chore(deps): bump google.golang.org/grpc from 1.78.0 to 1.79.3 in /policy/sigstore #76
Security Analysis Passed
No security issues found
Details
Kusari Analysis Results:
✅ No Flagged Issues Detected
All values appear to be within acceptable risk parameters.
Both analyses independently recommend merging this PR. The dependency upgrade from google.golang.org/grpc v1.78.0 to v1.79.3 directly remediates a HIGH severity vulnerability (CVE-2026-33186 / GHSA-p77j-4mvh-x3m3), an authorization bypass flaw caused by a missing leading slash in the HTTP/2 :path pseudo-header that could allow attackers to circumvent path-based deny rules. The patched version v1.79.3 carries no advisories, is fully maintained, and uses a permissive Apache-2.0 license. The code analysis of the modified files (policy/sigstore/go.mod and policy/sigstore/go.sum) found zero vulnerabilities, secrets, or workflow issues, and govulncheck confirmed no affected modules remain. Merging this PR strictly reduces the security risk profile with no identified downsides.
Note
View full detailed analysis result for more information on the output and the checks that were run.
@kusari-inspector rerun - Trigger a re-analysis of this PR
@kusari-inspector feedback [your message] - Send feedback to our AI and team
See Kusari's documentation for setup and configuration.
Commit: 19f3eba, performed at: 2026-03-19T01:25:41Z