Skip to content

Bump CrispyWaffle and Sankhya#426

Merged
guibranco merged 3 commits intomainfrom
dependabot/nuget/Src/EditoraInovacao.Sankhya.Entities/multi-02ba0b6e66
Apr 13, 2026
Merged

Bump CrispyWaffle and Sankhya#426
guibranco merged 3 commits intomainfrom
dependabot/nuget/Src/EditoraInovacao.Sankhya.Entities/multi-02ba0b6e66

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot Bot commented on behalf of github Apr 13, 2026

Updated CrispyWaffle from 10.0.1355 to 10.0.1513.

Release notes

Sourced from CrispyWaffle's releases.

10.0.1513

Release of CrispyWaffle - v10.0.1513

10.0.1485

Release of CrispyWaffle - v10.0.1485

10.0.1477

Release of CrispyWaffle - v10.0.1477

10.0.1476

Release of CrispyWaffle - v10.0.1476

10.0.1447

Release of CrispyWaffle - v10.0.1447

10.0.1437

Release of CrispyWaffle - v10.0.1437

10.0.1407

Release of CrispyWaffle - v10.0.1407

10.0.1372

Release of CrispyWaffle - v10.0.1372

Commits viewable in compare view.

Updated Sankhya from 5.0.768 to 5.0.805.

Release notes

Sourced from Sankhya's releases.

No release notes found for this version range.

Commits viewable in compare view.

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps CrispyWaffle from 10.0.1355 to 10.0.1513
Bumps Sankhya from 5.0.768 to 5.0.805

---
updated-dependencies:
- dependency-name: CrispyWaffle
  dependency-version: 10.0.1513
  dependency-type: direct:production
  update-type: version-update:semver-patch
- dependency-name: Sankhya
  dependency-version: 5.0.805
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
@guibranco guibranco enabled auto-merge (squash) April 13, 2026 07:35
@gstraccini gstraccini Bot added the ☑️ auto-merge Automatic merging of pull requests (gstraccini-bot) label Apr 13, 2026
@github-actions github-actions Bot added the size/M Denotes a PR that changes 30-99 lines, ignoring generated files. label Apr 13, 2026
Copy link
Copy Markdown
Member

@guibranco guibranco left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Automatically approved by gstraccini[bot]

@gstraccini gstraccini Bot added the 🤖 bot Automated processes or integrations label Apr 13, 2026
@socket-security
Copy link
Copy Markdown

socket-security Bot commented Apr 13, 2026

Review the following changes in direct dependencies. Learn more about Socket for GitHub.

Diff Package Supply Chain
Security
Vulnerability Quality Maintenance License
Addedcrispywaffle@​10.0.15139410090100100
Addedcrispywaffle.configuration@​10.0.15139910090100100
Addedsankhya@​5.0.8059210090100100
Addedsystem.io.pipelines@​10.0.51001009010070
Addedsystem.text.encodings.web@​10.0.51001009010070
Addedsystem.text.json@​10.0.51001009010070
Updatedmicrosoft.bcl.asyncinterfaces@​10.0.3 ⏵ 10.0.51001009010070

View full report

@socket-security
Copy link
Copy Markdown

socket-security Bot commented Apr 13, 2026

Caution

Review the following alerts detected in dependencies.

According to your organization's Security Policy, you must resolve all "Block" alerts before proceeding. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Block Medium
Dynamic code execution: nuget crispywaffle.configuration

Location: Package overview

From: Src/EditoraInovacao.Sankhya.Entities/packages.lock.jsonnuget/crispywaffle.configuration@10.0.1513

ℹ Read more on: This package | This alert | What is dynamic code execution?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Avoid packages that use dynamic code execution like eval(), since this could potentially execute any code.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore nuget/crispywaffle.configuration@10.0.1513. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Medium
Potential security risk (AI signal): nuget crispywaffle is 72.0% likely risky

Notes: No direct malware behaviors are evident in this module (no process execution, no backdoor communication, no hardcoded secrets). However, there is a significant security risk: XmlTemplateRender loads and executes XSLT from a caller-provided template string. If templates are attacker-controlled, this can lead to server-side XSLT abuse and potential data exposure or unexpected resource access. Additionally, the module performs outbound network calls to ipify.org to discover external IP address, which can be a privacy/compliance concern, and it uses a reflection-heavy ServiceLocator that could amplify impact in a compromised runtime/supply-chain scenario.

Confidence: 0.72

Severity: 0.78

From: Src/EditoraInovacao.Sankhya.Entities/packages.lock.jsonnuget/crispywaffle@10.0.1513

ℹ Read more on: This package | This alert | What are AI-detected potential security risks?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: An AI system identified potential security problems in this package. It is advised to review the package thoroughly and assess the potential risks before installation. You may also consider reporting the issue to the package maintainer or seeking alternative solutions with a stronger security posture.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore nuget/crispywaffle@10.0.1513. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Medium
Network access: nuget crispywaffle

Location: Package overview

From: Src/EditoraInovacao.Sankhya.Entities/packages.lock.jsonnuget/crispywaffle@10.0.1513

ℹ Read more on: This package | This alert | What is network access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should remove all network access that is functionally unnecessary. Consumers should audit network access to ensure legitimate use.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore nuget/crispywaffle@10.0.1513. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Medium
System shell access: nuget crispywaffle

Location: Package overview

From: Src/EditoraInovacao.Sankhya.Entities/packages.lock.jsonnuget/crispywaffle@10.0.1513

ℹ Read more on: This package | This alert | What is shell access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should avoid accessing the shell which can reduce portability, and make it easier for malicious shell access to be introduced.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore nuget/crispywaffle@10.0.1513. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Medium
Dynamic code execution: nuget crispywaffle

Location: Package overview

From: Src/EditoraInovacao.Sankhya.Entities/packages.lock.jsonnuget/crispywaffle@10.0.1513

ℹ Read more on: This package | This alert | What is dynamic code execution?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Avoid packages that use dynamic code execution like eval(), since this could potentially execute any code.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore nuget/crispywaffle@10.0.1513. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Medium
Network access: nuget sankhya

Location: Package overview

From: Src/EditoraInovacao.Sankhya.Entities/packages.lock.jsonnuget/sankhya@5.0.805

ℹ Read more on: This package | This alert | What is network access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should remove all network access that is functionally unnecessary. Consumers should audit network access to ensure legitimate use.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore nuget/sankhya@5.0.805. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Medium
System shell access: nuget sankhya

Location: Package overview

From: Src/EditoraInovacao.Sankhya.Entities/packages.lock.jsonnuget/sankhya@5.0.805

ℹ Read more on: This package | This alert | What is shell access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should avoid accessing the shell which can reduce portability, and make it easier for malicious shell access to be introduced.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore nuget/sankhya@5.0.805. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Medium
Dynamic code execution: nuget sankhya

Location: Package overview

From: Src/EditoraInovacao.Sankhya.Entities/packages.lock.jsonnuget/sankhya@5.0.805

ℹ Read more on: This package | This alert | What is dynamic code execution?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Avoid packages that use dynamic code execution like eval(), since this could potentially execute any code.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore nuget/sankhya@5.0.805. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Filesystem access: nuget crispywaffle

Location: Package overview

From: Src/EditoraInovacao.Sankhya.Entities/packages.lock.jsonnuget/crispywaffle@10.0.1513

ℹ Read more on: This package | This alert | What is filesystem access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: If a package must read the file system, clarify what it will read and ensure it reads only what it claims to. If appropriate, packages can leave file system access to consumers and operate on data passed to it instead.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore nuget/crispywaffle@10.0.1513. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Filesystem access: nuget sankhya

Location: Package overview

From: Src/EditoraInovacao.Sankhya.Entities/packages.lock.jsonnuget/sankhya@5.0.805

ℹ Read more on: This package | This alert | What is filesystem access?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: If a package must read the file system, clarify what it will read and ensure it reads only what it claims to. If appropriate, packages can leave file system access to consumers and operate on data passed to it instead.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore nuget/sankhya@5.0.805. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

@codacy-production
Copy link
Copy Markdown

codacy-production Bot commented Apr 13, 2026

Up to standards ✅

🟢 Issues 0 issues

Results:
0 new issues

View in Codacy

🟢 Metrics 0 duplication

Metric Results
Duplication 0

View in Codacy

TIP This summary will be updated as you push new changes. Give us feedback

@github-actions
Copy link
Copy Markdown

Infisical secrets check: ✅ No secrets leaked!

💻 Scan logs
2026-04-13T07:40:05Z INF scanning for exposed secrets...
7:40AM INF 338 commits scanned.
2026-04-13T07:40:05Z INF scan completed in 268ms
2026-04-13T07:40:05Z INF no leaks found

@sonarqubecloud
Copy link
Copy Markdown

@guibranco guibranco merged commit 13e20a1 into main Apr 13, 2026
23 of 24 checks passed
@guibranco guibranco deleted the dependabot/nuget/Src/EditoraInovacao.Sankhya.Entities/multi-02ba0b6e66 branch April 13, 2026 07:41
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

☑️ auto-merge Automatic merging of pull requests (gstraccini-bot) 🤖 bot Automated processes or integrations dependencies .NET nuget size/M Denotes a PR that changes 30-99 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant