Skip to content

Update actions/checkout action to v5.0.1#737

Open
renovate[bot] wants to merge 1 commit into
masterfrom
renovate/actions-checkout-5.x
Open

Update actions/checkout action to v5.0.1#737
renovate[bot] wants to merge 1 commit into
masterfrom
renovate/actions-checkout-5.x

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Nov 18, 2025

This PR contains the following updates:

Package Type Update Change
actions/checkout action patch v5.0.0v5.0.1

Release Notes

actions/checkout (actions/checkout)

v5.0.1

Compare Source

What's Changed

Full Changelog: actions/checkout@v5...v5.0.1


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • At any time (no schedule defined)
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot requested a review from a team as a code owner November 18, 2025 03:43
@coderabbitai
Copy link
Copy Markdown
Contributor

coderabbitai Bot commented Nov 18, 2025

Walkthrough

Updates the actions/checkout GitHub Actions dependency across six workflow files from v5.0.0 (commit 08c6903cd8c0fde910a37f88322edcfb5dd907a8) to v5.0.1 (commit 93cb6efe18208431cddfb8368fd83d5badbf9bfd). No functional logic changes; only action version references are modified.

Changes

Cohort / File(s) Summary
GitHub Actions Checkout Version Bump
\.github/workflows/changeset.yml, \.github/workflows/cla.yml, \.github/workflows/compile-cairo-alpha-project.yml, \.github/workflows/compile-cairo-project.yml, \.github/workflows/publish.yml, \.github/workflows/test.yml, \.github/workflows/version.yml
Updated actions/checkout action from v5.0.0 to v5.0.1 (commit hash 08c6903... → 93cb6efe...). All other workflow configuration and inputs preserved.

Estimated code review effort

🎯 1 (Trivial) | ⏱️ ~3 minutes

  • All changes are homogeneous version updates to the same action across multiple workflows with identical patterns
  • No logic modifications, control flow changes, or behavioral alterations
  • Straightforward verification of version compatibility across consistent modifications
🚥 Pre-merge checks | ✅ 3
✅ Passed checks (3 passed)
Check name Status Explanation
Title check ✅ Passed The title clearly and directly summarizes the main change: updating the actions/checkout action to v5.0.1, which aligns with all file modifications in the changeset.
Docstring Coverage ✅ Passed No functions found in the changed files to evaluate docstring coverage. Skipping docstring coverage check.
Description check ✅ Passed The PR description clearly documents the update of actions/checkout from v5.0.0 to v5.0.1 across all workflow files, with release notes and configuration details.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
📝 Generate docstrings
  • Create stacked PR
  • Commit on current branch
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Commit unit tests in branch renovate/actions-checkout-5.x

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

@renovate renovate Bot force-pushed the renovate/actions-checkout-5.x branch 7 times, most recently from 4abf701 to 60870f2 Compare December 1, 2025 18:54
@renovate renovate Bot force-pushed the renovate/actions-checkout-5.x branch 5 times, most recently from 38efb11 to 2769d39 Compare December 15, 2025 13:19
@renovate renovate Bot force-pushed the renovate/actions-checkout-5.x branch 4 times, most recently from bff1fbc to eb10842 Compare January 12, 2026 17:30
@renovate renovate Bot force-pushed the renovate/actions-checkout-5.x branch 2 times, most recently from 000f6ce to 32f56db Compare January 16, 2026 15:25
@renovate renovate Bot force-pushed the renovate/actions-checkout-5.x branch 5 times, most recently from 00c56c9 to 6d36a3f Compare January 30, 2026 00:12
@renovate renovate Bot force-pushed the renovate/actions-checkout-5.x branch 5 times, most recently from 0fd422a to 33286be Compare February 18, 2026 19:22
@renovate renovate Bot force-pushed the renovate/actions-checkout-5.x branch from 33286be to dbba78d Compare February 18, 2026 20:32
@renovate renovate Bot force-pushed the renovate/actions-checkout-5.x branch 3 times, most recently from 327a51e to 270888a Compare February 26, 2026 13:41
@renovate renovate Bot force-pushed the renovate/actions-checkout-5.x branch 3 times, most recently from 6ed7249 to 2389dae Compare April 2, 2026 15:17
@renovate renovate Bot force-pushed the renovate/actions-checkout-5.x branch 4 times, most recently from 1d55256 to 27dd43b Compare April 8, 2026 14:22
@renovate renovate Bot force-pushed the renovate/actions-checkout-5.x branch from 27dd43b to 6800d27 Compare April 14, 2026 19:16
@renovate renovate Bot force-pushed the renovate/actions-checkout-5.x branch 3 times, most recently from e30a4ea to 2002000 Compare April 23, 2026 21:46
@renovate renovate Bot force-pushed the renovate/actions-checkout-5.x branch 2 times, most recently from 4e295be to 7b22ebe Compare May 5, 2026 22:02
@renovate renovate Bot force-pushed the renovate/actions-checkout-5.x branch from 7b22ebe to 09c7bd6 Compare May 12, 2026 12:58
@renovate renovate Bot force-pushed the renovate/actions-checkout-5.x branch from 09c7bd6 to 65d8a90 Compare May 20, 2026 15:43
@renovate renovate Bot force-pushed the renovate/actions-checkout-5.x branch from 65d8a90 to 58f989a Compare May 20, 2026 18:01
@socket-security
Copy link
Copy Markdown

Caution

Review the following alerts detected in dependencies.

According to your organization's Security Policy, you must resolve all "Block" alerts before proceeding. It is recommended to resolve "Warn" alerts too. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Block Low
Potential code anomaly (AI signal): npm @humanwhocodes/retry is 100.0% likely to have a medium risk anomaly

Notes: The Retrier class implements a conventional, well-scoped retry mechanism with abort support and backoff-like scheduling. There is no evidence of malicious behavior, data exfiltration, or backdoors in this fragment. The primary security considerations relate to the trustworthiness of the host-provided function (fn) and the external timing constants that govern bail/retry behavior. Overall risk is moderate due to the possibility of executing arbitrary host code, but this is expected for a retry utility; no external communications or data leakage are evident here.

Confidence: 1.00

Severity: 0.60

From: ?npm/eslint@9.33.0npm/@humanwhocodes/retry@0.3.1

ℹ Read more on: This package | This alert | What is an AI-detected potential code anomaly?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: An AI system found a low-risk anomaly in this package. It may still be fine to use, but you should check that it is safe before proceeding.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@humanwhocodes/retry@0.3.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Potential code anomaly (AI signal): npm colord is 100.0% likely to have a medium risk anomaly

Notes: The code constitutes a focused HWB color space utility that converts RGBA to HWB and parses HWB strings, exposing conversion helpers via prototype augmentation. There is no direct evidence of malicious activity (no network/file I/O, no data leakage to unknown sinks). The main security considerations are prototype pollution risks due to prototype augmentation and the potential for side effects in environments that rely on Object.prototype stability; otherwise, the fragment appears benign as a color conversion utility.

Confidence: 1.00

Severity: 0.60

From: ?npm/colord@2.9.3

ℹ Read more on: This package | This alert | What is an AI-detected potential code anomaly?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: An AI system found a low-risk anomaly in this package. It may still be fine to use, but you should check that it is safe before proceeding.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/colord@2.9.3. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Potential code anomaly (AI signal): npm consola is 100.0% likely to have a medium risk anomaly

Notes: The analyzed code fragment is a feature-rich, standard Consola logging utility responsible for redirecting and managing log output with throttling, pausing, and reporter integration. There is no direct evidence of malicious activity, hardcoded secrets, or exfiltration within this snippet. However, the powerful I/O overrides pose privacy and data flow risks if reporters or downstream sinks are untrusted. The security posture hinges on trusted reporters and proper governance of the overall supply chain.

Confidence: 1.00

Severity: 0.60

From: ?npm/ava@6.4.1npm/consola@3.4.2

ℹ Read more on: This package | This alert | What is an AI-detected potential code anomaly?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: An AI system found a low-risk anomaly in this package. It may still be fine to use, but you should check that it is safe before proceeding.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/consola@3.4.2. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Potential code anomaly (AI signal): npm css-select is 100.0% likely to have a medium risk anomaly

Notes: The analyzed code appears to be a legitimate and well-structured component of a CSS selector engine (css-select) implementing pseudo-selectors such as :is, :not, :has, :matches, and :where. There is no evidence of malicious behavior, data exfiltration, backdoors, or other supply-chain risky actions within this fragment. The security risk is low to moderate, contingent on the trustworthiness of the adapter implementation.

Confidence: 1.00

Severity: 0.60

From: ?npm/css-select@5.2.2

ℹ Read more on: This package | This alert | What is an AI-detected potential code anomaly?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: An AI system found a low-risk anomaly in this package. It may still be fine to use, but you should check that it is safe before proceeding.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/css-select@5.2.2. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Potential code anomaly (AI signal): npm css-tree is 100.0% likely to have a medium risk anomaly

Notes: The analyzed code is a standard, well-structured CSS-values parser fragment with no inherent malicious behavior detected. Security risk in isolation is low, assuming the tokenizer dependency is trusted and integrity-checked. Primary concerns are supply-chain risk via the external tokenizer and potential DoS from pathological inputs; otherwise, the module operates locally to tokenize and parse input strings into an AST without external side effects.

Confidence: 1.00

Severity: 0.60

From: ?npm/css-tree@2.2.1

ℹ Read more on: This package | This alert | What is an AI-detected potential code anomaly?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: An AI system found a low-risk anomaly in this package. It may still be fine to use, but you should check that it is safe before proceeding.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/css-tree@2.2.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Potential code anomaly (AI signal): npm detect-libc is 100.0% likely to have a medium risk anomaly

Notes: The code represents a robust, multi-source libc detection utility for Linux, prioritizing filesystem data, then runtime reports, and finally command-based inference. It shows no malicious behavior and aligns with expected patterns for environment introspection. The main improvement areas are strengthening error visibility and handling edge cases where outputs differ from standard expectations.

Confidence: 1.00

Severity: 0.60

From: ?npm/ava@6.4.1npm/detect-libc@2.0.4

ℹ Read more on: This package | This alert | What is an AI-detected potential code anomaly?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: An AI system found a low-risk anomaly in this package. It may still be fine to use, but you should check that it is safe before proceeding.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/detect-libc@2.0.4. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Low CVE: npm qs's arrayLimit bypass in comma parsing allows denial of service

CVE: GHSA-w7fw-mjwx-w883 qs's arrayLimit bypass in comma parsing allows denial of service (LOW)

Affected versions: >= 6.7.0 < 6.14.2

Patched version: 6.14.2

From: ?npm/@modelcontextprotocol/sdk@1.29.0npm/qs@6.14.0

ℹ Read more on: This package | This alert | What is a mild CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known low severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/qs@6.14.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
Obfuscated code: npm entities is 91.0% likely obfuscated

Confidence: 0.91

Location: Package overview

From: ?npm/entities@4.5.0

ℹ Read more on: This package | This alert | What is obfuscated code?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should not obfuscate their code. Consider not using packages with obfuscated code.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/entities@4.5.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants