@codyswann/lisa 1.92.0 → 1.94.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +1 -1
- package/plugins/lisa/.claude-plugin/plugin.json +1 -1
- package/plugins/lisa-cdk/.claude-plugin/plugin.json +1 -1
- package/plugins/lisa-expo/.claude-plugin/plugin.json +1 -1
- package/plugins/lisa-nestjs/.claude-plugin/plugin.json +1 -1
- package/plugins/lisa-rails/.claude-plugin/plugin.json +1 -1
- package/plugins/lisa-typescript/.claude-plugin/plugin.json +1 -1
- package/typescript/copy-contents/.husky/pre-push +14 -0
- package/typescript/copy-overwrite/audit.ignore.config.json +20 -0
- package/typescript/create-only/.husky/pre-push.local +17 -0
package/package.json
CHANGED
|
@@ -78,7 +78,7 @@
|
|
|
78
78
|
"lodash": ">=4.18.1"
|
|
79
79
|
},
|
|
80
80
|
"name": "@codyswann/lisa",
|
|
81
|
-
"version": "1.
|
|
81
|
+
"version": "1.94.0",
|
|
82
82
|
"description": "Claude Code governance framework that applies guardrails, guidance, and automated enforcement to projects",
|
|
83
83
|
"main": "dist/index.js",
|
|
84
84
|
"exports": {
|
|
@@ -272,6 +272,20 @@ fi
|
|
|
272
272
|
# fi
|
|
273
273
|
# fi
|
|
274
274
|
|
|
275
|
+
# Project-specific extension slot (see .husky/pre-push.local).
|
|
276
|
+
# This hook sources pre-push.local if present so per-project checks
|
|
277
|
+
# (e.g., app-boot verification, schema validation) survive Lisa template
|
|
278
|
+
# updates without editing the governance block above.
|
|
279
|
+
if [ -f .husky/pre-push.local ]; then
|
|
280
|
+
echo "🔌 Running project-specific pre-push checks (.husky/pre-push.local)..."
|
|
281
|
+
# shellcheck source=/dev/null
|
|
282
|
+
. .husky/pre-push.local
|
|
283
|
+
if [ $? -ne 0 ]; then
|
|
284
|
+
echo "❌ Project-specific pre-push checks failed."
|
|
285
|
+
exit 1
|
|
286
|
+
fi
|
|
287
|
+
fi
|
|
288
|
+
|
|
275
289
|
exit 0
|
|
276
290
|
|
|
277
291
|
# END: AI GUARDRAILS
|
|
@@ -117,6 +117,26 @@
|
|
|
117
117
|
"id": "GHSA-fvcv-3m26-pcqx",
|
|
118
118
|
"package": "axios",
|
|
119
119
|
"reason": "Cloud metadata exfiltration requires attacker-controlled outbound request header values. Keep this exclusion only if axios request headers are never sourced from untrusted input."
|
|
120
|
+
},
|
|
121
|
+
{
|
|
122
|
+
"id": "GHSA-2v35-w6hq-6mfw",
|
|
123
|
+
"package": "@xmldom/xmldom",
|
|
124
|
+
"reason": "Uncontrolled recursion in XML serialization leading to DoS. Transitive via expo > @expo/config-plugins > @expo/plist; only serializes developer-authored plist files at build/prebuild time, no runtime code path parses or serializes attacker-controlled XML."
|
|
125
|
+
},
|
|
126
|
+
{
|
|
127
|
+
"id": "GHSA-f6ww-3ggp-fr8h",
|
|
128
|
+
"package": "@xmldom/xmldom",
|
|
129
|
+
"reason": "XML injection via unvalidated DocumentType serialization. Transitive via expo > @expo/config-plugins > @expo/plist; only serializes developer-authored plist files at build/prebuild time, no runtime code path serializes attacker-controlled XML."
|
|
130
|
+
},
|
|
131
|
+
{
|
|
132
|
+
"id": "GHSA-x6wf-f3px-wcqx",
|
|
133
|
+
"package": "@xmldom/xmldom",
|
|
134
|
+
"reason": "XML node injection via unvalidated processing instruction serialization. Transitive via expo > @expo/config-plugins > @expo/plist; only serializes developer-authored plist files at build/prebuild time, no runtime code path serializes attacker-controlled XML."
|
|
135
|
+
},
|
|
136
|
+
{
|
|
137
|
+
"id": "GHSA-j759-j44w-7fr8",
|
|
138
|
+
"package": "@xmldom/xmldom",
|
|
139
|
+
"reason": "XML node injection via unvalidated comment serialization. Transitive via expo > @expo/config-plugins > @expo/plist; only serializes developer-authored plist files at build/prebuild time, no runtime code path serializes attacker-controlled XML."
|
|
120
140
|
}
|
|
121
141
|
]
|
|
122
142
|
}
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
# Project-specific pre-push checks
|
|
2
|
+
#
|
|
3
|
+
# This file is sourced by .husky/pre-push after Lisa's governance block.
|
|
4
|
+
# Add commands here that are unique to this project — Lisa will never
|
|
5
|
+
# overwrite or delete this file on future template updates.
|
|
6
|
+
#
|
|
7
|
+
# The file runs as a sourced POSIX script. Any non-zero exit aborts the push.
|
|
8
|
+
#
|
|
9
|
+
# Examples:
|
|
10
|
+
# # NestJS AppModule + GraphQL schema boot verification
|
|
11
|
+
# $RUNNER verify:boot || exit 1
|
|
12
|
+
#
|
|
13
|
+
# # Project-specific migration lint
|
|
14
|
+
# $RUNNER migrations:check || exit 1
|
|
15
|
+
#
|
|
16
|
+
# $RUNNER is set by the parent hook based on the detected package manager
|
|
17
|
+
# (bun run / yarn run / npm run).
|