@codyswann/lisa 1.83.0 → 1.84.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cli/index.d.ts.map +1 -1
- package/dist/cli/index.js +2 -0
- package/dist/cli/index.js.map +1 -1
- package/dist/configs/vitest/base.d.ts +6 -0
- package/dist/configs/vitest/base.d.ts.map +1 -1
- package/dist/configs/vitest/base.js +11 -0
- package/dist/configs/vitest/base.js.map +1 -1
- package/dist/configs/vitest/cdk.d.ts +2 -2
- package/dist/configs/vitest/cdk.d.ts.map +1 -1
- package/dist/configs/vitest/cdk.js +3 -2
- package/dist/configs/vitest/cdk.js.map +1 -1
- package/dist/configs/vitest/nestjs.d.ts +2 -2
- package/dist/configs/vitest/nestjs.d.ts.map +1 -1
- package/dist/configs/vitest/nestjs.js +3 -2
- package/dist/configs/vitest/nestjs.js.map +1 -1
- package/dist/configs/vitest/typescript.d.ts +2 -2
- package/dist/configs/vitest/typescript.d.ts.map +1 -1
- package/dist/configs/vitest/typescript.js +3 -3
- package/dist/configs/vitest/typescript.js.map +1 -1
- package/dist/core/config.d.ts +2 -0
- package/dist/core/config.d.ts.map +1 -1
- package/dist/core/config.js +2 -0
- package/dist/core/config.js.map +1 -1
- package/dist/core/lisa.d.ts +28 -0
- package/dist/core/lisa.d.ts.map +1 -1
- package/dist/core/lisa.js +99 -28
- package/dist/core/lisa.js.map +1 -1
- package/dist/migrations/ensure-lisa-postinstall.d.ts +28 -0
- package/dist/migrations/ensure-lisa-postinstall.d.ts.map +1 -0
- package/dist/migrations/ensure-lisa-postinstall.js +115 -0
- package/dist/migrations/ensure-lisa-postinstall.js.map +1 -0
- package/dist/migrations/ensure-tsconfig-local-includes.d.ts +56 -0
- package/dist/migrations/ensure-tsconfig-local-includes.d.ts.map +1 -0
- package/dist/migrations/ensure-tsconfig-local-includes.js +178 -0
- package/dist/migrations/ensure-tsconfig-local-includes.js.map +1 -0
- package/dist/migrations/index.d.ts +38 -0
- package/dist/migrations/index.d.ts.map +1 -0
- package/dist/migrations/index.js +65 -0
- package/dist/migrations/index.js.map +1 -0
- package/dist/migrations/migration.interface.d.ts +56 -0
- package/dist/migrations/migration.interface.d.ts.map +1 -0
- package/dist/migrations/migration.interface.js +2 -0
- package/dist/migrations/migration.interface.js.map +1 -0
- package/package.json +1 -1
- package/plugins/lisa/.claude-plugin/plugin.json +1 -1
- package/plugins/lisa-cdk/.claude-plugin/plugin.json +1 -1
- package/plugins/lisa-expo/.claude-plugin/plugin.json +1 -1
- package/plugins/lisa-nestjs/.claude-plugin/plugin.json +1 -1
- package/plugins/lisa-rails/.claude-plugin/plugin.json +1 -1
- package/plugins/lisa-typescript/.claude-plugin/plugin.json +1 -1
- package/typescript/copy-overwrite/audit.ignore.config.json +22 -47
|
@@ -4,139 +4,114 @@
|
|
|
4
4
|
"id": "GHSA-5j98-mcp5-4vw2",
|
|
5
5
|
"cve": "CVE-2025-64756",
|
|
6
6
|
"package": "glob",
|
|
7
|
-
"reason": "
|
|
7
|
+
"reason": "Command injection exploitable only via the `glob` CLI `-c`/`--cmd` flag; library API callers are unaffected and no deployable code paths invoke the CLI"
|
|
8
8
|
},
|
|
9
9
|
{
|
|
10
10
|
"id": "GHSA-8qq5-rm4j-mr97",
|
|
11
11
|
"package": "node-tar",
|
|
12
|
-
"reason": "
|
|
12
|
+
"reason": "Arbitrary file overwrite/symlink poisoning during tar extraction; requires extracting attacker-controlled archives, which no production code path does"
|
|
13
13
|
},
|
|
14
14
|
{
|
|
15
15
|
"id": "GHSA-37qj-frw5-hhjh",
|
|
16
16
|
"package": "fast-xml-parser",
|
|
17
|
-
"reason": "RangeError DoS with numeric entities
|
|
17
|
+
"reason": "RangeError DoS triggered only when parsing attacker-controlled XML with numeric entities; no production code parses untrusted XML"
|
|
18
18
|
},
|
|
19
19
|
{
|
|
20
20
|
"id": "GHSA-3ppc-4f35-3m26",
|
|
21
21
|
"package": "minimatch",
|
|
22
|
-
"reason": "ReDoS via repeated wildcards
|
|
22
|
+
"reason": "ReDoS via repeated wildcards in attacker-supplied glob patterns; no runtime code path passes untrusted input to minimatch"
|
|
23
23
|
},
|
|
24
24
|
{
|
|
25
25
|
"id": "GHSA-7r86-cg39-jmmj",
|
|
26
26
|
"package": "minimatch",
|
|
27
|
-
"reason": "ReDoS via multiple non-adjacent GLOBSTAR segments
|
|
27
|
+
"reason": "ReDoS via multiple non-adjacent GLOBSTAR segments in attacker-supplied glob patterns; no runtime code path passes untrusted input to minimatch"
|
|
28
28
|
},
|
|
29
29
|
{
|
|
30
30
|
"id": "GHSA-23c5-xmqv-rm74",
|
|
31
31
|
"package": "minimatch",
|
|
32
|
-
"reason": "ReDoS via nested
|
|
32
|
+
"reason": "ReDoS via nested extglob patterns; requires attacker-supplied glob input which no runtime code path accepts"
|
|
33
33
|
},
|
|
34
34
|
{
|
|
35
35
|
"id": "GHSA-2g4f-4pwh-qvx6",
|
|
36
36
|
"package": "ajv",
|
|
37
|
-
"reason": "ReDoS
|
|
37
|
+
"reason": "ReDoS requires the `$data` keyword option enabled in a schema; no projects enable `$data` or accept untrusted schemas at runtime"
|
|
38
38
|
},
|
|
39
39
|
{
|
|
40
40
|
"id": "GHSA-jmr7-xgp7-cmfj",
|
|
41
41
|
"package": "fast-xml-parser",
|
|
42
|
-
"reason": "DoS
|
|
42
|
+
"reason": "DoS via DOCTYPE entity expansion; requires parsing attacker-controlled XML with DOCTYPE, which no production code path does"
|
|
43
43
|
},
|
|
44
44
|
{
|
|
45
45
|
"id": "GHSA-m7jm-9gc2-mpf2",
|
|
46
46
|
"package": "fast-xml-parser",
|
|
47
|
-
"reason": "Entity encoding bypass via regex injection
|
|
47
|
+
"reason": "Entity encoding bypass via regex injection in DOCTYPE entity names; requires parsing attacker-controlled XML, which no production code path does"
|
|
48
48
|
},
|
|
49
49
|
{
|
|
50
50
|
"id": "GHSA-8gc5-j5rx-235r",
|
|
51
51
|
"package": "fast-xml-parser",
|
|
52
|
-
"reason": "Numeric entity expansion bypass
|
|
52
|
+
"reason": "Numeric entity expansion bypass; requires parsing attacker-controlled XML with expansion limits in play, which no production code path does"
|
|
53
53
|
},
|
|
54
54
|
{
|
|
55
55
|
"id": "GHSA-r6q2-hw4h-h46w",
|
|
56
56
|
"package": "node-tar",
|
|
57
|
-
"reason": "Race condition
|
|
57
|
+
"reason": "Race condition during tar extraction on macOS APFS; requires extracting attacker-controlled archives, which no production code path does"
|
|
58
58
|
},
|
|
59
59
|
{
|
|
60
60
|
"id": "GHSA-34x7-hfp2-rc4v",
|
|
61
61
|
"package": "node-tar",
|
|
62
|
-
"reason": "Arbitrary file creation via hardlink path traversal
|
|
62
|
+
"reason": "Arbitrary file creation via hardlink path traversal during extraction; requires extracting attacker-controlled archives, which no production code path does"
|
|
63
63
|
},
|
|
64
64
|
{
|
|
65
65
|
"id": "GHSA-83g3-92jg-28cx",
|
|
66
66
|
"package": "node-tar",
|
|
67
|
-
"reason": "Arbitrary file read/write via hardlink target escape
|
|
67
|
+
"reason": "Arbitrary file read/write via hardlink target escape during extraction; requires extracting attacker-controlled archives, which no production code path does"
|
|
68
68
|
},
|
|
69
69
|
{
|
|
70
70
|
"id": "GHSA-3h5v-q93c-6h6q",
|
|
71
71
|
"package": "ws",
|
|
72
|
-
"reason": "DoS
|
|
72
|
+
"reason": "DoS requires attacker-controlled HTTP header volume against a `ws` WebSocket server. Keep this exclusion only if your project's ingress controls (e.g., gateway, load balancer, reverse proxy) enforce header count limits before traffic reaches the Node process."
|
|
73
73
|
},
|
|
74
74
|
{
|
|
75
75
|
"id": "GHSA-w532-jxjh-hjhj",
|
|
76
76
|
"cve": "CVE-2025-29907",
|
|
77
77
|
"package": "jsPDF",
|
|
78
|
-
"reason": "ReDoS
|
|
78
|
+
"reason": "ReDoS requires attacker-controlled input to `addImage`. Keep this exclusion only if `addImage` is never called with untrusted image paths or buffers sourced from user input."
|
|
79
79
|
},
|
|
80
80
|
{
|
|
81
81
|
"id": "GHSA-8mvj-3j78-4qmw",
|
|
82
82
|
"cve": "CVE-2025-57810",
|
|
83
83
|
"package": "jsPDF",
|
|
84
|
-
"reason": "DoS
|
|
84
|
+
"reason": "DoS requires attacker-controlled input to `addImage`. Keep this exclusion only if `addImage` is never called with untrusted image paths or buffers sourced from user input."
|
|
85
85
|
},
|
|
86
86
|
{
|
|
87
87
|
"id": "GHSA-36jr-mh4h-2g58",
|
|
88
88
|
"package": "d3-color",
|
|
89
|
-
"reason": "ReDoS
|
|
89
|
+
"reason": "ReDoS requires attacker-controlled color strings passed to d3-color's parser. Keep this exclusion only if no runtime code path passes untrusted input (e.g., user-supplied color values) to d3-color functions."
|
|
90
90
|
},
|
|
91
91
|
{
|
|
92
92
|
"id": "GHSA-chqc-8p9q-pq6q",
|
|
93
93
|
"package": "basic-ftp",
|
|
94
|
-
"reason": "FTP command injection via CRLF
|
|
95
|
-
},
|
|
96
|
-
{
|
|
97
|
-
"id": "GHSA-3mfm-83xf-c92r",
|
|
98
|
-
"package": "handlebars",
|
|
99
|
-
"reason": "JS injection via AST type confusion — devDeps only (ts-jest, standard-version), no fix available (4.7.8 is latest)"
|
|
100
|
-
},
|
|
101
|
-
{
|
|
102
|
-
"id": "GHSA-2w6w-674q-4c4q",
|
|
103
|
-
"package": "handlebars",
|
|
104
|
-
"reason": "JS injection via AST type confusion — devDeps only (ts-jest, standard-version), no fix available (4.7.8 is latest)"
|
|
105
|
-
},
|
|
106
|
-
{
|
|
107
|
-
"id": "GHSA-xjpj-3mr7-gcpf",
|
|
108
|
-
"package": "handlebars",
|
|
109
|
-
"reason": "JS injection in CLI precompiler — devDeps only (ts-jest, standard-version), CLI not used"
|
|
110
|
-
},
|
|
111
|
-
{
|
|
112
|
-
"id": "GHSA-xhpv-hc6g-r9c6",
|
|
113
|
-
"package": "handlebars",
|
|
114
|
-
"reason": "JS injection via AST type confusion with dynamic partial — devDeps only (ts-jest, standard-version), no fix available"
|
|
115
|
-
},
|
|
116
|
-
{
|
|
117
|
-
"id": "GHSA-9cx6-37pm-9jff",
|
|
118
|
-
"package": "handlebars",
|
|
119
|
-
"reason": "DoS via malformed decorator syntax — devDeps only (ts-jest, standard-version), no fix available (4.7.8 is latest)"
|
|
94
|
+
"reason": "FTP command injection via CRLF requires attacker-controlled FTP command construction. Keep this exclusion only if no production code path uses FTP or passes untrusted input to FTP command parameters."
|
|
120
95
|
},
|
|
121
96
|
{
|
|
122
97
|
"id": "GHSA-r5fr-rjxr-66jc",
|
|
123
98
|
"package": "lodash",
|
|
124
|
-
"reason": "Code injection via _.template
|
|
99
|
+
"reason": "Code injection via `_.template` requires attacker-controlled input to `_.template` interpolation. Keep this exclusion only if no runtime code path invokes `_.template` with untrusted data."
|
|
125
100
|
},
|
|
126
101
|
{
|
|
127
102
|
"id": "GHSA-jg4p-7fhp-p32p",
|
|
128
103
|
"package": "@hapi/content",
|
|
129
|
-
"reason": "ReDoS
|
|
104
|
+
"reason": "ReDoS requires attacker-controlled HTTP Content-Type or Content-Disposition headers parsed by @hapi/content. Keep this exclusion only if no deployable code paths parse untrusted HTTP headers using this package."
|
|
130
105
|
},
|
|
131
106
|
{
|
|
132
107
|
"id": "GHSA-3p68-rc4w-qgx5",
|
|
133
108
|
"package": "axios",
|
|
134
|
-
"reason": "NO_PROXY hostname normalization bypass
|
|
109
|
+
"reason": "SSRF via NO_PROXY hostname normalization bypass requires attacker influence over proxy configuration. Keep this exclusion only if proxy settings (NO_PROXY, HTTP_PROXY, etc.) are never derived from untrusted input."
|
|
135
110
|
},
|
|
136
111
|
{
|
|
137
112
|
"id": "GHSA-fvcv-3m26-pcqx",
|
|
138
113
|
"package": "axios",
|
|
139
|
-
"reason": "Cloud metadata exfiltration
|
|
114
|
+
"reason": "Cloud metadata exfiltration requires attacker-controlled outbound request header values. Keep this exclusion only if axios request headers are never sourced from untrusted input."
|
|
140
115
|
}
|
|
141
116
|
]
|
|
142
117
|
}
|