Skip to content

Conversation

@RinZ27
Copy link

@RinZ27 RinZ27 commented Feb 8, 2026

Updating dependencies and hardening components to improve overall security.

I've implemented the following changes:

  • Patched orjson to address CVE-2025-67221. I noticed the project was using version 3.10.15, which is vulnerable to recursion-based DoS. Bumping it to >=3.11.5 mitigates this risk.
  • Refactored transformPastedHTML in message-input.tsx to use DOMParser instead of innerHTML. This provides a more secure way to strip HTML and prevents potential Self-XSS when pasting content.
  • Updated Dockerfile to use a non-root user. Running the application as appuser follows container security best practices and limits the attack surface.

These modifications ensure the project aligns with modern security standards while maintaining existing functionality. Verified the changes locally with uv sync.

@CLAassistant
Copy link

CLAassistant commented Feb 8, 2026

CLA assistant check
All committers have signed the CLA.

@RinZ27 RinZ27 changed the title security: patch orjson DoS vulnerability and harden frontend/container security: patch orjson DoS and harden frontend/container security Feb 8, 2026
@RinZ27 RinZ27 force-pushed the fix/security-hardening-updates branch from 77bdd30 to 3aa7818 Compare February 8, 2026 10:11
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants