chore(deps): bump github.com/modelcontextprotocol/go-sdk from 1.3.0 to 1.3.1#90
Conversation
Bumps [github.com/modelcontextprotocol/go-sdk](https://github.com/modelcontextprotocol/go-sdk) from 1.3.0 to 1.3.1. - [Release notes](https://github.com/modelcontextprotocol/go-sdk/releases) - [Commits](modelcontextprotocol/go-sdk@v1.3.0...v1.3.1) --- updated-dependencies: - dependency-name: github.com/modelcontextprotocol/go-sdk dependency-version: 1.3.1 dependency-type: direct:production ... Signed-off-by: dependabot[bot] <support@github.com>
There was a problem hiding this comment.
💡 Codex Review
Here are some automated review suggestions for this pull request.
Reviewed commit: d63666aa2d
ℹ️ About Codex in GitHub
Codex has been enabled to automatically review pull requests in this repo. Reviews are triggered when you
- Open a pull request for review
- Mark a draft as ready
- Comment "@codex review".
If Codex has suggestions, it will comment; otherwise it will react with 👍.
When you sign up for Codex through ChatGPT, Codex can also answer questions or update the PR, like "@codex address that feedback".
| func Unmarshal(data []byte, v any) error { | ||
| dec := json.NewDecoder(bytes.NewReader(data)) | ||
| dec.DontMatchCaseInsensitiveStructFields() | ||
| return dec.Decode(v) |
There was a problem hiding this comment.
Reject trailing JSON after top-level value
internal/json.Unmarshal now builds a segmentio decoder and returns dec.Decode(v) directly, which only parses the first JSON value and leaves any trailing bytes unread. This is a behavior regression from json.Unmarshal and from segmentio/json.Unmarshal (see vendor/github.com/segmentio/encoding/json/json.go), so malformed payloads like concatenated objects can be accepted instead of rejected, which can hide extra attacker-controlled content in MCP request/response bodies.
Useful? React with 👍 / 👎.
Bumps github.com/modelcontextprotocol/go-sdk from 1.3.0 to 1.3.1.
Release notes
Sourced from github.com/modelcontextprotocol/go-sdk's releases.
Commits
6e8ca56all: use case-sensitive JSON unmarshaling (#807)Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)You can disable automated security fix PRs for this repo from the Security Alerts page.