@securitychecks/cli 0.1.1-rc.1 → 0.1.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.js +9 -9
- package/dist/index.js.map +1 -1
- package/dist/lib.js +5 -5
- package/dist/lib.js.map +1 -1
- package/package.json +2 -2
package/dist/index.js
CHANGED
|
@@ -3311,7 +3311,7 @@ function generateFindingId(finding) {
|
|
|
3311
3311
|
}
|
|
3312
3312
|
|
|
3313
3313
|
// src/baseline/storage.ts
|
|
3314
|
-
var CLI_VERSION3 = "0.1.1
|
|
3314
|
+
var CLI_VERSION3 = "0.1.1";
|
|
3315
3315
|
var SCHECK_DIR = ".scheck";
|
|
3316
3316
|
var BASELINE_FILE = "baseline.json";
|
|
3317
3317
|
var WAIVER_FILE = "waivers.json";
|
|
@@ -4045,7 +4045,7 @@ function toObservation(correlation, framework) {
|
|
|
4045
4045
|
signals: correlation.compoundingEffect.signals
|
|
4046
4046
|
},
|
|
4047
4047
|
meta: {
|
|
4048
|
-
clientVersion: "0.1.1
|
|
4048
|
+
clientVersion: "0.1.1",
|
|
4049
4049
|
requestId: randomUUID(),
|
|
4050
4050
|
timestamp: (/* @__PURE__ */ new Date()).toISOString()
|
|
4051
4051
|
}
|
|
@@ -4063,7 +4063,7 @@ async function reportCorrelations(result, config, framework) {
|
|
|
4063
4063
|
correlations: observations,
|
|
4064
4064
|
summary: result.stats,
|
|
4065
4065
|
meta: {
|
|
4066
|
-
clientVersion: "0.1.1
|
|
4066
|
+
clientVersion: "0.1.1",
|
|
4067
4067
|
framework
|
|
4068
4068
|
}
|
|
4069
4069
|
};
|
|
@@ -4075,7 +4075,7 @@ async function reportCorrelations(result, config, framework) {
|
|
|
4075
4075
|
headers: {
|
|
4076
4076
|
"Content-Type": "application/json",
|
|
4077
4077
|
...config.apiKey && { Authorization: `Bearer ${config.apiKey}` },
|
|
4078
|
-
"X-Client-Version": "0.1.1
|
|
4078
|
+
"X-Client-Version": "0.1.1"
|
|
4079
4079
|
},
|
|
4080
4080
|
body: JSON.stringify(payload),
|
|
4081
4081
|
signal: controller.signal
|
|
@@ -4131,7 +4131,7 @@ function buildTelemetry(result, options) {
|
|
|
4131
4131
|
} : void 0,
|
|
4132
4132
|
meta: {
|
|
4133
4133
|
duration: result.duration,
|
|
4134
|
-
clientVersion: "0.1.1
|
|
4134
|
+
clientVersion: "0.1.1",
|
|
4135
4135
|
mode: options.mode ?? (ciProvider ? "ci" : "manual"),
|
|
4136
4136
|
ciProvider
|
|
4137
4137
|
},
|
|
@@ -5368,7 +5368,7 @@ async function runSingleScan(options) {
|
|
|
5368
5368
|
}
|
|
5369
5369
|
}
|
|
5370
5370
|
if (options.sarif) {
|
|
5371
|
-
const cliVersion = "0.1.1
|
|
5371
|
+
const cliVersion = "0.1.1";
|
|
5372
5372
|
const sarifOutput = toSarif(result, cliVersion);
|
|
5373
5373
|
await writeFile(options.sarif, JSON.stringify(sarifOutput, null, 2), "utf-8");
|
|
5374
5374
|
if (!options.quiet) {
|
|
@@ -6336,7 +6336,7 @@ var CloudApiClient = class {
|
|
|
6336
6336
|
const headers = {
|
|
6337
6337
|
Authorization: `Bearer ${this.apiKey}`,
|
|
6338
6338
|
"Content-Type": "application/json",
|
|
6339
|
-
"User-Agent": `scheck-cli/${"0.1.1
|
|
6339
|
+
"User-Agent": `scheck-cli/${"0.1.1"}`
|
|
6340
6340
|
};
|
|
6341
6341
|
const bypassSecret = process.env["VERCEL_AUTOMATION_BYPASS_SECRET"];
|
|
6342
6342
|
if (bypassSecret) {
|
|
@@ -7023,7 +7023,7 @@ async function feedbackCommand(invariantIdOrFindingId, options) {
|
|
|
7023
7023
|
endpoint,
|
|
7024
7024
|
timeout: 5e3
|
|
7025
7025
|
};
|
|
7026
|
-
const clientVersion = "0.1.1
|
|
7026
|
+
const clientVersion = "0.1.1";
|
|
7027
7027
|
console.log(pc.dim("Sending feedback..."));
|
|
7028
7028
|
const success2 = await reportFeedback(
|
|
7029
7029
|
{
|
|
@@ -7225,7 +7225,7 @@ logger.success.bind(logger);
|
|
|
7225
7225
|
logger.fail.bind(logger);
|
|
7226
7226
|
|
|
7227
7227
|
// src/index.ts
|
|
7228
|
-
var version = "0.1.1
|
|
7228
|
+
var version = "0.1.1";
|
|
7229
7229
|
var program = new Command();
|
|
7230
7230
|
program.name("scheck").description("Enforce backend invariants in your codebase").version(version);
|
|
7231
7231
|
program.command("run").description("Scan for security invariants").option("-p, --path <path>", "Target path to audit (default: current directory)").option("-a, --artifact <path>", "Use pre-collected artifact from scc (skips collection)").option("--changed", "Only check changed files (requires git)").option("--ci", "CI mode - fail on new violations").option("--all", "Show all findings (don't stop early, include P2)").option("--include-p2", "Include P2 (medium) findings").option("--only <invariants...>", "Only run specific invariant checks").option("--skip <invariants...>", "Skip specific invariant checks").option("--json", "Output results as JSON").option("--sarif <path>", "Write SARIF report to file (for GitHub Code Scanning)").option("--quiet", "Suppress output except errors").option("-v, --verbose", "Enable verbose output").option("--calibrate", "Enable calibration API (default: enabled)").option("--offline", "Disable all API calls (not supported - shows error)").option("--calibration-endpoint <url>", "Override calibration API endpoint").option("--patterns", "Enable Pro Patterns fetching (default: enabled)").option("--no-patterns", "Disable Pro Patterns fetching").option("--pattern-endpoint <url>", "Override patterns API endpoint").option("--patterns-file <path>", "Load patterns from local JSON file (dev/testing)").option("-w, --watch", "Watch for file changes and re-run").option("--no-local-scan", "Skip local source-level pattern scanning").option("--no-usage-banner", "Suppress periodic API usage reminders").action((options) => {
|