Migrate to Poetry packaging and restructure codebase #21
2
poetry.lock
generated
2
poetry.lock
generated
@@ -1518,4 +1518,4 @@ propcache = ">=0.2.1"
|
||||
[metadata]
|
||||
lock-version = "2.1"
|
||||
python-versions = ">=3.11"
|
||||
content-hash = "8ae392a5c674d2f2983f9696c11fa80ac5154b5cf17e8660c10b38f1a2342a02"
|
||||
content-hash = "dee816aa85ed74bf00c5a27a7744997ac7aaf4ce0c2c9b165a45a43c2be9aaa8"
|
||||
|
||||
@@ -24,12 +24,12 @@ classifiers = [
|
||||
]
|
||||
requires-python = ">=3.11"
|
||||
dependencies = [
|
||||
"aiohttp>=3.12.14",
|
||||
"aiohttp>=3.13.2",
|
||||
"lxmf>=0.9.3",
|
||||
"peewee>=3.18.1",
|
||||
"peewee>=3.18.3",
|
||||
"psutil>=7.1.3",
|
||||
"rns>=1.0.4",
|
||||
"websockets>=14.2",
|
||||
"websockets>=15.0.1",
|
||||
]
|
||||
|
|
||||
|
||||
[project.scripts]
|
||||
|
||||
Reference in New Issue
Block a user
⚠️ Potential issue | 🟠 Major
🧩 Analysis chain
🌐 Web query:
aiohttp latest version 2025 security vulnerabilities💡 Result:
As of Dec 1, 2025 the latest aiohttp release on PyPI is 3.13.2 — upgrade to the latest release. [1]
Notable 2024–2025 security issues you should be aware of
Recommendation
Sources
[1] PyPI aiohttp release details (v3.13.2).
[2] NVD — CVE‑2025‑53643 (request smuggling).
[3] Ubuntu / GitHub advisory summary for CVE‑2025‑53643.
[4] GHSA / advisory for multipart infinite‑loop DoS (CVE‑2024‑30251).
[5] CVE details / GitHub advisory for XSS in static index pages (CVE‑2024‑27306).
🌐 Web query:
websockets latest version 2025 security vulnerabilities💡 Result:
Do you mean (pick one):
🌐 Web query:
pypi aiohttp 3.12.14 security advisory💡 Result:
Summary: aiohttp has a request-smuggling vulnerability (CVE-2025-53643) in its pure‑Python HTTP parser that fails to parse trailer sections. Affects aiohttp < 3.12.14; fixed in 3.12.14. Upgrade to >= 3.12.14 (or ensure C extensions are enabled) to mitigate. (nvd.nist.gov)
Citations:
🌐 Web query:
pypi websockets 14.2 security advisory💡 Result:
Short answer: there is no project security advisory or CVE specifically for websockets 14.2; the project's 14.2 changelog (Jan 19, 2025) lists features/bug fixes but no security fix. Some vulnerability databases list websockets versions (including 14.x) as affected by older CVEs and recommend upgrading — the current recommended secure release is 15.0.1. [1][2][3]
Sources
🌐 Web query:
peewee latest version 2025 security vulnerabilities💡 Result:
As of Dec 1, 2025 the latest Peewee release is 3.18.3 — upgrade to it to get the newest fixes. [1][2]
Known security issues (most relevant):
Recommendation: upgrade to peewee==3.18.3 and review your dependency tree (vendor/distribution packages may lag). Verify fixed versions in your environment (PyPI/distribution package) before deploying. [1][2]
Sources:
[1] Peewee package security summary (Safety DB).
[2] Fedora package updates showing peewee 3.18.3.
🌐 Web query:
psutil latest version 2025 security vulnerabilities💡 Result:
Latest psutil release: 7.1.3 (released 2025-11-02). (piwheels.org)
Known/security-relevant issues reported recently:
If you want, I can: (a) check whether your installed psutil version is affected and show mitigation/fix versions, or (b) fetch upstream GitHub / PyPI security/CHANGELOG entries for 7.1.3.
Citations:
🌐 Web query:
lxmf latest version 2025 security vulnerabilities💡 Result:
Summary (as of Dec 1, 2025)
Sources
Would you like me to: (A) check GitHub release tags and commit history directly for 0.9.2 and release dates, or (B) search CVE/NVD and vendor advisories for any additional vulnerability reports?
🌐 Web query:
rns python package latest version 2025 security vulnerabilities💡 Result:
Latest PyPI release: rns 1.0.4 (uploaded Nov 22–23, 2025). [1]
Known security issues: public vulnerability record shows a race-condition advisory affecting versions < 0.0.8 (fixed in 0.0.8); no other high‑profile CVEs listed for current releases. [2]
Sources:
[1] PyPI rns project page (release files/metadata).
[2] SafetyDB advisory PVE-2023-60402 (rns race-condition; affected <0.0.8, fixed in 0.0.8).
Update dependency versions to address confirmed security vulnerabilities.
3.18.1to3.18.3to fix PVE-2025-81123 vulnerability.3.12.14to3.13.2to reach the latest stable release. Note: The current minimum version (3.12.14) includes the CVE-2025-53643 fix but leaves CVE-2024-30251 and CVE-2024-27306 unpatched if the C extensions are not enabled.14.2to15.0.1(latest recommended secure release).🤖 Prompt for AI Agents
✅ Addressed in commits
ac839dftoc98131f