grammy is vulnerable to Timing Attacks
45
Medium Risk
Affected versions of this package are vulnerable to timing attacks due to non-constant-time string comparison when validating secret tokens, which can allow an attacker to infer secret token information through timing differences; the issue is fixed by replacing the vulnerable logic with a constant-time, byte-by-byte comparison that always iterates tokenBytes.length times, prevents timing-based information leakage, and correctly handles undefined and edge cases.
You are affected if you are using a version that falls within the vulnerable range.
grammy is vulnerable to Timing Attacks in versions 1.9.0 - 1.39.2.
Upgrade the grammy library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant