.aws.amazon.com/singlesignon/latest/userguide/what-is.html#renamed, http://aws.amazon.com/tools/, https://docs.aws.amazon.com/singlesignon/latest/OIDCAPIReference/API_CreateToken.html, https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_use-resources.html

Location: Package overview

From: .github/actions/package-lock.jsonnpm/@aws-sdk/nested-clients@3.996.3

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@aws-sdk/nested-clients@3.996.3. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Environment variable access: npm @aws-sdk/token-providers

Location: Package overview

From: .github/actions/package-lock.jsonnpm/@aws-sdk/token-providers@3.999.0

ℹ Read more on: This package | This alert | What is environment variable access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should be clear about which environment variables they access, and care should be taken to ensure they only access environment variables they claim to.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@aws-sdk/token-providers@3.999.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Embedded URLs or IPs: npm @aws-sdk/util-endpoints

URLs: amazonaws.com, api.aws, amazonaws.com.cn, api.amazonwebservices.com.cn, amazonaws.eu, api.amazonwebservices.eu, c2s.ic.gov, api.aws.ic.gov, sc2s.sgov.gov, cloud.adc-e.uk, api.cloud-aws.adc-e.uk, csp.hci.ic.gov, api.aws.hci.ic.gov

Location: Package overview

From: .github/actions/package-lock.jsonnpm/@aws-sdk/util-endpoints@3.996.3

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@aws-sdk/util-endpoints@3.996.3. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Environment variable access: npm @aws/lambda-invoke-store

Location: Package overview

From: .github/actions/package-lock.jsonnpm/@aws/lambda-invoke-store@0.2.3

ℹ Read more on: This package | This alert | What is environment variable access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should be clear about which environment variables they access, and care should be taken to ensure they only access environment variables they claim to.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@aws/lambda-invoke-store@0.2.3. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Environment variable access: npm @aws/lambda-invoke-store reads AWS_LAMBDA_BENCHMARK_MODE

Env Vars: AWS_LAMBDA_BENCHMARK_MODE

Location: Package overview

From: .github/actions/package-lock.jsonnpm/@aws/lambda-invoke-store@0.2.3

ℹ Read more on: This package | This alert | What is environment variable access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should be clear about which environment variables they access, and care should be taken to ensure they only access environment variables they claim to.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@aws/lambda-invoke-store@0.2.3. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Embedded URLs or IPs: npm @smithy/config-resolver

URLs: https://github.com/aws/aws-sdk-js-v3/blob/main/supplemental-docs/CLIENTS.md.

Location: Package overview

From: .github/actions/package-lock.jsonnpm/@smithy/config-resolver@4.4.9

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@smithy/config-resolver@4.4.9. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Embedded URLs or IPs: npm @smithy/credential-provider-imds

URLs: https://docs.aws.amazon.com/sdkref/latest/guide/feature-static-credentials.html, 169.254.170.2, 127.0.0.1, http://169.254.169.254

Location: Package overview

From: .github/actions/package-lock.jsonnpm/@smithy/credential-provider-imds@4.2.10

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@smithy/credential-provider-imds@4.2.10. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Embedded URLs or IPs: npm @smithy/node-http-handler

URLs: https://docs.aws.amazon.com/sdk-for-javascript/v3/developer-guide/node-configuring-maxsockets.html

Location: Package overview

From: .github/actions/package-lock.jsonnpm/@smithy/node-http-handler@4.4.12

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@smithy/node-http-handler@4.4.12. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Embedded URLs or IPs: npm @smithy/smithy-client

URLs: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html

Location: Package overview

From: .github/actions/package-lock.jsonnpm/@smithy/smithy-client@4.12.0

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@smithy/smithy-client@4.12.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Embedded URLs or IPs: npm @smithy/types

URLs: https://github.com/aws/aws-sdk-js-v3/blob/main/packages/smithy-client/src/client.ts, https://smithy.io/2.0/spec/simple-types.html

Location: Package overview

From: .github/actions/package-lock.jsonnpm/@smithy/types@4.13.0

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@smithy/types@4.13.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Embedded URLs or IPs: npm bowser

URLs: Webz.io, You.com, 1.10.2.1, 1.010.2.1

Location: Package overview

From: .github/actions/package-lock.jsonnpm/bowser@2.14.1

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/bowser@2.14.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Potential code anomaly (AI signal): npm fast-xml-parser is 100.0% likely to have a medium risk anomaly

Notes: This XMLParser module is not inherently malicious, but it exposes a potential XXE risk by allowing external entities to be injected into the underlying parser. The combination of external entity support and direct parsing paths means downstream parsing could fetch resources or exfiltrate data depending on the XML content. Additionally, a bug in parse(xmlData) introduces a recursive path that can cause a stack overflow for certain inputs. These issues warrant caution: disable external entities unless necessary, validate inputs more strictly, and fix the recursion bug.

Confidence: 1.00

Severity: 0.60

From: .github/actions/package-lock.jsonnpm/fast-xml-parser@5.3.6

ℹ Read more on: This package | This alert | What is an AI-detected potential code anomaly?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: An AI system found a low-risk anomaly in this package. It may still be fine to use, but you should check that it is safe before proceeding.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/fast-xml-parser@5.3.6. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Embedded URLs or IPs: npm fast-xml-parser

URLs: https://www.w3.org/TR/xml/#dt-charref, http://normal-website.com

Location: Package overview

From: .github/actions/package-lock.jsonnpm/fast-xml-parser@5.3.6

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/fast-xml-parser@5.3.6. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

@dependabot @github
Copy link
Author

dependabot bot commented on behalf of github Mar 7, 2026

Superseded by #18.

@dependabot dependabot bot closed this Mar 7, 2026
@dependabot dependabot bot deleted the dependabot/npm_and_yarn/dot-github/actions/multi-a2292c97b6 branch March 7, 2026 01:35
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file javascript Pull requests that update javascript code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants