chore(deps): update dependency promptfoo to v0.121.11#512
Conversation
|
Caution [High Risk] Production API server will be launched as a public EC2 host without an IAM instance profile This change creates a new production API EC2 instance on That means the change is creating another directly reachable production EC2 host without a machine IAM role, which violates the organization’s network-access and compute-hardening requirements. The public endpoint increases attack surface on the host, and the lack of an instance profile removes the normal least-privilege path for AWS access, encouraging unmanaged credentials or preventing use of AWS-managed controls such as SSM-based administration. Caution [High Risk] Public SSH exposure on the internet-facing EC2 instance will remain after this change The production EC2 instance This change does not mitigate that exposure. The planned diff only causes the instance public IP/DNS to be reassigned as part of the update path, and related planned resources show public addressing is still being used. With no corresponding change to remove the public IP path or restrict the SSH rule, the instance will remain directly reachable for brute-force attempts and unauthorized access, with a clear path to host compromise and follow-on lateral movement from a production platform host. Caution [High Risk] Public ALB target group replacement can cut over to an incompatible single backend and take the API offline The change replaces the public ALB target group This will cause public API outage on Caution [High Risk] Single-AZ single-instance API deployment will leave the service without failover This change is creating a production-tagged EC2-backed API server in If that instance or Warning [Medium Risk] New EC2 health server on port 9090 will be broadly reachable through shared security groups The change creates That means the new unmanaged health endpoint will be reachable across a very large internal address range and will inherit customer/internal access scopes intended for other purposes. This is a real network-segmentation and least-privilege violation under SEC05-BP02 and the org policy that EC2 access must be tightly controlled. Even though the new target group attachment correctly uses port SignalsRoutine → Multiple API server and access resources showing unusual, infrequent routine changes at 1 event/week for the last 3 months, with several related resources at 2 events/week for the last 3 months, which is infrequent compared to typical patterns. Additional Change Details: |
514a41c to
58cbaeb
Compare
58cbaeb to
a1c25a9
Compare
a1c25a9 to
f877105
Compare
f877105 to
4b949a7
Compare
4b949a7 to
2bb4553
Compare
d4fad61 to
5b7c7a5
Compare
5b7c7a5 to
be239e2
Compare
be239e2 to
4766350
Compare
4766350 to
8464773
Compare
8464773 to
d192a3c
Compare
d192a3c to
3392d49
Compare
3392d49 to
02477be
Compare

This PR contains the following updates:
0.121.2→0.121.11Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
Release Notes
promptfoo/promptfoo (promptfoo)
v0.121.11Compare Source
Features
Bug Fixes
v0.121.10Compare Source
Features
Bug Fixes
Performance Improvements
Reverts
v0.121.9Compare Source
Features
Bug Fixes
v0.121.8Compare Source
Features
Bug Fixes
v0.121.7Compare Source
Features
Bug Fixes
v0.121.5Compare Source
Features
Bug Fixes
v0.121.4Compare Source
Features
Bug Fixes
Configuration
📅 Schedule: (in timezone Europe/London)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.