This repository was archived by the owner on Aug 27, 2025. It is now read-only.
chore(deps): update dependency @openzeppelin/contracts to v4.9.6 #24
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
4.9.0->4.9.6Release Notes
OpenZeppelin/openzeppelin-contracts (@openzeppelin/contracts)
v4.9.6Compare Source
Base64: Fix issue where dirty memory located just after the input buffer is affecting the result. (#4929)v4.9.5Compare Source
Multicall: Make aware of non-canonical context (i.e.msg.senderis not_msgSender()), allowing compatibility withERC2771Context. Patch duplicatedAddress.functionDelegateCallin v4.9.4 (removed).v4.9.4Compare Source
ERC2771ContextandContext: Introduce a_contextPrefixLength()getter, used to trim extra information appended tomsg.data.Multicall: Make aware of non-canonical context (i.e.msg.senderis not_msgSender()), allowing compatibility withERC2771Context.v4.9.3Compare Source
ERC2771Context: Return the forwarder address whenever themsg.dataof a call originating from a trusted forwarder is not long enough to contain the request signer address (i.e.msg.data.lengthis less than 20 bytes), as specified by ERC-2771. (#4481)ERC2771Context: Prevent revert in_msgData()when a call originating from a trusted forwarder is not long enough to contain the request signer address (i.e.msg.data.lengthis less than 20 bytes). Return the full calldata in that case. (#4484)v4.9.2Compare Source
MerkleProof: Fix a bug inprocessMultiProofandprocessMultiProofCalldatathat allows proving arbitrary leaves if the tree contains a node with value 0 at depth 1.v4.9.1Compare Source
Governor: Add a mechanism to restrict the address of the proposer using a suffix in the description.Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.