Skip to content

chore(deps): bump google.golang.org/grpc in /policy/sigstore

19f3eba
Select commit
Loading
Failed to load commit list.
Open

chore(deps): bump google.golang.org/grpc from 1.78.0 to 1.79.3 in /policy/sigstore #76

chore(deps): bump google.golang.org/grpc in /policy/sigstore
19f3eba
Select commit
Loading
Failed to load commit list.
Kusari Inspector / Kusari Inspector succeeded Mar 19, 2026 in 1m 25s

Security Analysis Passed

No security issues found

Details

Kusari Inspector

Kusari Analysis Results:

Proceed with these changes

✅ No Flagged Issues Detected
All values appear to be within acceptable risk parameters.

Both analyses independently recommend merging this PR. The dependency upgrade from google.golang.org/grpc v1.78.0 to v1.79.3 directly remediates a HIGH severity vulnerability (CVE-2026-33186 / GHSA-p77j-4mvh-x3m3), an authorization bypass flaw caused by a missing leading slash in the HTTP/2 :path pseudo-header that could allow attackers to circumvent path-based deny rules. The patched version v1.79.3 carries no advisories, is fully maintained, and uses a permissive Apache-2.0 license. The code analysis of the modified files (policy/sigstore/go.mod and policy/sigstore/go.sum) found zero vulnerabilities, secrets, or workflow issues, and govulncheck confirmed no affected modules remain. Merging this PR strictly reduces the security risk profile with no identified downsides.

Note

View full detailed analysis result for more information on the output and the checks that were run.


@kusari-inspector rerun - Trigger a re-analysis of this PR
@kusari-inspector feedback [your message] - Send feedback to our AI and team
See Kusari's documentation for setup and configuration.
Commit: 19f3eba, performed at: 2026-03-19T01:25:41Z