<feed xmlns='http://www.w3.org/2005/Atom'>
<title>digiid-ts-demo, branch main</title>
<subtitle>[MIRROR] Digi-ID TypeScript Integration Demo</subtitle>
<id>https://git.zelu.dev/digiid-ts-demo/atom?h=main</id>
<link rel='self' href='https://git.zelu.dev/digiid-ts-demo/atom?h=main'/>
<link rel='alternate' type='text/html' href='https://git.zelu.dev/digiid-ts-demo/'/>
<updated>2026-04-18T14:58:37Z</updated>
<entry>
<title>chore: update digiid-ts to 2.0.3 and fix security vulnerabilities</title>
<updated>2026-04-18T14:58:37Z</updated>
<author>
<name>Pawel Zelawski</name>
<email>pawel@pzelawski.com</email>
</author>
<published>2026-04-18T14:58:37Z</published>
<link rel='alternate' type='text/html' href='https://git.zelu.dev/digiid-ts-demo/commit/?id=3fc37e6338bb6c6054739578088ca638f08fceca'/>
<id>urn:sha1:3fc37e6338bb6c6054739578088ca638f08fceca</id>
<content type='text'>
- Bump digiid-ts from 2.0.2 to 2.0.3 (security patch release)
- Fix 5 vulnerabilities via npm audit fix:
  - brace-expansion (moderate): ReDoS / process hang
  - flatted (high): prototype pollution + unbounded recursion DoS
  - path-to-regexp (high): ReDoS via route parameters
  - picomatch (high): ReDoS + method injection
  - vite (high): path traversal + arbitrary file read via dev server
</content>
</entry>
<entry>
<title>Fix multiple security vulnerabilities (March 2026)</title>
<updated>2026-03-01T12:41:23Z</updated>
<author>
<name>Pawel Zelawski</name>
<email>pawel.zelawski@outlook.com</email>
</author>
<published>2026-03-01T12:41:23Z</published>
<link rel='alternate' type='text/html' href='https://git.zelu.dev/digiid-ts-demo/commit/?id=00e7e4fbf5a6fc41b88631fd34e98e48eeb9fc6a'/>
<id>urn:sha1:00e7e4fbf5a6fc41b88631fd34e98e48eeb9fc6a</id>
<content type='text'>
Security Updates:
- digiid-ts: 2.0.1-beta.2 → 2.0.2 (fixes internal dependency vulnerability)
- rollup: 4.58.0 → 4.59.0 (fixes arbitrary file write via path traversal - GHSA-mw96-cpmx-2vgc)
- qs: 6.14.1 → 6.14.2 (fixes arrayLimit bypass in comma parsing DoS - GHSA-w7fw-mjwx-w883)
- express: 4.21.2 → 4.22.1 (updated with qs dependency)
- minimatch: multiple updates (fixes ReDoS vulnerabilities)
- ajv: updated to 6.14.0+ (fixes ReDoS with $data option)

Impact:
- Rollup: Prevented arbitrary file write through path traversal sequences
- qs: Fixed denial-of-service via comma-separated array limit bypass
- digiid-ts: Resolved vulnerability in @noble/curves dependency

Result: 0 vulnerabilities (npm audit clean)
</content>
</entry>
<entry>
<title>Update to digiid-ts v2.0.1-beta.2 - Fix message hash signature verification</title>
<updated>2026-01-23T11:25:08Z</updated>
<author>
<name>Pawel Zelawski</name>
<email>pawel.zelawski@outlook.com</email>
</author>
<published>2026-01-23T11:25:08Z</published>
<link rel='alternate' type='text/html' href='https://git.zelu.dev/digiid-ts-demo/commit/?id=31bf3e64ce084b5410ce90a36039009bf9258e15'/>
<id>urn:sha1:31bf3e64ce084b5410ce90a36039009bf9258e15</id>
<content type='text'>
- Fixed hashMessage removing extra length byte encoding before message prefix
- Message prefix '\x19DigiByte Signed Message:\n' now used correctly
- Enhanced public key recovery to try all 4 recovery IDs
- Returns both compressed/uncompressed public keys for better compatibility
- Should fix 'Invalid signature' errors with DigiBytes wallet
</content>
</entry>
<entry>
<title>Update to digiid-ts v2.0.1-beta.1 - Fix bech32 address verification</title>
<updated>2026-01-23T11:00:38Z</updated>
<author>
<name>Pawel Zelawski</name>
<email>pawel.zelawski@outlook.com</email>
</author>
<published>2026-01-23T11:00:38Z</published>
<link rel='alternate' type='text/html' href='https://git.zelu.dev/digiid-ts-demo/commit/?id=88f6391e87c2fdfb427f23564f5a83e351d04cd5'/>
<id>urn:sha1:88f6391e87c2fdfb427f23564f5a83e351d04cd5</id>
<content type='text'>
- Fixed "Invalid signature" error for bech32 addresses (dgb1q...)
- Added automatic compression of public keys for bech32 P2WPKH verification
- Bech32 now correctly uses hash160(compressed_pubkey)
- Should fix authentication with DigiBytes mobile wallet using bech32 addresses
</content>
</entry>
<entry>
<title>Test digiid-ts v2.0.1-beta.0 - Fix public key recovery</title>
<updated>2026-01-23T10:43:33Z</updated>
<author>
<name>Pawel Zelawski</name>
<email>pawel.zelawski@outlook.com</email>
</author>
<published>2026-01-23T10:43:33Z</published>
<link rel='alternate' type='text/html' href='https://git.zelu.dev/digiid-ts-demo/commit/?id=30136dafc868e6e06d5e762a50d1c646d9f5bb3e'/>
<id>urn:sha1:30136dafc868e6e06d5e762a50d1c646d9f5bb3e</id>
<content type='text'>
- Install digiid-ts@2.0.1-beta.0 for testing signature verification fix
- Fixed point.toRawBytes() -&gt; point.toBytes() API change
- Added .addRecoveryBit() for proper ECDSA public key recovery
- Testing with real DigiBytes mobile wallet required
</content>
</entry>
<entry>
<title>Update digiid-ts to v2.0.0 - Fix ECDSA cryptanalysis vulnerability</title>
<updated>2026-01-23T10:08:47Z</updated>
<author>
<name>Pawel Zelawski</name>
<email>pawel.zelawski@outlook.com</email>
</author>
<published>2026-01-23T10:08:47Z</published>
<link rel='alternate' type='text/html' href='https://git.zelu.dev/digiid-ts-demo/commit/?id=4cc77ab44157764e003e0db242962384945dc2ad'/>
<id>urn:sha1:4cc77ab44157764e003e0db242962384945dc2ad</id>
<content type='text'>
- Upgraded digiid-ts from v1.1.1 to v2.0.0
- Resolved critical vulnerability in elliptic package (CVE for ECDSA signature cryptanalysis)
- Library now uses @noble/curves instead of bitcoinjs-message (removed elliptic dependency)
- Fixed additional low severity vulnerability in diff package
- All npm audit vulnerabilities now resolved (0 vulnerabilities)
- API unchanged, all existing code continues to work
</content>
</entry>
<entry>
<title>Fix security vulnerability: upgrade qs to 6.14.1</title>
<updated>2026-01-03T17:18:50Z</updated>
<author>
<name>Pawel Zelawski</name>
<email>pawel.zelawski@outlook.com</email>
</author>
<published>2026-01-03T17:18:50Z</published>
<link rel='alternate' type='text/html' href='https://git.zelu.dev/digiid-ts-demo/commit/?id=23f12a7fe7ed29b527ab0a31819255a1114b8acf'/>
<id>urn:sha1:23f12a7fe7ed29b527ab0a31819255a1114b8acf</id>
<content type='text'>
- Resolved CVE in qs library where arrayLimit bypass allowed DoS via memory exhaustion
- Updated qs from 6.13.0 to 6.14.1 via npm audit fix
- All security vulnerabilities now resolved
</content>
</entry>
<entry>
<title>chore: update dependencies and fix security vulnerabilities</title>
<updated>2025-12-20T20:16:50Z</updated>
<author>
<name>Pawel Zelawski</name>
<email>pawel.zelawski@outlook.com</email>
</author>
<published>2025-12-20T20:16:50Z</published>
<link rel='alternate' type='text/html' href='https://git.zelu.dev/digiid-ts-demo/commit/?id=1beb8c214c3d5c914ebdb1778804bbfa3901fe18'/>
<id>urn:sha1:1beb8c214c3d5c914ebdb1778804bbfa3901fe18</id>
<content type='text'>
- Update digiid-ts to 1.1.1 with security patches
- Fix brace-expansion, vite, sha.js, js-yaml, and eslint vulnerabilities
- All npm audit issues resolved
</content>
</entry>
<entry>
<title>chore: Update digiid-ts dependency and regenerate lockfile</title>
<updated>2025-04-14T09:48:26Z</updated>
<author>
<name>Pawel Zelawski</name>
<email>pawel.zelawski@outlook.com</email>
</author>
<published>2025-04-14T09:48:26Z</published>
<link rel='alternate' type='text/html' href='https://git.zelu.dev/digiid-ts-demo/commit/?id=ba95b414b6707319a2dbec7cfa9f4b23daa119ea'/>
<id>urn:sha1:ba95b414b6707319a2dbec7cfa9f4b23daa119ea</id>
<content type='text'>
Updated the 'digiid-ts' package to the latest version to incorporate its internal dependency change (replacing 'digibyte-message' with 'bitcoinjs-message').

Regenerated package-lock.json, which removed the outdated references to 'digibyte-message' and 'bitcore-message'.

Verified the build process completes successfully with the updated dependency.
</content>
</entry>
<entry>
<title>docs: Add live demo link and fix asset tracking</title>
<updated>2025-04-11T10:25:01Z</updated>
<author>
<name>Pawel Zelawski</name>
<email>pawel.zelawski@outlook.com</email>
</author>
<published>2025-04-11T10:25:01Z</published>
<link rel='alternate' type='text/html' href='https://git.zelu.dev/digiid-ts-demo/commit/?id=3b4531f31e848ecda2c5a3907b34a37c39ddc0c8'/>
<id>urn:sha1:3b4531f31e848ecda2c5a3907b34a37c39ddc0c8</id>
<content type='text'>
- Update README.md to include a new "Live Demo" section linking to https://digi-id.pzelawski.dev/.
- Remove the `public` entry from .gitignore to ensure static assets (like the logo) within the public directory are tracked by Git. This resolves issues where assets were missing after cloning the repository for deployment.
</content>
</entry>
</feed>
