@codyswann/lisa 1.92.0 → 1.94.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -78,7 +78,7 @@
78
78
  "lodash": ">=4.18.1"
79
79
  },
80
80
  "name": "@codyswann/lisa",
81
- "version": "1.92.0",
81
+ "version": "1.94.0",
82
82
  "description": "Claude Code governance framework that applies guardrails, guidance, and automated enforcement to projects",
83
83
  "main": "dist/index.js",
84
84
  "exports": {
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "lisa",
3
- "version": "1.92.0",
3
+ "version": "1.94.0",
4
4
  "description": "Universal governance — agents, skills, commands, hooks, and rules for all projects",
5
5
  "author": {
6
6
  "name": "Cody Swann"
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "lisa-cdk",
3
- "version": "1.92.0",
3
+ "version": "1.94.0",
4
4
  "description": "AWS CDK-specific plugin",
5
5
  "author": {
6
6
  "name": "Cody Swann"
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "lisa-expo",
3
- "version": "1.92.0",
3
+ "version": "1.94.0",
4
4
  "description": "Expo/React Native-specific skills, agents, rules, and MCP servers",
5
5
  "author": {
6
6
  "name": "Cody Swann"
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "lisa-nestjs",
3
- "version": "1.92.0",
3
+ "version": "1.94.0",
4
4
  "description": "NestJS-specific skills (GraphQL, TypeORM) and hooks (migration write-protection)",
5
5
  "author": {
6
6
  "name": "Cody Swann"
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "lisa-rails",
3
- "version": "1.92.0",
3
+ "version": "1.94.0",
4
4
  "description": "Ruby on Rails-specific hooks — RuboCop linting/formatting and ast-grep scanning on edit",
5
5
  "author": {
6
6
  "name": "Cody Swann"
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "lisa-typescript",
3
- "version": "1.92.0",
3
+ "version": "1.94.0",
4
4
  "description": "TypeScript-specific hooks — Prettier formatting, ESLint linting, and ast-grep scanning on edit",
5
5
  "author": {
6
6
  "name": "Cody Swann"
@@ -272,6 +272,20 @@ fi
272
272
  # fi
273
273
  # fi
274
274
 
275
+ # Project-specific extension slot (see .husky/pre-push.local).
276
+ # This hook sources pre-push.local if present so per-project checks
277
+ # (e.g., app-boot verification, schema validation) survive Lisa template
278
+ # updates without editing the governance block above.
279
+ if [ -f .husky/pre-push.local ]; then
280
+ echo "🔌 Running project-specific pre-push checks (.husky/pre-push.local)..."
281
+ # shellcheck source=/dev/null
282
+ . .husky/pre-push.local
283
+ if [ $? -ne 0 ]; then
284
+ echo "❌ Project-specific pre-push checks failed."
285
+ exit 1
286
+ fi
287
+ fi
288
+
275
289
  exit 0
276
290
 
277
291
  # END: AI GUARDRAILS
@@ -117,6 +117,26 @@
117
117
  "id": "GHSA-fvcv-3m26-pcqx",
118
118
  "package": "axios",
119
119
  "reason": "Cloud metadata exfiltration requires attacker-controlled outbound request header values. Keep this exclusion only if axios request headers are never sourced from untrusted input."
120
+ },
121
+ {
122
+ "id": "GHSA-2v35-w6hq-6mfw",
123
+ "package": "@xmldom/xmldom",
124
+ "reason": "Uncontrolled recursion in XML serialization leading to DoS. Transitive via expo > @expo/config-plugins > @expo/plist; only serializes developer-authored plist files at build/prebuild time, no runtime code path parses or serializes attacker-controlled XML."
125
+ },
126
+ {
127
+ "id": "GHSA-f6ww-3ggp-fr8h",
128
+ "package": "@xmldom/xmldom",
129
+ "reason": "XML injection via unvalidated DocumentType serialization. Transitive via expo > @expo/config-plugins > @expo/plist; only serializes developer-authored plist files at build/prebuild time, no runtime code path serializes attacker-controlled XML."
130
+ },
131
+ {
132
+ "id": "GHSA-x6wf-f3px-wcqx",
133
+ "package": "@xmldom/xmldom",
134
+ "reason": "XML node injection via unvalidated processing instruction serialization. Transitive via expo > @expo/config-plugins > @expo/plist; only serializes developer-authored plist files at build/prebuild time, no runtime code path serializes attacker-controlled XML."
135
+ },
136
+ {
137
+ "id": "GHSA-j759-j44w-7fr8",
138
+ "package": "@xmldom/xmldom",
139
+ "reason": "XML node injection via unvalidated comment serialization. Transitive via expo > @expo/config-plugins > @expo/plist; only serializes developer-authored plist files at build/prebuild time, no runtime code path serializes attacker-controlled XML."
120
140
  }
121
141
  ]
122
142
  }
@@ -0,0 +1,17 @@
1
+ # Project-specific pre-push checks
2
+ #
3
+ # This file is sourced by .husky/pre-push after Lisa's governance block.
4
+ # Add commands here that are unique to this project — Lisa will never
5
+ # overwrite or delete this file on future template updates.
6
+ #
7
+ # The file runs as a sourced POSIX script. Any non-zero exit aborts the push.
8
+ #
9
+ # Examples:
10
+ # # NestJS AppModule + GraphQL schema boot verification
11
+ # $RUNNER verify:boot || exit 1
12
+ #
13
+ # # Project-specific migration lint
14
+ # $RUNNER migrations:check || exit 1
15
+ #
16
+ # $RUNNER is set by the parent hook based on the detected package manager
17
+ # (bun run / yarn run / npm run).