osv-detector 0.11.1 -> 0.12.0 https://github.com/G-Rath/osv-detector/releases attrpath: osv-detector Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Found old vendorHash = "sha256-Rrosye8foVntoFDvDmyNuXgnEgjzcOXenOKBMZVCRio=" [golangModuleVersion] Replaced vendorHash with sha256-ZLp1++P72KSn/nZVpBVpzLWid5Emh935XNAP/uaNevg= Received ExitFailure 1 when running Raw command: /nix/store/3nqhcyc7vid1npgcd0m7arg5sn325nhz-nix-2.12.0/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A osv-detector nix build failed. -  GHSA-r628-mhmh-qjhw: Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning (https://github.com/advisories/GHSA-r628-mhmh-qjhw) -  terser@4.8.0 is affected by the following vulnerabilities: -  GHSA-4wf5-vphf-c2xc: Terser insecure use of regular expressions leads to ReDoS (https://github.com/advisories/GHSA-4wf5-vphf-c2xc) -  tough-cookie@2.5.0 is affected by the following vulnerabilities: -  GHSA-72xf-g2v4-qvf3: tough-cookie Prototype Pollution vulnerability (https://github.com/advisories/GHSA-72xf-g2v4-qvf3) -  tough-cookie@4.0.0 is affected by the following vulnerabilities: -  GHSA-72xf-g2v4-qvf3: tough-cookie Prototype Pollution vulnerability (https://github.com/advisories/GHSA-72xf-g2v4-qvf3) -  trim-newlines@1.0.0 is affected by the following vulnerabilities: -  GHSA-7p7h-4mm5-852v: Uncontrolled Resource Consumption in trim-newlines (https://github.com/advisories/GHSA-7p7h-4mm5-852v) -  ua-parser-js@0.7.31 is affected by the following vulnerabilities: -  GHSA-fhg7-m89q-25r3: ReDoS Vulnerability in ua-parser-js version (https://github.com/advisories/GHSA-fhg7-m89q-25r3) -  ua-parser-js@1.0.2 is affected by the following vulnerabilities: -  GHSA-fhg7-m89q-25r3: ReDoS Vulnerability in ua-parser-js version (https://github.com/advisories/GHSA-fhg7-m89q-25r3) -  url-parse@1.5.7 is affected by the following vulnerabilities: -  GHSA-hgjh-723h-mx2j: Authorization Bypass Through User-Controlled Key in url-parse (https://github.com/advisories/GHSA-hgjh-723h-mx2j) -  GHSA-jf5r-8hm2-f872: url-parse incorrectly parses hostname / protocol due to unstripped leading control characters. (https://github.com/advisories/GHSA-jf5r-8hm2-f872) -  word-wrap@1.2.3 is affected by the following vulnerabilities: -  GHSA-j8xg-fqg3-53r7: word-wrap vulnerable to Regular Expression Denial of Service (https://github.com/advisories/GHSA-j8xg-fqg3-53r7)    ... // 1 identical, 1 removed, and 1 inserted lines    """   ) main_test.go:1434: actual stderr output does not match expected:   string( -  "", +  ` failed: unable to fetch OSV database: could not retrieve OSV database archive: Get "https://osv-vulnerabilities.storage.googleapis.com/npm/all.zip": dial tcp: lookup osv-vulnerabilities.storage.googleapis.com on [::1]:53: read udp [::1]:38650->[::1]:53: r`...,   ) FAIL FAIL github.com/g-rath/osv-detector 0.062s FAIL