@runa-ai/runa-cli 0.5.34 → 0.5.35

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.js CHANGED
@@ -925,7 +925,7 @@ var CLI_VERSION, HAS_ADMIN_COMMAND;
925
925
  var init_version = __esm({
926
926
  "src/version.ts"() {
927
927
  init_esm_shims();
928
- CLI_VERSION = "0.5.34";
928
+ CLI_VERSION = "0.5.35";
929
929
  HAS_ADMIN_COMMAND = false;
930
930
  }
931
931
  });
@@ -1722,7 +1722,8 @@ function checkBase64ForSecrets(base64String) {
1722
1722
  const decoded = Buffer.from(base64String, "base64").toString("utf-8");
1723
1723
  for (const indicator of BASE64_SECRET_INDICATORS) {
1724
1724
  if (decoded.startsWith(indicator)) {
1725
- return { found: true, decoded: `${decoded.substring(0, 20)}...` };
1725
+ const secretType = getSecretTypeFromIndicator(indicator);
1726
+ return { found: true, secretType };
1726
1727
  }
1727
1728
  }
1728
1729
  return { found: false };
@@ -1730,6 +1731,18 @@ function checkBase64ForSecrets(base64String) {
1730
1731
  return { found: false };
1731
1732
  }
1732
1733
  }
1734
+ function getSecretTypeFromIndicator(indicator) {
1735
+ const indicatorMap = {
1736
+ "sk-": "OpenAI/Stripe API key",
1737
+ ghp_: "GitHub Personal Access Token",
1738
+ gho_: "GitHub OAuth Token",
1739
+ AKIA: "AWS Access Key",
1740
+ eyJ: "JWT Token",
1741
+ vercel_: "Vercel Token",
1742
+ sbp_: "Supabase Token"
1743
+ };
1744
+ return indicatorMap[indicator] ?? "Unknown secret type";
1745
+ }
1733
1746
  function isCommentLine(line) {
1734
1747
  const trimmed = line.trim();
1735
1748
  return trimmed.startsWith("//") || trimmed.startsWith("#") || trimmed.startsWith("*") || trimmed.startsWith("/*") || trimmed.startsWith("<!--") || trimmed.startsWith("--");
@@ -1982,7 +1995,7 @@ function scanLineForSecrets(line, lineNumber, filePath) {
1982
1995
  ruleId: "secret/base64-encoded",
1983
1996
  severity: "high",
1984
1997
  title: "Base64-Encoded Secret",
1985
- description: `Base64-encoded secret detected. Decoded prefix: ${result.decoded}`,
1998
+ description: `Base64-encoded secret detected. Type: ${result.secretType}`,
1986
1999
  location: {
1987
2000
  file: filePath,
1988
2001
  line: lineNumber,
@@ -1 +1 @@
1
- {"version":3,"file":"secret-analyzer.d.ts","sourceRoot":"","sources":["../../../../src/internal/vuln-checker/analyzers/secret-analyzer.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;;;GAkBG;AAKH,OAAO,KAAK,EAAE,QAAQ,EAAE,eAAe,EAAE,QAAQ,EAAE,OAAO,EAAoB,MAAM,aAAa,CAAC;AAgiClG;;GAEG;AACH,qBAAa,cAAe,YAAW,QAAQ;IAC7C,IAAI,SAAoB;IACxB,UAAU,EAAE,QAAQ,EAAE,CAAc;IAE9B,OAAO,CAAC,OAAO,EAAE,eAAe,GAAG,OAAO,CAAC,OAAO,EAAE,CAAC;YAkB7C,cAAc;IAY5B,OAAO,CAAC,UAAU;CAGnB"}
1
+ {"version":3,"file":"secret-analyzer.d.ts","sourceRoot":"","sources":["../../../../src/internal/vuln-checker/analyzers/secret-analyzer.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;;;GAkBG;AAKH,OAAO,KAAK,EAAE,QAAQ,EAAE,eAAe,EAAE,QAAQ,EAAE,OAAO,EAAoB,MAAM,aAAa,CAAC;AA2jClG;;GAEG;AACH,qBAAa,cAAe,YAAW,QAAQ;IAC7C,IAAI,SAAoB;IACxB,UAAU,EAAE,QAAQ,EAAE,CAAc;IAE9B,OAAO,CAAC,OAAO,EAAE,eAAe,GAAG,OAAO,CAAC,OAAO,EAAE,CAAC;YAkB7C,cAAc;IAY5B,OAAO,CAAC,UAAU;CAGnB"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@runa-ai/runa-cli",
3
- "version": "0.5.34",
3
+ "version": "0.5.35",
4
4
  "private": false,
5
5
  "description": "AI-powered DevOps CLI",
6
6
  "type": "module",
@@ -53,7 +53,7 @@
53
53
  "xstate": "5.25.0",
54
54
  "zod": "4.3.5",
55
55
  "@runa-ai/runa": "0.5.33",
56
- "@runa-ai/runa-xstate-test-plugin": "0.5.28"
56
+ "@runa-ai/runa-xstate-test-plugin": "0.5.35"
57
57
  },
58
58
  "engines": {
59
59
  "node": ">=20.0.0"