Fix typedocs and examples for toolkit version
[!NOTE] Align toolkit versioning across TS/Python, update docs/examples, add TS audit CI, and bump Python packages to 0.9.5 with minor type/util/test tweaks.
- CI:
- Add
/.github/workflows/ts.audit.ymlto runpnpm audit --prodand comment on PRs; simplifyts.test.ymlby removing audit step and adding PR comment permissions.- TypeScript SDK:
- Refine toolkit version types with zod schemas in
ts/packages/core/src/types/tool.types.tsand updateComposioconfig docs ints/packages/core/src/composio.ts.- Docs updates: clarify version requirements in
ts/docs/api/tools.md, triggers behavior ints/docs/api/triggers.md, and rework toolkit version configuration ints/docs/getting-started.md.- Dependency/catalog updates for
@modelcontextprotocol/sdkto^1.22.0; adjust examples to usecatalog:and lockfile updates.- Python SDK:
- Update toolkit version typing (
ToolkitVersionasUnion[Literal['latest'], str],ToolkitVersionParam), tweakget_toolkit_versionsbehavior and docstrings, and adjustSDKconstructor docs.- Update README example to per-toolkit dict.
- Tests updated to new types/util behavior.
- Bump package versions to
0.9.5acrosspython/core and providers.- Examples/Workspace:
- Set
@modelcontextprotocol/sdktocatalog:ints/examples/*; add catalog entry inpnpm-workspace.yaml.Written by Cursor Bugbot for commit 91b68b352803bd5ce38e9dd5c5dcef27192c3177. This will update automatically on new commits. Configure here.
⚠️ Security Audit Failed
The pnpm audit --prod check found security vulnerabilities in production dependencies.
Please review and fix the vulnerabilities. You can try running:
pnpm audit --fix --prod
Audit output
┌─────────────────────┬────────────────────────────────────────────────────────┐
│ moderate │ body-parser is vulnerable to denial of service when │
│ │ url encoding is used │
├─────────────────────┼────────────────────────────────────────────────────────┤
│ Package │ body-parser │
├─────────────────────┼────────────────────────────────────────────────────────┤
│ Vulnerable versions │ >=2.2.0 <2.2.1 │
├─────────────────────┼────────────────────────────────────────────────────────┤
│ Patched versions │ >=2.2.1 │
├─────────────────────┼────────────────────────────────────────────────────────┤
│ Paths │ fern>supergateway>@modelcontextprotocol/ │
│ │ sdk>express>body-parser │
├─────────────────────┼────────────────────────────────────────────────────────┤
│ More info │ https://github.com/advisories/GHSA-wqch-xfxh-vrr4 │
└─────────────────────┴────────────────────────────────────────────────────────┘
1 vulnerabilities found
Severity: 1 moderate
⚠️ Security Audit Failed
The pnpm audit --prod check found security vulnerabilities in production dependencies.
Please review and fix the vulnerabilities. You can try running:
pnpm audit --fix --prod
Audit output
┌─────────────────────┬────────────────────────────────────────────────────────┐
│ critical │ Next.js is vulnerable to RCE in React flight protocol │
├─────────────────────┼────────────────────────────────────────────────────────┤
│ Package │ next │
├─────────────────────┼────────────────────────────────────────────────────────┤
│ Vulnerable versions │ >=16.0.0-canary.0 <16.0.7 │
├─────────────────────┼────────────────────────────────────────────────────────┤
│ Patched versions │ >=16.0.7 │
├─────────────────────┼────────────────────────────────────────────────────────┤
│ Paths │ ts__examples__llamaindex>@llamaindex/ │
│ │ workflow>@llamaindex/workflow-core>next │
├─────────────────────┼────────────────────────────────────────────────────────┤
│ More info │ https://github.com/advisories/GHSA-9qr9-h5gf-34mp │
└─────────────────────┴────────────────────────────────────────────────────────┘
┌─────────────────────┬────────────────────────────────────────────────────────┐
│ high │ Model Context Protocol (MCP) TypeScript SDK does not │
│ │ enable DNS rebinding protection by default │
├─────────────────────┼────────────────────────────────────────────────────────┤
│ Package │ @modelcontextprotocol/sdk │
├─────────────────────┼────────────────────────────────────────────────────────┤
│ Vulnerable versions │ <1.24.0 │
├─────────────────────┼────────────────────────────────────────────────────────┤
│ Patched versions │ >=1.24.0 │
├─────────────────────┼────────────────────────────────────────────────────────┤
│ Paths │ fern>supergateway>@modelcontextprotocol/sdk │
│ │ │
│ │ ts__examples__google>@modelcontextprotocol/sdk │
├─────────────────────┼────────────────────────────────────────────────────────┤
│ More info │ https://github.com/advisories/GHSA-w48q-cv73-mx4w │
└─────────────────────┴────────────────────────────────────────────────────────┘
3 vulnerabilities found
Severity: 2 high | 1 critical