Skip to content

Conversation

@alainncls
Copy link
Collaborator

@alainncls alainncls commented Dec 12, 2025

Reverts #358


Note

Reverts the React 19 upgrade by downgrading to React 18 and aligning dependencies and code (styled-components v5, type/ref tweaks, minor UI text).

  • Dependencies/Tooling:
    • Downgrade react/react-dom to 18.2.0; update peer and type packages accordingly.
    • Replace styled-components@6 with styled-components@5 and add babel-plugin-styled-components.
    • Adjust many packages to React 18-compatible versions (e.g., @ensdomains/thorin, rainbowkit, wagmi, @sentry/nextjs).
    • Update pnpm workspace and overrides (including Next.js pins) and add packages/linea-ens-app/pnpm-workspace.yaml.
  • App code updates (React 18/styled-components v5 compatibility):
    • Refactor styled components to functional style and pass style helpers as args (e.g., cacheableComponentStyles, gridAreaStyle).
    • Simplify/inline types: remove explicit JSX imports, tighten RefObject types (drop | null generics), and clean useRef initializations.
    • Update CacheableComponent API/signatures and usages.
    • Minor UI/text tweaks: change sort label/placeholder in NameTableHeader; small prop/type fixes (e.g., anchorRef).

Written by Cursor Bugbot for commit 9b754fe. This will update automatically on new commits. Configure here.

@alainncls alainncls requested a review from VGau December 12, 2025 09:15
@alainncls alainncls self-assigned this Dec 12, 2025
@alainncls alainncls requested a review from a team as a code owner December 12, 2025 09:15
@socket-security
Copy link

@socket-security
Copy link

Warning

Review the following alerts detected in dependencies.

According to your organization's Security Policy, it is recommended to resolve "Warn" alerts. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Warn Critical
Critical CVE: Next.js is vulnerable to RCE in React flight protocol

CVE: GHSA-9qr9-h5gf-34mp Next.js is vulnerable to RCE in React flight protocol (CRITICAL)

Affected versions: >= 14.3.0-canary.77 < 15.0.5; >= 15.1.0-canary.0 < 15.1.9; >= 15.2.0-canary.0 < 15.2.6; >= 15.3.0-canary.0 < 15.3.6; >= 15.4.0-canary.0 < 15.4.8; >= 15.5.0-canary.0 < 15.5.7; >= 16.0.0-canary.0 < 16.0.7

Patched version: 15.2.6

From: packages/linea-ens-app/package.jsonnpm/[email protected]

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
Obfuscated code: npm vite is 91.0% likely obfuscated

Confidence: 0.91

Location: Package overview

From: packages/linea-ens-app/pnpm-lock.yamlnpm/[email protected]npm/[email protected]

ℹ Read more on: This package | This alert | What is obfuscated code?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Packages should not obfuscate their code. Consider not using packages with obfuscated code.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
Obfuscated code: npm vite is 91.0% likely obfuscated

Confidence: 0.91

Location: Package overview

From: packages/linea-ens-app/pnpm-lock.yamlnpm/[email protected]npm/@vitejs/[email protected]npm/[email protected]

ℹ Read more on: This package | This alert | What is obfuscated code?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Packages should not obfuscate their code. Consider not using packages with obfuscated code.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

@alainncls alainncls merged commit 1d7c92c into main Dec 12, 2025
7 checks passed
@alainncls alainncls deleted the revert-358-chore/upgrade-react branch December 12, 2025 09:24
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants