@codyswann/lisa 1.83.0 → 1.84.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (51) hide show
  1. package/dist/cli/index.d.ts.map +1 -1
  2. package/dist/cli/index.js +2 -0
  3. package/dist/cli/index.js.map +1 -1
  4. package/dist/configs/vitest/base.d.ts +6 -0
  5. package/dist/configs/vitest/base.d.ts.map +1 -1
  6. package/dist/configs/vitest/base.js +11 -0
  7. package/dist/configs/vitest/base.js.map +1 -1
  8. package/dist/configs/vitest/cdk.d.ts +2 -2
  9. package/dist/configs/vitest/cdk.d.ts.map +1 -1
  10. package/dist/configs/vitest/cdk.js +3 -2
  11. package/dist/configs/vitest/cdk.js.map +1 -1
  12. package/dist/configs/vitest/nestjs.d.ts +2 -2
  13. package/dist/configs/vitest/nestjs.d.ts.map +1 -1
  14. package/dist/configs/vitest/nestjs.js +3 -2
  15. package/dist/configs/vitest/nestjs.js.map +1 -1
  16. package/dist/configs/vitest/typescript.d.ts +2 -2
  17. package/dist/configs/vitest/typescript.d.ts.map +1 -1
  18. package/dist/configs/vitest/typescript.js +3 -3
  19. package/dist/configs/vitest/typescript.js.map +1 -1
  20. package/dist/core/config.d.ts +2 -0
  21. package/dist/core/config.d.ts.map +1 -1
  22. package/dist/core/config.js +2 -0
  23. package/dist/core/config.js.map +1 -1
  24. package/dist/core/lisa.d.ts +28 -0
  25. package/dist/core/lisa.d.ts.map +1 -1
  26. package/dist/core/lisa.js +99 -28
  27. package/dist/core/lisa.js.map +1 -1
  28. package/dist/migrations/ensure-lisa-postinstall.d.ts +28 -0
  29. package/dist/migrations/ensure-lisa-postinstall.d.ts.map +1 -0
  30. package/dist/migrations/ensure-lisa-postinstall.js +115 -0
  31. package/dist/migrations/ensure-lisa-postinstall.js.map +1 -0
  32. package/dist/migrations/ensure-tsconfig-local-includes.d.ts +56 -0
  33. package/dist/migrations/ensure-tsconfig-local-includes.d.ts.map +1 -0
  34. package/dist/migrations/ensure-tsconfig-local-includes.js +178 -0
  35. package/dist/migrations/ensure-tsconfig-local-includes.js.map +1 -0
  36. package/dist/migrations/index.d.ts +38 -0
  37. package/dist/migrations/index.d.ts.map +1 -0
  38. package/dist/migrations/index.js +65 -0
  39. package/dist/migrations/index.js.map +1 -0
  40. package/dist/migrations/migration.interface.d.ts +56 -0
  41. package/dist/migrations/migration.interface.d.ts.map +1 -0
  42. package/dist/migrations/migration.interface.js +2 -0
  43. package/dist/migrations/migration.interface.js.map +1 -0
  44. package/package.json +1 -1
  45. package/plugins/lisa/.claude-plugin/plugin.json +1 -1
  46. package/plugins/lisa-cdk/.claude-plugin/plugin.json +1 -1
  47. package/plugins/lisa-expo/.claude-plugin/plugin.json +1 -1
  48. package/plugins/lisa-nestjs/.claude-plugin/plugin.json +1 -1
  49. package/plugins/lisa-rails/.claude-plugin/plugin.json +1 -1
  50. package/plugins/lisa-typescript/.claude-plugin/plugin.json +1 -1
  51. package/typescript/copy-overwrite/audit.ignore.config.json +22 -47
@@ -4,139 +4,114 @@
4
4
  "id": "GHSA-5j98-mcp5-4vw2",
5
5
  "cve": "CVE-2025-64756",
6
6
  "package": "glob",
7
- "reason": "CLI command injection only affects glob CLI --cmd flag, not library usage"
7
+ "reason": "Command injection exploitable only via the `glob` CLI `-c`/`--cmd` flag; library API callers are unaffected and no deployable code paths invoke the CLI"
8
8
  },
9
9
  {
10
10
  "id": "GHSA-8qq5-rm4j-mr97",
11
11
  "package": "node-tar",
12
- "reason": "Path sanitization vulnerability nested in @expo/cli, tar extraction not in our code path"
12
+ "reason": "Arbitrary file overwrite/symlink poisoning during tar extraction; requires extracting attacker-controlled archives, which no production code path does"
13
13
  },
14
14
  {
15
15
  "id": "GHSA-37qj-frw5-hhjh",
16
16
  "package": "fast-xml-parser",
17
- "reason": "RangeError DoS with numeric entities transitive via React Native CLI, build tool only"
17
+ "reason": "RangeError DoS triggered only when parsing attacker-controlled XML with numeric entities; no production code parses untrusted XML"
18
18
  },
19
19
  {
20
20
  "id": "GHSA-3ppc-4f35-3m26",
21
21
  "package": "minimatch",
22
- "reason": "ReDoS via repeated wildcards devDeps only, fix requires breaking minimatch v10"
22
+ "reason": "ReDoS via repeated wildcards in attacker-supplied glob patterns; no runtime code path passes untrusted input to minimatch"
23
23
  },
24
24
  {
25
25
  "id": "GHSA-7r86-cg39-jmmj",
26
26
  "package": "minimatch",
27
- "reason": "ReDoS via multiple non-adjacent GLOBSTAR segments devDeps only, fix requires minimatch >=3.1.3"
27
+ "reason": "ReDoS via multiple non-adjacent GLOBSTAR segments in attacker-supplied glob patterns; no runtime code path passes untrusted input to minimatch"
28
28
  },
29
29
  {
30
30
  "id": "GHSA-23c5-xmqv-rm74",
31
31
  "package": "minimatch",
32
- "reason": "ReDoS via nested *() extglobs devDeps only, fix requires minimatch >=3.1.3"
32
+ "reason": "ReDoS via nested extglob patterns; requires attacker-supplied glob input which no runtime code path accepts"
33
33
  },
34
34
  {
35
35
  "id": "GHSA-2g4f-4pwh-qvx6",
36
36
  "package": "ajv",
37
- "reason": "ReDoS with $data option $data option not used, nested in aws-cdk-lib/eslint"
37
+ "reason": "ReDoS requires the `$data` keyword option enabled in a schema; no projects enable `$data` or accept untrusted schemas at runtime"
38
38
  },
39
39
  {
40
40
  "id": "GHSA-jmr7-xgp7-cmfj",
41
41
  "package": "fast-xml-parser",
42
- "reason": "DoS through entity expansion in DOCTYPE transitive via AWS SDK, no untrusted XML parsing"
42
+ "reason": "DoS via DOCTYPE entity expansion; requires parsing attacker-controlled XML with DOCTYPE, which no production code path does"
43
43
  },
44
44
  {
45
45
  "id": "GHSA-m7jm-9gc2-mpf2",
46
46
  "package": "fast-xml-parser",
47
- "reason": "Entity encoding bypass via regex injection same path as GHSA-jmr7-xgp7-cmfj"
47
+ "reason": "Entity encoding bypass via regex injection in DOCTYPE entity names; requires parsing attacker-controlled XML, which no production code path does"
48
48
  },
49
49
  {
50
50
  "id": "GHSA-8gc5-j5rx-235r",
51
51
  "package": "fast-xml-parser",
52
- "reason": "Numeric entity expansion bypass (incomplete fix for CVE-2026-26278) transitive via AWS SDK, no untrusted XML parsing"
52
+ "reason": "Numeric entity expansion bypass; requires parsing attacker-controlled XML with expansion limits in play, which no production code path does"
53
53
  },
54
54
  {
55
55
  "id": "GHSA-r6q2-hw4h-h46w",
56
56
  "package": "node-tar",
57
- "reason": "Race condition via Unicode Ligature Collisions on macOS APFS transitive via NestJS/Apollo, tar not used in production"
57
+ "reason": "Race condition during tar extraction on macOS APFS; requires extracting attacker-controlled archives, which no production code path does"
58
58
  },
59
59
  {
60
60
  "id": "GHSA-34x7-hfp2-rc4v",
61
61
  "package": "node-tar",
62
- "reason": "Arbitrary file creation via hardlink path traversal same path as GHSA-r6q2-hw4h-h46w"
62
+ "reason": "Arbitrary file creation via hardlink path traversal during extraction; requires extracting attacker-controlled archives, which no production code path does"
63
63
  },
64
64
  {
65
65
  "id": "GHSA-83g3-92jg-28cx",
66
66
  "package": "node-tar",
67
- "reason": "Arbitrary file read/write via hardlink target escape same path as GHSA-r6q2-hw4h-h46w"
67
+ "reason": "Arbitrary file read/write via hardlink target escape during extraction; requires extracting attacker-controlled archives, which no production code path does"
68
68
  },
69
69
  {
70
70
  "id": "GHSA-3h5v-q93c-6h6q",
71
71
  "package": "ws",
72
- "reason": "DoS via many HTTP headers WebSocket servers behind API Gateway which limits headers"
72
+ "reason": "DoS requires attacker-controlled HTTP header volume against a `ws` WebSocket server. Keep this exclusion only if your project's ingress controls (e.g., gateway, load balancer, reverse proxy) enforce header count limits before traffic reaches the Node process."
73
73
  },
74
74
  {
75
75
  "id": "GHSA-w532-jxjh-hjhj",
76
76
  "cve": "CVE-2025-29907",
77
77
  "package": "jsPDF",
78
- "reason": "ReDoS in addImage controlled usage only, no user-controlled input to addImage"
78
+ "reason": "ReDoS requires attacker-controlled input to `addImage`. Keep this exclusion only if `addImage` is never called with untrusted image paths or buffers sourced from user input."
79
79
  },
80
80
  {
81
81
  "id": "GHSA-8mvj-3j78-4qmw",
82
82
  "cve": "CVE-2025-57810",
83
83
  "package": "jsPDF",
84
- "reason": "DoS in addImage controlled usage only, no user-controlled input to addImage"
84
+ "reason": "DoS requires attacker-controlled input to `addImage`. Keep this exclusion only if `addImage` is never called with untrusted image paths or buffers sourced from user input."
85
85
  },
86
86
  {
87
87
  "id": "GHSA-36jr-mh4h-2g58",
88
88
  "package": "d3-color",
89
- "reason": "ReDoS transitive via react-native-svg-charts, color parsing not user-controlled"
89
+ "reason": "ReDoS requires attacker-controlled color strings passed to d3-color's parser. Keep this exclusion only if no runtime code path passes untrusted input (e.g., user-supplied color values) to d3-color functions."
90
90
  },
91
91
  {
92
92
  "id": "GHSA-chqc-8p9q-pq6q",
93
93
  "package": "basic-ftp",
94
- "reason": "FTP command injection via CRLF devDep only via @lhci/cli > proxy-agent > pac-proxy-agent > get-uri, no FTP usage in production code"
95
- },
96
- {
97
- "id": "GHSA-3mfm-83xf-c92r",
98
- "package": "handlebars",
99
- "reason": "JS injection via AST type confusion — devDeps only (ts-jest, standard-version), no fix available (4.7.8 is latest)"
100
- },
101
- {
102
- "id": "GHSA-2w6w-674q-4c4q",
103
- "package": "handlebars",
104
- "reason": "JS injection via AST type confusion — devDeps only (ts-jest, standard-version), no fix available (4.7.8 is latest)"
105
- },
106
- {
107
- "id": "GHSA-xjpj-3mr7-gcpf",
108
- "package": "handlebars",
109
- "reason": "JS injection in CLI precompiler — devDeps only (ts-jest, standard-version), CLI not used"
110
- },
111
- {
112
- "id": "GHSA-xhpv-hc6g-r9c6",
113
- "package": "handlebars",
114
- "reason": "JS injection via AST type confusion with dynamic partial — devDeps only (ts-jest, standard-version), no fix available"
115
- },
116
- {
117
- "id": "GHSA-9cx6-37pm-9jff",
118
- "package": "handlebars",
119
- "reason": "DoS via malformed decorator syntax — devDeps only (ts-jest, standard-version), no fix available (4.7.8 is latest)"
94
+ "reason": "FTP command injection via CRLF requires attacker-controlled FTP command construction. Keep this exclusion only if no production code path uses FTP or passes untrusted input to FTP command parameters."
120
95
  },
121
96
  {
122
97
  "id": "GHSA-r5fr-rjxr-66jc",
123
98
  "package": "lodash",
124
- "reason": "Code injection via _.template devDeps only (serverless-export-env, commitlint, standard-version), no user input to _.template"
99
+ "reason": "Code injection via `_.template` requires attacker-controlled input to `_.template` interpolation. Keep this exclusion only if no runtime code path invokes `_.template` with untrusted data."
125
100
  },
126
101
  {
127
102
  "id": "GHSA-jg4p-7fhp-p32p",
128
103
  "package": "@hapi/content",
129
- "reason": "ReDoS in HTTP header parsing devDeps only (serverless-offline), local dev tool not deployed"
104
+ "reason": "ReDoS requires attacker-controlled HTTP Content-Type or Content-Disposition headers parsed by @hapi/content. Keep this exclusion only if no deployable code paths parse untrusted HTTP headers using this package."
130
105
  },
131
106
  {
132
107
  "id": "GHSA-3p68-rc4w-qgx5",
133
108
  "package": "axios",
134
- "reason": "NO_PROXY hostname normalization bypass devDeps only (serverless), no user-controlled proxy config"
109
+ "reason": "SSRF via NO_PROXY hostname normalization bypass requires attacker influence over proxy configuration. Keep this exclusion only if proxy settings (NO_PROXY, HTTP_PROXY, etc.) are never derived from untrusted input."
135
110
  },
136
111
  {
137
112
  "id": "GHSA-fvcv-3m26-pcqx",
138
113
  "package": "axios",
139
- "reason": "Cloud metadata exfiltration via header injection devDeps only (serverless), no user-controlled headers"
114
+ "reason": "Cloud metadata exfiltration requires attacker-controlled outbound request header values. Keep this exclusion only if axios request headers are never sourced from untrusted input."
140
115
  }
141
116
  ]
142
117
  }