这是indexloc提供的服务,不要输入任何密码
Skip to content

docs: add migration notes for 0.87.0

GitHub Advanced Security / CodeQL failed Nov 4, 2025 in 3s

5 new alerts including 2 high severity security vulnerabilities

New alerts in code changed by this pull request

Security Alerts:

  • 2 high
  • 3 medium

Alerts not introduced by this pull request might have been detected because the code changes were too large.

See annotations below for details.

View all branch alerts.

Annotations

Check failure on line 88 in packages/openapi-ts/src/generate/client.ts

See this annotation in the file changed.

Code scanning / CodeQL

Potential file system race condition High

The file may have changed since it
was checked
.

Check failure on line 32 in packages/openapi-ts/src/ir/mediaType.ts

See this annotation in the file changed.

Code scanning / CodeQL

Polynomial regular expression used on uncontrolled data High

This
regular expression
that depends on
library input
may run slow on strings starting with 'application/json;' and with many repetitions of '+json;'.

Check warning on line 88 in packages/openapi-ts/src/openApi/2.0.x/parser/parameter.ts

See this annotation in the file changed.

Code scanning / CodeQL

Prototype-polluting assignment Medium

This assignment may alter Object.prototype if a malicious '__proto__' string is injected from
library input
.

Check warning on line 84 in packages/openapi-ts/src/openApi/3.0.x/parser/parameter.ts

See this annotation in the file changed.

Code scanning / CodeQL

Prototype-polluting assignment Medium

This assignment may alter Object.prototype if a malicious '__proto__' string is injected from
library input
.

Check warning on line 84 in packages/openapi-ts/src/openApi/3.1.x/parser/parameter.ts

See this annotation in the file changed.

Code scanning / CodeQL

Prototype-polluting assignment Medium

This assignment may alter Object.prototype if a malicious '__proto__' string is injected from
library input
.