Skip to content

[Snyk] Security upgrade next from 15.3.1 to 16.1.5#17

Open
KB01111 wants to merge 1 commit intomainfrom
snyk-fix-7165e762ee47cce7578e10496fa8ba19
Open

[Snyk] Security upgrade next from 15.3.1 to 16.1.5#17
KB01111 wants to merge 1 commit intomainfrom
snyk-fix-7165e762ee47cce7578e10496fa8ba19

Conversation

@KB01111
Copy link
Copy Markdown
Owner

@KB01111 KB01111 commented Feb 2, 2026

User description

snyk-top-banner

Snyk has created this PR to fix 2 vulnerabilities in the pnpm dependencies of this project.

Snyk changed the following file(s):

  • frontend/package.json
⚠️ Warning
Failed to update the pnpm-lock.yaml, please update manually before merging.

Vulnerabilities that will be fixed with an upgrade:

Issue Score
high severity Allocation of Resources Without Limits or Throttling
SNYK-JS-NEXT-15104645
  696  
high severity Allocation of Resources Without Limits or Throttling
SNYK-JS-NEXT-15105315
  696  

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Allocation of Resources Without Limits or Throttling


CodeAnt-AI Description

Upgrade Next.js to 16.1.5 in the frontend to fix two high-severity vulnerabilities

What Changed

  • Updated frontend dependency: Next.js version changed from 15.3.1 to 16.1.5 in package.json
  • Resolves two high-severity "Allocation of Resources Without Limits or Throttling" vulnerabilities reported by Snyk
  • No changes to runtime UI or features are introduced by this update

Impact

✅ Fewer high-severity frontend vulnerabilities
✅ Lower risk of resource-exhaustion (DoS) against the frontend
✅ No change to end-user UI or feature behavior

💡 Usage Guide

Checking Your Pull Request

Every time you make a pull request, our system automatically looks through it. We check for security issues, mistakes in how you're setting up your infrastructure, and common code problems. We do this to make sure your changes are solid and won't cause any trouble later.

Talking to CodeAnt AI

Got a question or need a hand with something in your pull request? You can easily get in touch with CodeAnt AI right here. Just type the following in a comment on your pull request, and replace "Your question here" with whatever you want to ask:

@codeant-ai ask: Your question here

This lets you have a chat with CodeAnt AI about your pull request, making it easier to understand and improve your code.

Example

@codeant-ai ask: Can you suggest a safer alternative to storing this secret?

Preserve Org Learnings with CodeAnt

You can record team preferences so CodeAnt AI applies them in future reviews. Reply directly to the specific CodeAnt AI suggestion (in the same thread) and replace "Your feedback here" with your input:

@codeant-ai: Your feedback here

This helps CodeAnt AI learn and adapt to your team's coding style and standards.

Example

@codeant-ai: Do not flag unused imports.

Retrigger review

Ask CodeAnt AI to review the PR again, by typing:

@codeant-ai: review

Check Your Repository Health

To analyze the health of your code repository, visit our dashboard at https://app.codeant.ai. This tool helps you identify potential issues and areas for improvement in your codebase, ensuring your repository maintains high standards of code health.

Copilot AI review requested due to automatic review settings February 2, 2026 07:48
@codeant-ai
Copy link
Copy Markdown

codeant-ai bot commented Feb 2, 2026

CodeAnt AI is reviewing your PR.


Thanks for using CodeAnt! 🎉

We're free for open-source projects. if you're enjoying it, help us grow by sharing.

Share on X ·
Reddit ·
LinkedIn

@coderabbitai
Copy link
Copy Markdown

coderabbitai bot commented Feb 2, 2026

Important

Review skipped

Ignore keyword(s) in the title.

Please check the settings in the CodeRabbit UI or the .coderabbit.yaml file in this repository. To trigger a single review, invoke the @coderabbitai review command.

You can disable this status message by setting the reviews.review_status to false in the CodeRabbit configuration file.

  • 🔍 Trigger a full review
✨ Finishing touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Post copyable unit tests in a comment
  • Commit unit tests in branch snyk-fix-7165e762ee47cce7578e10496fa8ba19

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

@gemini-code-assist
Copy link
Copy Markdown

Summary of Changes

Hello @KB01111, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request aims to enhance the project's security posture by upgrading the next framework dependency. The upgrade targets specific high-severity vulnerabilities, ensuring the application benefits from the latest security patches. While the core dependency update is automated, a manual step is required to synchronize the pnpm-lock.yaml file, which is crucial for consistent dependency resolution.

Highlights

  • Dependency Upgrade: The next dependency in frontend/package.json has been upgraded from version 15.3.1 to 16.1.5.
  • Security Fixes: This upgrade addresses two high-severity vulnerabilities (SNYK-JS-NEXT-15104645 and SNYK-JS-NEXT-15105315) related to "Allocation of Resources Without Limits or Throttling" in the next package.
  • Automated PR: This pull request was automatically generated by Snyk to remediate identified security vulnerabilities.
  • Manual Action Required: The pnpm-lock.yaml file could not be automatically updated and requires manual intervention before merging.

🧠 New Feature in Public Preview: You can now enable Memory to help Gemini Code Assist learn from your team's feedback. This makes future code reviews more consistent and personalized to your project's style. Click here to enable Memory in your admin console.

Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in pull request comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

@codemetrics-ai
Copy link
Copy Markdown

codemetrics-ai bot commented Feb 2, 2026

⚠️ Your Codemetrics free trial has expired. To continue using AI based pull request reviews, please subscribe to premium in team settings.

@codeant-ai codeant-ai bot added the size:XS This PR changes 0-9 lines, ignoring generated files label Feb 2, 2026
@codeant-ai
Copy link
Copy Markdown

codeant-ai bot commented Feb 2, 2026

Sequence Diagram

This PR updates the frontend package.json to bump Next.js from 15.3.1 to 16.1.5. The core flow shows Snyk creating the automated PR, CI detecting the missing pnpm-lock update, and a maintainer updating the lockfile before merge and final build.

sequenceDiagram
    participant Snyk
    participant Repo
    participant CI
    participant Maintainer

    Snyk->>Repo: Create PR updating frontend/package.json (next 15.3.1 -> 16.1.5)
    Repo->>CI: Trigger install & tests (pnpm install / build)
    CI-->>Repo: Warn: pnpm-lock.yaml not updated (manual update required)
    Maintainer->>Repo: Update pnpm-lock.yaml and merge PR
    Repo->>CI: Run final install & build
    CI-->>Repo: Build/tests pass (upgrade applied)
Loading

Generated by CodeAnt AI

Copy link
Copy Markdown

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request, generated by Snyk, upgrades the next package from 15.3.1 to 16.1.5 to resolve two high-severity security vulnerabilities. While the change in package.json is correct, there are critical follow-up actions required. The pnpm-lock.yaml file has not been updated, which means the dependency update won't take effect. Additionally, the related eslint-config-next dev dependency should also be updated to match the new next version to maintain compatibility. Please see the specific comment for details on the required actions.

"leaflet-defaulticon-compatibility": "^0.1.2",
"lucide-react": "^0.474.0",
"next": "15.3.1",
"next": "16.1.5",
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

critical

This upgrade to Next.js v16 is a major version change and introduces breaking changes. To ensure the project remains consistent and functional, a couple of things need to be addressed:

  1. Update pnpm-lock.yaml: As noted in the PR description, the lockfile has not been updated. You must run pnpm install to update pnpm-lock.yaml and commit the changes. Without this, the dependency update will not take effect, and the security vulnerabilities will persist.

  2. Update eslint-config-next: The eslint-config-next package in your devDependencies is still at version 15.3.1. It's crucial to keep this aligned with your next version to avoid linting errors and ensure compatibility. Please update it to match the new next version.

    -    "eslint-config-next": "15.3.1",
    +    "eslint-config-next": "16.1.5",

@codeant-ai
Copy link
Copy Markdown

codeant-ai bot commented Feb 2, 2026

CodeAnt AI finished reviewing your PR.

Copy link
Copy Markdown

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR attempts to upgrade Next.js from version 15.3.1 to 16.1.5 to address two high-severity security vulnerabilities (SNYK-JS-NEXT-15104645 and SNYK-JS-NEXT-15105315) related to resource allocation without limits or throttling. However, the PR has a critical issue with the proposed version number.

Changes:

  • Upgrade Next.js dependency from 15.3.1 to 16.1.5 in frontend/package.json

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Copy link
Copy Markdown

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: 5e9611f1cf

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

"leaflet-defaulticon-compatibility": "^0.1.2",
"lucide-react": "^0.474.0",
"next": "15.3.1",
"next": "16.1.5",
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P2 Badge Update pnpm-lock.yaml to reflect the Next.js bump

frontend/package.json now requests next@16.1.5, but frontend/pnpm-lock.yaml still pins next@15.3.1 (see the next@15.3.1 entries around line 3879). As a result, any install that relies on the checked-in lockfile will continue using 15.3.1, so the security upgrade is not actually applied and environments may stay vulnerable until the lockfile is regenerated to match the new manifest.

Useful? React with 👍 / 👎.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

size:XS This PR changes 0-9 lines, ignoring generated files

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants