Safety vulnerability ID: 49576
The information on this page was manually curated by our Cybersecurity Intelligence Team.
[This advisory has been limited. Please create a free account to view the full advisory.]
Latest version: 0.36.11
Solana Python API
[This affected versions has been limited. Please create a free account to view the full affected versions.]
[This fixed versions has been limited. Please create a free account to view the full fixed versions.]
Fixed
- Use latest Solders version to make objects pickleable again [(252)](https://github.com/michaelhly/solana-py/pull/252).
Changed
- Updated httpx to fix critical vulnerability [(248)](https://github.com/michaelhly/solana-py/pull/248).
- Updated pytest, websockets, pytest-docker, pytest-asyncio to latest. [(254)](https://github.com/michaelhly/solana-py/pull/254).
- Updated apischema to latest. [(254)](https://github.com/michaelhly/solana-py/pull/254).
Added
- Added `get_latest_blockhash` RPC Call. [(254)](https://github.com/michaelhly/solana-py/pull/254).
- Added `get_fee_for_message` RPC Call. [(254)](https://github.com/michaelhly/solana-py/pull/254).
- Added confirmation strategy which checks if the transaction has exceeded last valid blockheight. [(254)](https://github.com/michaelhly/solana-py/pull/254).
- Added `asyncio_mode = auto` in pytest.ini. [(248)](https://github.com/michaelhly/solana-py/pull/254).
- Added an optional `verify_signature` bool when `transaction.serialize()` is called [(249)](https://github.com/michaelhly/solana-py/pull/249).
- Added Memo program [(249)](https://github.com/michaelhly/solana-py/pull/249).
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application