Skip to content

Bump aiohttp from 3.8.4 to 3.13.3#2

Open
dependabot[bot] wants to merge 1 commit intomasterfrom
dependabot/pip/aiohttp-3.13.3
Open

Bump aiohttp from 3.8.4 to 3.13.3#2
dependabot[bot] wants to merge 1 commit intomasterfrom
dependabot/pip/aiohttp-3.13.3

Conversation

@dependabot
Copy link
Copy Markdown

@dependabot dependabot bot commented on behalf of github Mar 1, 2026

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

---
updated-dependencies:
- dependency-name: aiohttp
  dependency-version: 3.13.3
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file python Pull requests that update python code labels Mar 1, 2026
@socket-security
Copy link
Copy Markdown

Review the following changes in direct dependencies. Learn more about Socket for GitHub.

Diff Package Supply Chain
Security
Vulnerability Quality Maintenance License
Updatedaiohttp@​3.8.4 ⏵ 3.13.397100 +41100100100
Updatedaiosignal@​1.3.1 ⏵ 1.4.0100100100 +2100100
Addedaiohappyeyeballs@​2.6.1100100100100100
Addedtyping-extensions@​4.15.0100100100100100
Updatedyarl@​1.8.2 ⏵ 1.22.0100 +1100100100100
Addedpropcache@​0.4.1100100100100100

View full report

@socket-security
Copy link
Copy Markdown

Warning

Review the following alerts detected in dependencies.

According to your organization's Security Policy, it is recommended to resolve "Warn" alerts. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Warn Medium
Network access: pypi aiohappyeyeballs

Location: Package overview

From: poetry.lockpypi/aiohappyeyeballs@2.6.1

ℹ Read more on: This package | This alert | What is network access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should remove all network access that is functionally unnecessary. Consumers should audit network access to ensure legitimate use.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/aiohappyeyeballs@2.6.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Medium
Native binaries present: pypi propcache

Location: Package overview

From: poetry.lockpypi/propcache@0.4.1

ℹ Read more on: This package | This alert | Why is native code a concern?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Verify that the inclusion of native code is expected and necessary for this package's functionality. If it is unnecessary or unexpected, consider using alternative packages without native code to mitigate potential risks.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/propcache@0.4.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Medium
Dynamic code execution: pypi propcache

Location: Package overview

From: poetry.lockpypi/propcache@0.4.1

ℹ Read more on: This package | This alert | What is dynamic code execution?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Avoid packages that use dynamic code execution like eval(), since this could potentially execute any code.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/propcache@0.4.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Medium
Dynamic code execution: pypi typing-extensions

Location: Package overview

From: poetry.lockpypi/typing-extensions@4.15.0

ℹ Read more on: This package | This alert | What is dynamic code execution?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Avoid packages that use dynamic code execution like eval(), since this could potentially execute any code.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/typing-extensions@4.15.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Medium
System shell access: pypi typing-extensions

Location: Package overview

From: poetry.lockpypi/typing-extensions@4.15.0

ℹ Read more on: This package | This alert | What is shell access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should avoid accessing the shell which can reduce portability, and make it easier for malicious shell access to be introduced.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/typing-extensions@4.15.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Medium
Dynamic code execution: pypi yarl

Location: Package overview

From: poetry.lockpypi/yarl@1.22.0

ℹ Read more on: This package | This alert | What is dynamic code execution?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Avoid packages that use dynamic code execution like eval(), since this could potentially execute any code.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/yarl@1.22.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Embedded URLs or IPs: pypi aiohappyeyeballs

URLs: https://github.com/python/cpython/issues/87131, https://github.com/python/cpython/blob/e44eebfc1eccdaaebc219accbfc705c9a9de068d/Lib/asyncio/selector_events.py#L271

Location: Package overview

From: poetry.lockpypi/aiohappyeyeballs@2.6.1

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/aiohappyeyeballs@2.6.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Embedded URLs or IPs: pypi aiohttp

URLs: https://github.com/aio-libs/aiohttp/pull/1453, https://github.com/aio-libs/aiohttp/issues/11632, https://github.com/aio-libs/aiohttp/issues/7993, http://python.org/, https://www.python.org/, https://github.com/requests/requests/blob/v2.18.4/requests/auth.py, https://github.com/python/cpython/pull/118960, https://en.wikipedia.org/wiki/HTTP_Public_Key_Pinning, https://bugs.python.org/issue37179, https://github.com/python/cpython/pull/28073, https://docs.aiohttp.org/en/stable/, https://github.com/aio-libs/aiohttp/discussions/6044, https://docs.aiohttp.org/en/stable/client_advanced.html#proxy-support, https://docs.python.org/3/library/asyncio-eventloop.html, http://httpbin.org/post, https://docs.aiohttp.org/en/stable/web_advanced.html, http://docs.aiohttp.org/en/stable/logging.html, http://docs.pytest.org/en/latest/, http://docs.python.org/3, https://multidict.readthedocs.io/en/stable/, https://propcache.aio-libs.org/en/stable, https://yarl.readthedocs.io/en/stable/, https://aiosignal.readthedocs.io/en/stable/, https://aiohttp-jinja2.readthedocs.io/en/stable/, https://aiohttp-remotes.readthedocs.io/en/stable/, https://aiohttp-session.readthedocs.io/en/stable/, https://aiohttp-demos.readthedocs.io/en/latest/, https://aiojobs.readthedocs.io/en/stable/, https://aiohappyeyeballs.readthedocs.io/en/latest/, https://python-isal.readthedocs.io/en/stable/, https://python-zlib-ng.readthedocs.io/en/stable/, https://github.com, http://docs.aiohttp.org/en/stable/, https://codecov.io/github/, https://badge.fury.io/py/, https://badges.gitter.im/Join%20Chat.svg, https://gitter.im/, http://httpbin.org/basic-auth/andrew/password, http://httpbin.org/get, https://httpbin.org/digest-auth/, https://graph.facebook.com/v2.7/12345678901234567/, https://graph.facebook.com/v2.7/me, https://graph.facebook.com/v2.7/me/friends, http://127.0.0.1:8080/, http://127.0.0.1:9001, https://github.com/aio-libs/aiohttp/issues/3572, https://unix.stackexchange.com/a/367012/27133, http://127.0.0.1, http://python.org, http://example.com, https://github.com/sanitizers/octomachinery/blob/be18b54/tests/circular_imports_test.py, https://github.com/pytest-dev/pytest/blob/d18c75b/testing/test_meta.py, https://twitter.com/codewithanthony/status/1229445110510735361, https://github.com/pytest-dev/pytest/issues/10763, ftp://127.0.0.1/test/, http://0.0.0.0:1, http://example.org:non_int_port/, http://host1.com/path1, http://host2.com/path2, https://host1.com/path1, http://host1.com/path2, http://host1.com, http://non-existing.example.com, http://wrong-dns-name.com, http://example.com:999999/path, ftp://example.com/file, http://www.amazon.it, https://blocked.example.com/, https://evil.com/path, https://blocked.domain.tld/, http://example.com/resource, http://example.com/path, http://example.com/test, http://example.com/app1, http://example.com/app1/, http://example.com/app1/resource, http://example.com/app1/sub/path, http://example.com/app1xx, http://example.com/app123, http://example.com/, http://example.com/anything, https://example.com/app1, http://other.com/app1, http://example.com:8080/app1, http://example.com/api, http://example.com/admin/, http://example.com/secure/area, http://example.com/api/v1, http://example.com/admin/panel, http://example.com/secure/area/resource, http://example.com/apiv2, http://example.com/admin, http://example.com/secure, http://example.com/other, https://github.com/aio-libs/aiodocker/issues/920, http://def-cl-resp.org, http://python.org/#urlfragment, https://python.org/, http://python.org:960/, https://python.org:960/, http://python.org:123e/, http://python.org:80/, http://python.org:99/, http://xn--9caa.com, http://127.0.0.2, http://127.0.0.2:99, http://python.org.:99, http://python.org...:99, https://python.org, http://0.0.0.0/get/test, http://0.0.0.0/get/test%2fcase, http://0.0.0.0/get/test%20case, http://0.0.0.0/get/:=+/%2B/, http://example.com/path#fragment, http://example.com/path?a=b, http://example.com/path?key=value#fragment, http://example.com/path?key=value&a=b, http://example.com/path?key=value, http://test.com/path, http://python.org/?foo=f%C3%B8%C3%B8, http://python.org/?f%C3%B8%C3%B8=f%C3%B8%C3%B8, http://python.org/?foo=foo, http://python.org/%C3%B8?foo=foo, http://python.org/?test=foo&test=baz, http://python.org/?test=foo, http://python.org/?test=f+oo, http://example.com/path/to, http://proxy.example.com, http://example.org, http://test.example.com/, http://del-cl-resp.org, http://fake-host.org/, http://fake-host.org/%CE%BB, http://fake-host.org/path, http://def-cl-resp.org/index.htm, http://def-cl-resp.org/#urlfragment, http://def-cl-resp.org/, http://example.com/page/1.html, http://def-cl-resp.org/relative/path, http://test.example.com, http://opt.example.com, http://head.example.com, http://post.example.com, http://put.example.com, http://patch.example.com, http://delete.example.com, http://proxy.com, http://proxy.example2.com, http://example.com/test1/, http://example.com/test1/test2, http://example.com/test2, http://example.com/test1/test2?q=foo#bar, http://foo.com/bar, http://foo.com, http://test.org, https://example.org/page.html, https://127.0.0.1:443, https://mocked.host, http://mocked.host, http://www.python.org, https://example.com, http://127.0.0.1/, http://this-does-not-matter.com, https://127.0.0.1, https://example.com/, http://xn--9caa.com/, http://pathtest.com/one/two/, http://pathtest.com/one/two, http://pathtest.com/one/two/three/, http://test1.example.com/, http://pathtest.com/, http://1.2.3.4/, http://www.example.com, http://www.example.com/, http://different.example.com/, http://different.org/, http://foo.example.com/, http://secure.com/, https://secure.com/, http://pathtest.com/one/, http://pathtest.com/hundred/, http://expirestest.com/, http://maxagetest.com/, http://invalid-values.com/, http://pathtest.com/one, http://pathtest.com/second, http://any.com/, http://127.0.0.1/index.html, https://github.com/aio-libs/aiohttp/issues/11052, https://example.com/path, https://secure.example.com/app/page, https://secure.example.com/, https://secure.example.com/app/, http://secure.example.com/app/, http://test.org/, http://192.168.1.1/, http://aiohttp.io/path, https://aiohttp.io/path, http://example.com,http://proxy.org, https://www.google.com/path/to.html, https://github.com/aio-libs/aiohttp/issues/6197, https://www.python.org, http://aiohttp.io/path?query=yes, http://aiohttp.io:2561/space, https://www.google.com.ua/search?q=aiohttp, https://secure.aiohttp.io:2242/path, https://secure.aiohttp.io/path, https://example.com/test, http://warning.or.kr/, http://example.com/redirector, https://bitbucket.org/pypy/pypy/issues/1187/call-to-isinstance-in-sub-self-other, https://github.com/celery/celery/issues/811, https://stackoverflow.com/a/46102240/595220, https://example.com/path/to?a=1, http://example.com:8123/path, https://datatracker.ietf.org/doc/html/rfc7230#section-3.3.2, https://datatracker.ietf.org/doc/html/rfc7232#section-4.1, http://0.0.0.0:8080, http://python.org/logo.png, https://github.com/aio-libs/aiohttp/issues/11725

Location: Package overview

From: poetry.lockpypi/aiohttp@3.13.3

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/aiohttp@3.13.3. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Environment variable access: pypi aiohttp

Location: Package overview

From: poetry.lockpypi/aiohttp@3.13.3

ℹ Read more on: This package | This alert | What is environment variable access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should be clear about which environment variables they access, and care should be taken to ensure they only access environment variables they claim to.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/aiohttp@3.13.3. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Embedded URLs or IPs: pypi aiohttp

URLs: https://github.com/aio-libs/aiohttp/pull/1453, https://github.com/aio-libs/aiohttp/issues/11632, https://github.com/aio-libs/aiohttp/issues/7993, http://python.org/, https://www.python.org/, https://github.com/requests/requests/blob/v2.18.4/requests/auth.py, https://github.com/python/cpython/pull/118960, https://en.wikipedia.org/wiki/HTTP_Public_Key_Pinning, https://bugs.python.org/issue37179, https://github.com/python/cpython/pull/28073, https://docs.aiohttp.org/en/stable/, https://github.com/aio-libs/aiohttp/discussions/6044, https://docs.aiohttp.org/en/stable/client_advanced.html#proxy-support, https://docs.python.org/3/library/asyncio-eventloop.html, http://httpbin.org/post, https://docs.aiohttp.org/en/stable/web_advanced.html, http://docs.aiohttp.org/en/stable/logging.html

Location: Package overview

From: poetry.lockpypi/aiohttp@3.13.3

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/aiohttp@3.13.3. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Filesystem access: pypi propcache

Location: Package overview

From: poetry.lockpypi/propcache@0.4.1

ℹ Read more on: This package | This alert | What is filesystem access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: If a package must read the file system, clarify what it will read and ensure it reads only what it claims to. If appropriate, packages can leave file system access to consumers and operate on data passed to it instead.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/propcache@0.4.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Embedded URLs or IPs: pypi propcache

URLs: https://docs.python.org/3, https://github.com, https://peps.python.org/pep-, https://github.com/sponsors/, https://github.com/aio-libs/propcache/issues/, https://github.com/aio-libs/propcache/pull/, https://github.com/aio-libs/propcache/commit/

Location: Package overview

From: poetry.lockpypi/propcache@0.4.1

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/propcache@0.4.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Embedded URLs or IPs: pypi typing-extensions

URLs: https://github.com/python/cpython/issues/90649, https://github.com/python/cpython/issues/90834, https://docs.python.org/3/library/inspect.html#inspect.get_annotations

Location: Package overview

From: poetry.lockpypi/typing-extensions@4.15.0

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/typing-extensions@4.15.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Filesystem access: pypi typing-extensions

Location: Package overview

From: poetry.lockpypi/typing-extensions@4.15.0

ℹ Read more on: This package | This alert | What is filesystem access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: If a package must read the file system, clarify what it will read and ensure it reads only what it claims to. If appropriate, packages can leave file system access to consumers and operate on data passed to it instead.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/typing-extensions@4.15.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Embedded URLs or IPs: pypi typing-extensions

URLs: https://docs.python.org/3/library/inspect.html#inspect.get_annotations

Location: Package overview

From: poetry.lockpypi/typing-extensions@4.15.0

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/typing-extensions@4.15.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Embedded URLs or IPs: pypi yarl

URLs: https://docs.python.org/3, https://multidict.aio-libs.org/en/stable, https://propcache.aio-libs.org/en/stable, https://github.com, https://peps.python.org/pep-, https://github.com/sponsors/, https://github.com/aio-libs/yarl/issues/, https://github.com/aio-libs/yarl/pull/, https://github.com/aio-libs/yarl/commit/, https://url.spec.whatwg.org/#percent-encoded-bytes, https://github.com/aio-libs/yarl/pull/216, https://github.com/aio-libs/yarl/pull/214, https://github.com/aio-libs/yarl/pull/7, http://example.com/, https://www.domain, http://127.0.0, http://www.domain.tld, http://www.domain.tld:1234, http://www.domain.tld?query=1&query=2&query=3&query=4&query=5, http://www.domain.tld?query=1&query=2&query=3&query=4&query=5&query=6&query=7, http://www.domain.tld/req, http://www.domain.tld:1234/req, http://127.0.0.1:1234/req, http://127.0.0.1/req, http://example.com, http://example.com/?a=1, http://example.com/?foo=bar, http://example.com/?foo=bar&baz=foo, http://example.com/?b=3, http://example.com/?a=b, http://example.com/?a=, http://example.com/?a=1&b=2, http://example.com/?b=2, http://example.com/path, http://example.com/path?a=1, http://example.com/path?a=84, http://example.com/path?a=1.1, http://example.com/path?a=b&c=d, http://example.com/path?a=b, http://example.com/get, http://example.com/?game=bulls+%26+cows, http://example.com/path?a=1&a=2, http://example.com/path?a=3&a=4, http://example.com/?foo=bar&baz=foo&%F0%9D%95%A6=%F0%9D%95%A6, http://example.com/?a=3&b=2, http://example.com/foo?a=1, http://example.com/?a=2, http://example.com/?a=2&a=1, http://example.com/?foo=bar&baz=original, http://example.com/?foo=bar&baz=original&baz=foo, http://example.com/?a=original, http://example.com/?foo=bar&baz=foo&, http://example.com:8888/path/to?a=1&b=2, http://example.com:8888, http://xn----8sb1bdhvc.xn--j1amh:8888, http://example.com/path/../to, http://example.com/to, http://example.com:8888/, http://xn--gnter-4ya.com, https://example.com, http://example.com:80, http://example.com:8080, http://x-----xn1agdj.tld, http://xn--d.tld, http://abc_def.com, http://127.0.0.1:80, http://host.com/path, http://gitHUB.com, http://1.2.3.4%, http://example.com:0, http://example.com/path/to, http://example.com/a, http://example.com/foo/bar%2fbaz, http://example.com/foo/bar%252Fbaz, http://example.com/path:abc@123, http://example.com?a=1&b=2, http://example.com?, http://example.com/?, http://example.com/path?, http://example.com?a+b=c+d&e=f+g, http://example.com/path#anchor, http://example.com/path#, http://example.com/path#a?b/c:d@e, http://example.com/path%2Fto/three, http://example.com/path%2fto/three, http://example.com/path/to#frag, http://example.com/#frag, http://example.com/path/to.txt#frag, http://example.com/.hgrc, http://example.com/doc.tar.gz, http://example.com/doc, http://example.com/test/x+y%2Bz/:+%2B/, http://example.com/?f%C3%B8%C3%B8=f%C3%B8%C3%B8, http://example.com/?k%25cf%2580=v%25cf%2580, http://example.com/path/to?a=b, http://example.com/path/, http://example.com/path/ham, http://example.com/path?a=1#frag, http://example.com/base, http://example.com/path/to/, http://example.com/../../c, http://example.com/test, http://example.com/%CF%80, http://example.com/%25cf%2580, http://example.com/%cf%80, http://example.com/test/, http://example.com?a=b, http://example.com#frag, http://example.com?a=b#frag, http://example.com/test?a=b, http://example.com/test#frag, http://example.com/test?a=b#frag, http://example.com/#a:b?c@d/e, http://example.com/#%25cf%2580, http://example.com/path#frag, http://example.com/a/b, http://example.com/path/to?a=b#frag, http://example.com/path/newname?a=b, http://example.com/path/newname#frag, http://example.com/path/newname?a=b#frag, http://example.com/path/newname, http://example.com/oldpath, http://example.com/path/to.txt?a=b#frag, http://example.com/path/to.md?a=b, http://example.com/path/to.md#frag, http://example.com/path/to.md?a=b#frag, http://example.com/path/to.md, http://xn--jxagkqfkduily1i.eu, http://xn--einla-pqa.de/, http://example.com/%D1%88%D0%BB%D1%8F%D1%85/%D1%82%D1%83%D0%B4%D0%B8, http://example.com/?%D0%BF=%D0%B7&%D1%8E=%D0%B1, http://example.com/#, http://xn--jxagkqfkduily1i.eu/, http://example.com/path%2Fto, http://example.com/?%26=%3D, HTTP://example.com, http://go.to/path/to, http://go.to/path, http://go.to/, http://example.com/path?a=, http://www.python.org/%7Eguido, http://www.python.org/~guido, http://www.python.org/%7eguido, http://www.cwi.nl/%7Eguido/Python.html, http://www.cwi.nl/~guido/FAQ.html, https://web.archive.org/web/, https://github.com/aio-libs/yarl, https://web.archive.org/web/https://github.com/aio-libs/yarl, https://web.archive.org/web/https://github.com/, https://x.org/, https://x.org/?text=Hello+G%C3%BCnter, http://x.org, https://x.org#fragment, http://example.com/path?qs#frag, http://example.com/path?qs#frag%2F%2D, http://example.com/path?http://example.com/p?a#b, http://example.com/p?a, http://example.com/path#http://example.com/p?a, http://127.0.0.1/?next=http%3A//example.com/, http://127.0.0.1/?next=http://example.com/, http://127.0.0.1:62869, http://127.0.0.1, http://127.0.0.1:8080, http://example.com?a=, http://example.com?a+b=c+d, http://example.com?a=1&b=2&a=3, http://example.com?foo=, http://example.com?bar=, http://base.place?, http://test_url.aha?, http://127.0.0.1/?a=10&b=20, http://127.0.0.1/?a=10%26b=20, http://127.0.0.1/?a=10%3Bb=20, http://127.0.0.1/?a=10, http://example1.com/, http://example2.com/, https://foo.com:8080/path, http://127.0.0.1/?arg=value1, http://127.0.0.1/, http://xn----8sb1bdhvc.xn--j1amh, http://example.com/path_with_leading_slash, http://example.com:123, http://example.org:123, http://example.com:88, https://example.com:88, http://example.com:81, https://example.com:80, http://example.com/?a=1#frag, http://example.com:8888/?a=1#frag, http://python.org, http://python.org:80, https://datatracker.ietf.org/doc/html/rfc3986#section-3.2.2, https://127.0.0.1:8443, https://datatracker.ietf.org/doc/html/rfc3986#section-3.2.3, http://example.com.:80, http://example.com/?a=1&b=2&a=3&c=4, http://example.com/?a=3&b=2&c=4

Location: Package overview

From: poetry.lockpypi/yarl@1.22.0

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/yarl@1.22.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Filesystem access: pypi yarl

Location: Package overview

From: poetry.lockpypi/yarl@1.22.0

ℹ Read more on: This package | This alert | What is filesystem access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: If a package must read the file system, clarify what it will read and ensure it reads only what it claims to. If appropriate, packages can leave file system access to consumers and operate on data passed to it instead.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/yarl@1.22.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Low
Embedded URLs or IPs: pypi yarl

URLs: http://python.org, http://python.org:80, https://datatracker.ietf.org/doc/html/rfc3986#section-3.2.2, http://example.com:8080, http://example.com:80, https://127.0.0.1:8443, https://datatracker.ietf.org/doc/html/rfc3986#section-3.2.3, http://example.com.:80, http://example.com/?a=1&b=2, http://example.com/?a=1&b=2&a=3&c=4, http://example.com/?a=3&b=2&c=4

Location: Package overview

From: poetry.lockpypi/yarl@1.22.0

ℹ Read more on: This package | This alert | What are URL strings?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Review all remote URLs to ensure they are intentional, pointing to trusted sources, and not being used for data exfiltration or loading untrusted code at runtime.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/yarl@1.22.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file python Pull requests that update python code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants