security: add CVE-2026-32285 to .trivyignore#478
Conversation
CVE-2026-32285 affects github.com/buger/jsonparser v1.1.1, which is a transitive dependency via mark3labs/mcp-go → invopop/jsonschema → wk8/go-ordered-map → buger/jsonparser. No fixed version is available upstream. The package is not called directly by any GoSQLX code and risk is scoped to MCP JSON schema generation. Added to .trivyignore until a patched version is released. Fixes Trivy Repository Scan CI failures in PR #475 and #477.
|
Claude finished @ajitpratap0's task —— View job Pull Request ReviewReviewing PR #478: Adding CVE-2026-32285 to .trivyignore Todo List
Review Feedback✅ Code Quality & Best PracticesExcellent documentation pattern: The change follows the established format in
Consistency: Mirrors the existing ✅ Security AssessmentLow Risk Profile:
Risk Mitigation: The MCP server is an optional component primarily for AI assistant integration, not core GoSQLX functionality. ✅ Process ComplianceProper justification: The PR description clearly explains:
Follows established patterns: Consistent with 6 existing CVE entries in
|
|
The latest updates on your projects. Learn more about Vercel for GitHub.
|
Summary
Adds
CVE-2026-32285to.trivyignoreto fix failing Trivy Repository Scan CI checks on PR #475 and PR #477.Root Cause
CVE-2026-32285affectsgithub.com/buger/jsonparser v1.1.1, a transitive dependency via:mark3labs/mcp-go → invopop/jsonschema → wk8/go-ordered-map → buger/jsonparserNo fixed version is available upstream. The package is not used directly by GoSQLX code.
Impact
.trivyignoreentries for buger/jsonparser (GHSA-6g7g-w4f8-9c9x)Action Items
Re-evaluate when
buger/jsonparserreleases a patched version or whenmcp-goupdates its dependency.