Skip to content

Conversation

@leo-shi-dacheng
Copy link

No description provided.

@socket-security
Copy link

socket-security bot commented Jan 26, 2026

Review the following changes in direct dependencies. Learn more about Socket for GitHub.

Diff Package Supply Chain
Security
Vulnerability Quality Maintenance License
Addednpm/​@​hkdex-tmp/​universal_router_sdk@​1.0.3761008184100
Addednpm/​@​reown/​appkit-adapter-wagmi@​1.8.1799100859880
Addednpm/​@​reown/​appkit@​1.8.1792100869880

View full report

@socket-security
Copy link

socket-security bot commented Jan 26, 2026

Warning

Review the following alerts detected in dependencies.

According to your organization's Security Policy, it is recommended to resolve "Warn" alerts. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Warn High
High CVE: OpenZeppelin Contracts's ERC165Checker may revert instead of returning false in npm @openzeppelin/contracts

CVE: GHSA-qh9x-gcfh-pcrw OpenZeppelin Contracts's ERC165Checker may revert instead of returning false (HIGH)

Affected versions: >= 4.0.0 < 4.7.1

Patched version: 4.7.1

From: ?npm/@hkdex-tmp/universal_router_sdk@1.0.3npm/@openzeppelin/contracts@4.7.0

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@openzeppelin/contracts@4.7.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
High CVE: OpenZeppelin Contracts's SignatureChecker may revert on invalid EIP-1271 signers in npm @openzeppelin/contracts

CVE: GHSA-4g63-c64m-25w9 OpenZeppelin Contracts's SignatureChecker may revert on invalid EIP-1271 signers (HIGH)

Affected versions: >= 4.1.0 < 4.7.1

Patched version: 4.7.1

From: ?npm/@hkdex-tmp/universal_router_sdk@1.0.3npm/@openzeppelin/contracts@4.7.0

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@openzeppelin/contracts@4.7.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
High CVE: OpenZeppelin Contracts vulnerable to ECDSA signature malleability in npm @openzeppelin/contracts

CVE: GHSA-4h98-2769-gh6h OpenZeppelin Contracts vulnerable to ECDSA signature malleability (HIGH)

Affected versions: >= 4.1.0 < 4.7.3

Patched version: 4.7.3

From: ?npm/@hkdex-tmp/universal_router_sdk@1.0.3npm/@openzeppelin/contracts@4.7.0

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@openzeppelin/contracts@4.7.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
High CVE: OpenZeppelin Contracts's GovernorVotesQuorumFraction updates to quorum may affect past defeated proposals in npm @openzeppelin/contracts

CVE: GHSA-xrc4-737v-9q75 OpenZeppelin Contracts's GovernorVotesQuorumFraction updates to quorum may affect past defeated proposals (HIGH)

Affected versions: >= 4.3.0 < 4.7.2

Patched version: 4.7.2

From: ?npm/@hkdex-tmp/universal_router_sdk@1.0.3npm/@openzeppelin/contracts@4.7.0

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@openzeppelin/contracts@4.7.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
High CVE: GovernorCompatibilityBravo may trim proposal calldata in npm @openzeppelin/contracts

CVE: GHSA-93hq-5wgc-jc82 GovernorCompatibilityBravo may trim proposal calldata (HIGH)

Affected versions: >= 4.3.0 < 4.8.3

Patched version: 4.8.3

From: ?npm/@hkdex-tmp/universal_router_sdk@1.0.3npm/@openzeppelin/contracts@4.7.0

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@openzeppelin/contracts@4.7.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Medium
Install-time scripts: npm @reown/appkit during postinstall

Install script: postinstall

Source: node scripts/appkit-version-check.js

From: apps/web/package.jsonnpm/@reown/appkit@1.8.17

ℹ Read more on: This package | This alert | What is an install script?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should not be running non-essential scripts during install and there are often solutions to problems people solve with install scripts that can be run at publish time instead.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@reown/appkit@1.8.17. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

leo-shi-dacheng and others added 5 commits January 26, 2026 11:40
- Add create pool functionality with default HSK chain support
- Implement on-chain LP approval hooks
- Update liquidity position management
- Add v3 addresses constants
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants