Skip to content

Conversation

@dittops
Copy link

@dittops dittops commented Oct 7, 2025

Description

This PR introduces PolyLingua, a new OPEA example demonstrating a complete production-ready translation service using OPEA's microservices architecture. The service features a modern Next.js UI, automatic language detection.

@github-actions
Copy link

github-actions bot commented Oct 7, 2025

Dependency Review

The following issues were found:
  • ✅ 0 vulnerable package(s)
  • ✅ 0 package(s) with incompatible licenses
  • ✅ 0 package(s) with invalid SPDX license definitions
  • ⚠️ 4 package(s) with unknown licenses.
See the Details below.

License Issues

PolyLingua/requirements.txt

PackageVersionLicenseIssue Type
aiohttp>= 3.9.0NullUnknown License
langdetect>= 1.0.9NullUnknown License
python-multipart>= 0.0.9NullUnknown License

PolyLingua/ui/package.json

PackageVersionLicenseIssue Type
lucide-react^0.424.0NullUnknown License

Scanned Files

  • PolyLingua/requirements.txt
  • PolyLingua/ui/package.json

@dittops dittops force-pushed the example/polylingua branch from ef5934f to 481aea9 Compare October 8, 2025 09:15
@joshuayao joshuayao added this to OPEA Oct 9, 2025
@joshuayao joshuayao added this to the v1.5 milestone Oct 9, 2025
@dittops dittops force-pushed the example/polylingua branch from 5e5f6f7 to 2f46916 Compare October 9, 2025 07:11
@dittops dittops marked this pull request as ready for review October 9, 2025 07:11
@dittops dittops changed the title WIP: Polylingua Translation service Polylingua Translation service Oct 9, 2025
@joshuayao
Copy link
Collaborator

Dependency Review

The following issues were found:

  • ❌ 1 vulnerable package(s)
  • ✅ 0 package(s) with incompatible licenses
  • ✅ 0 package(s) with invalid SPDX license definitions
  • ⚠️ 4 package(s) with unknown licenses.

See the Details below.

Vulnerabilities

PolyLingua/ui/package.json

Name Version Vulnerability Severity
next 14.2.5 Authorization Bypass in Next.js Middleware critical
Next.js Cache Poisoning high
Next.js authorization bypass vulnerability high
Denial of Service condition in Next.js image optimization moderate
Next.js Allows a Denial of Service (DoS) with Server Actions moderate
Next.js Affected by Cache Key Confusion for Image Optimization API Routes moderate
Next.js Content Injection Vulnerability for Image Optimization moderate
Next.js Improper Middleware Redirect Handling Leads to SSRF moderate
Information exposure in Next.js dev server due to lack of origin verification low
Next.js Race Condition to Cache Poisoning low

License Issues

PolyLingua/requirements.txt

Package Version License Issue Type
aiohttp >= 3.9.0 Null Unknown License
langdetect >= 1.0.9 Null Unknown License
python-multipart >= 0.0.9 Null Unknown License

PolyLingua/ui/package.json

Package Version License Issue Type
lucide-react ^0.424.0 Null Unknown License

Scanned Files

  • PolyLingua/requirements.txt
  • PolyLingua/ui/package.json

Hi @dittops please help fix the critical and high CVEs.

@joshuayao joshuayao moved this to In review in OPEA Oct 20, 2025
@dittops dittops force-pushed the example/polylingua branch from 7b6aa29 to e6ee6f7 Compare October 21, 2025 10:33
dittops and others added 10 commits October 29, 2025 20:31
Signed-off-by: dittops <[email protected]>
Signed-off-by: dittops <[email protected]>
Signed-off-by: dittops <[email protected]>
Upgraded Next.js from 14.2.5 to 14.2.32 to fix critical and high severity vulnerabilities:
- CVE-2025-29927: Authorization Bypass in Next.js Middleware (Critical, CVSS 9.1)
- Next.js Cache Poisoning (High)
- Next.js authorization bypass vulnerability (High)
- Denial of Service condition in Next.js image optimization (High)

Also updated eslint-config-next to match Next.js version.

All security vulnerabilities resolved (0 vulnerabilities found after upgrade).

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <[email protected]>
Signed-off-by: dittops <[email protected]>
Fixed multipart/form-data curl command in validate_services function by
removing quotes around $INPUT_DATA variable. This allows bash to properly
expand the -F options as separate arguments to curl instead of treating
them as a single quoted string.

This resolves the HTTP 000 status error where file upload requests were
failing to reach the server.

Changes:
- Line 134: Removed quotes around $INPUT_DATA in HTTP_STATUS curl command
- Line 138: Removed quotes around $INPUT_DATA in CONTENT curl command

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <[email protected]>
Signed-off-by: dittops <[email protected]>
Signed-off-by: dittops <[email protected]>
@dittops dittops force-pushed the example/polylingua branch from 8cc667b to 5397e67 Compare October 29, 2025 15:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

Status: In review

Development

Successfully merging this pull request may close these issues.

2 participants