@zerothreatai/vulnerability-registry 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (76) hide show
  1. package/dist/categories/authentication.d.ts +8 -0
  2. package/dist/categories/authentication.js +375 -0
  3. package/dist/categories/configuration.d.ts +8 -0
  4. package/dist/categories/configuration.js +903 -0
  5. package/dist/categories/injection.d.ts +8 -0
  6. package/dist/categories/injection.js +747 -0
  7. package/dist/categories/sensitive-paths.d.ts +9 -0
  8. package/dist/categories/sensitive-paths.js +1788 -0
  9. package/dist/categories/ssrf.d.ts +8 -0
  10. package/dist/categories/ssrf.js +247 -0
  11. package/dist/categories/xss.d.ts +7 -0
  12. package/dist/categories/xss.js +325 -0
  13. package/dist/error-codes.d.ts +242 -0
  14. package/dist/error-codes.js +312 -0
  15. package/dist/index.d.ts +60 -0
  16. package/dist/index.js +92 -0
  17. package/dist/types.d.ts +86 -0
  18. package/dist/types.js +6 -0
  19. package/dist-cjs/categories/authentication.js +378 -0
  20. package/dist-cjs/categories/configuration.js +906 -0
  21. package/dist-cjs/categories/injection.js +750 -0
  22. package/dist-cjs/categories/sensitive-paths.js +1791 -0
  23. package/dist-cjs/categories/ssrf.js +250 -0
  24. package/dist-cjs/categories/xss.js +328 -0
  25. package/dist-cjs/error-codes.js +315 -0
  26. package/dist-cjs/index.js +107 -0
  27. package/dist-cjs/types.js +7 -0
  28. package/package.json +35 -0
  29. package/src/categories/authentication.d.ts +8 -0
  30. package/src/categories/authentication.d.ts.map +1 -0
  31. package/src/categories/authentication.js +378 -0
  32. package/src/categories/authentication.js.map +1 -0
  33. package/src/categories/authentication.ts +395 -0
  34. package/src/categories/configuration.d.ts +8 -0
  35. package/src/categories/configuration.d.ts.map +1 -0
  36. package/src/categories/configuration.js +906 -0
  37. package/src/categories/configuration.js.map +1 -0
  38. package/src/categories/configuration.ts +948 -0
  39. package/src/categories/injection.d.ts +8 -0
  40. package/src/categories/injection.d.ts.map +1 -0
  41. package/src/categories/injection.js +750 -0
  42. package/src/categories/injection.js.map +1 -0
  43. package/src/categories/injection.ts +785 -0
  44. package/src/categories/sensitive-paths.d.ts +9 -0
  45. package/src/categories/sensitive-paths.d.ts.map +1 -0
  46. package/src/categories/sensitive-paths.js +1791 -0
  47. package/src/categories/sensitive-paths.js.map +1 -0
  48. package/src/categories/sensitive-paths.ts +1875 -0
  49. package/src/categories/ssrf.d.ts +8 -0
  50. package/src/categories/ssrf.d.ts.map +1 -0
  51. package/src/categories/ssrf.js +250 -0
  52. package/src/categories/ssrf.js.map +1 -0
  53. package/src/categories/ssrf.ts +261 -0
  54. package/src/categories/xss.d.ts +7 -0
  55. package/src/categories/xss.d.ts.map +1 -0
  56. package/src/categories/xss.js +328 -0
  57. package/src/categories/xss.js.map +1 -0
  58. package/src/categories/xss.ts +342 -0
  59. package/src/error-codes.d.ts +242 -0
  60. package/src/error-codes.d.ts.map +1 -0
  61. package/src/error-codes.js +315 -0
  62. package/src/error-codes.js.map +1 -0
  63. package/src/error-codes.ts +334 -0
  64. package/src/index.d.ts +60 -0
  65. package/src/index.d.ts.map +1 -0
  66. package/src/index.js +107 -0
  67. package/src/index.js.map +1 -0
  68. package/src/index.ts +126 -0
  69. package/src/types.d.ts +86 -0
  70. package/src/types.d.ts.map +1 -0
  71. package/src/types.js +7 -0
  72. package/src/types.js.map +1 -0
  73. package/src/types.ts +109 -0
  74. package/tsconfig.cjs.json +8 -0
  75. package/tsconfig.json +21 -0
  76. package/vulnerability-registry.zip +0 -0
@@ -0,0 +1,315 @@
1
+ "use strict";
2
+ /**
3
+ * Vulnerability Registry - Error Codes
4
+ *
5
+ * Central enum containing all vulnerability error codes across all scanners.
6
+ * Each code maps to a complete VulnerabilityDefinition.
7
+ */
8
+ Object.defineProperty(exports, "__esModule", { value: true });
9
+ exports.VulnerabilityCode = void 0;
10
+ var VulnerabilityCode;
11
+ (function (VulnerabilityCode) {
12
+ // ========================================
13
+ // SQL INJECTION (SQLI_*)
14
+ // ========================================
15
+ VulnerabilityCode["SQLI_ERROR_BASED"] = "SQLI_ERROR_BASED";
16
+ VulnerabilityCode["SQLI_BOOLEAN_BASED"] = "SQLI_BOOLEAN_BASED";
17
+ VulnerabilityCode["SQLI_TIME_BASED"] = "SQLI_TIME_BASED";
18
+ VulnerabilityCode["SQLI_STACK_BASED"] = "SQLI_STACK_BASED";
19
+ VulnerabilityCode["SQLI_UNION_BASED"] = "SQLI_UNION_BASED";
20
+ // ========================================
21
+ // CROSS-SITE SCRIPTING (XSS_*)
22
+ // ========================================
23
+ VulnerabilityCode["XSS_REFLECTED"] = "XSS_REFLECTED";
24
+ VulnerabilityCode["XSS_STORED"] = "XSS_STORED";
25
+ VulnerabilityCode["XSS_DOM_BASED"] = "XSS_DOM_BASED";
26
+ VulnerabilityCode["XSS_SVG_INJECTION"] = "XSS_SVG_INJECTION";
27
+ VulnerabilityCode["XSS_CSTI_ANGULAR"] = "XSS_CSTI_ANGULAR";
28
+ VulnerabilityCode["XSS_CSTI_VUE"] = "XSS_CSTI_VUE";
29
+ VulnerabilityCode["XSS_EVENT_HANDLER"] = "XSS_EVENT_HANDLER";
30
+ VulnerabilityCode["XSS_SCRIPT_INJECTION"] = "XSS_SCRIPT_INJECTION";
31
+ VulnerabilityCode["XSS_HTML_INJECTION"] = "XSS_HTML_INJECTION";
32
+ VulnerabilityCode["XSS_ATTRIBUTE_INJECTION"] = "XSS_ATTRIBUTE_INJECTION";
33
+ VulnerabilityCode["XSS_JS_CONTEXT"] = "XSS_JS_CONTEXT";
34
+ VulnerabilityCode["XSS_CSS_INJECTION"] = "XSS_CSS_INJECTION";
35
+ VulnerabilityCode["XSS_CSP_BYPASS"] = "XSS_CSP_BYPASS";
36
+ VulnerabilityCode["XSS_TEMPLATE_LITERAL"] = "XSS_TEMPLATE_LITERAL";
37
+ VulnerabilityCode["XSS_MUTATION_BASED"] = "XSS_MUTATION_BASED";
38
+ // ========================================
39
+ // COMMAND INJECTION (CMDI_*)
40
+ // ========================================
41
+ VulnerabilityCode["CMDI_OOB_CONFIRMED"] = "CMDI_OOB_CONFIRMED";
42
+ VulnerabilityCode["CMDI_REFLECTED"] = "CMDI_REFLECTED";
43
+ VulnerabilityCode["CMDI_TIME_BASED"] = "CMDI_TIME_BASED";
44
+ VulnerabilityCode["CMDI_ERROR_BASED"] = "CMDI_ERROR_BASED";
45
+ // ========================================
46
+ // SERVER-SIDE REQUEST FORGERY (SSRF_*)
47
+ // ========================================
48
+ VulnerabilityCode["SSRF_CLOUD_METADATA"] = "SSRF_CLOUD_METADATA";
49
+ VulnerabilityCode["SSRF_INTERNAL_SERVICE"] = "SSRF_INTERNAL_SERVICE";
50
+ VulnerabilityCode["SSRF_PROTOCOL_SMUGGLING"] = "SSRF_PROTOCOL_SMUGGLING";
51
+ VulnerabilityCode["SSRF_BLIND_OOB"] = "SSRF_BLIND_OOB";
52
+ VulnerabilityCode["SSRF_FILTER_BYPASS"] = "SSRF_FILTER_BYPASS";
53
+ // ========================================
54
+ // SERVER-SIDE TEMPLATE INJECTION (SSTI_*)
55
+ // ========================================
56
+ VulnerabilityCode["SSTI_JINJA2"] = "SSTI_JINJA2";
57
+ VulnerabilityCode["SSTI_TWIG"] = "SSTI_TWIG";
58
+ VulnerabilityCode["SSTI_FREEMARKER"] = "SSTI_FREEMARKER";
59
+ VulnerabilityCode["SSTI_VELOCITY"] = "SSTI_VELOCITY";
60
+ VulnerabilityCode["SSTI_THYMELEAF"] = "SSTI_THYMELEAF";
61
+ VulnerabilityCode["SSTI_ERB"] = "SSTI_ERB";
62
+ VulnerabilityCode["SSTI_EJS"] = "SSTI_EJS";
63
+ VulnerabilityCode["SSTI_PUG"] = "SSTI_PUG";
64
+ VulnerabilityCode["SSTI_SMARTY"] = "SSTI_SMARTY";
65
+ VulnerabilityCode["SSTI_MAKO"] = "SSTI_MAKO";
66
+ VulnerabilityCode["SSTI_GENERIC"] = "SSTI_GENERIC";
67
+ // ========================================
68
+ // XML EXTERNAL ENTITY (XXE_*)
69
+ // ========================================
70
+ VulnerabilityCode["XXE_CLASSIC"] = "XXE_CLASSIC";
71
+ VulnerabilityCode["XXE_BLIND"] = "XXE_BLIND";
72
+ VulnerabilityCode["XXE_OOB"] = "XXE_OOB";
73
+ VulnerabilityCode["XXE_ERROR_BASED"] = "XXE_ERROR_BASED";
74
+ VulnerabilityCode["XXE_PARAMETER_ENTITY"] = "XXE_PARAMETER_ENTITY";
75
+ // ========================================
76
+ // XPATH INJECTION (XPATH_*)
77
+ // ========================================
78
+ VulnerabilityCode["XPATH_AUTH_BYPASS"] = "XPATH_AUTH_BYPASS";
79
+ VulnerabilityCode["XPATH_DATA_EXTRACTION"] = "XPATH_DATA_EXTRACTION";
80
+ VulnerabilityCode["XPATH_BLIND"] = "XPATH_BLIND";
81
+ VulnerabilityCode["XPATH_ERROR_BASED"] = "XPATH_ERROR_BASED";
82
+ // ========================================
83
+ // LOCAL FILE INCLUSION (LFI_*)
84
+ // ========================================
85
+ VulnerabilityCode["LFI_PATH_TRAVERSAL"] = "LFI_PATH_TRAVERSAL";
86
+ VulnerabilityCode["LFI_FILTER_BYPASS"] = "LFI_FILTER_BYPASS";
87
+ VulnerabilityCode["LFI_SOURCE_DISCLOSURE"] = "LFI_SOURCE_DISCLOSURE";
88
+ VulnerabilityCode["LFI_WRAPPER_PROTOCOL"] = "LFI_WRAPPER_PROTOCOL";
89
+ VulnerabilityCode["LFI_PROC_DISCLOSURE"] = "LFI_PROC_DISCLOSURE";
90
+ // ========================================
91
+ // JWT VULNERABILITIES (JWT_*)
92
+ // ========================================
93
+ VulnerabilityCode["JWT_NONE_ALGORITHM"] = "JWT_NONE_ALGORITHM";
94
+ VulnerabilityCode["JWT_WEAK_SECRET"] = "JWT_WEAK_SECRET";
95
+ VulnerabilityCode["JWT_KEY_CONFUSION"] = "JWT_KEY_CONFUSION";
96
+ VulnerabilityCode["JWT_EXPIRED_TOKEN"] = "JWT_EXPIRED_TOKEN";
97
+ VulnerabilityCode["JWT_MISSING_CLAIMS"] = "JWT_MISSING_CLAIMS";
98
+ VulnerabilityCode["JWT_CLAIM_TAMPERING"] = "JWT_CLAIM_TAMPERING";
99
+ VulnerabilityCode["JWT_KID_INJECTION"] = "JWT_KID_INJECTION";
100
+ VulnerabilityCode["JWT_JKU_INJECTION"] = "JWT_JKU_INJECTION";
101
+ VulnerabilityCode["JWT_EMBEDDED_JWK"] = "JWT_EMBEDDED_JWK";
102
+ VulnerabilityCode["JWT_X5C_INJECTION"] = "JWT_X5C_INJECTION";
103
+ // ========================================
104
+ // OPEN REDIRECT (REDIRECT_*)
105
+ // ========================================
106
+ VulnerabilityCode["REDIRECT_HEADER_INJECTION"] = "REDIRECT_HEADER_INJECTION";
107
+ VulnerabilityCode["REDIRECT_META_REFRESH"] = "REDIRECT_META_REFRESH";
108
+ VulnerabilityCode["REDIRECT_JS_NAVIGATION"] = "REDIRECT_JS_NAVIGATION";
109
+ // ========================================
110
+ // BROKEN ACCESS CONTROL (BAC_*)
111
+ // ========================================
112
+ VulnerabilityCode["BAC_ANONYMOUS_ACCESS"] = "BAC_ANONYMOUS_ACCESS";
113
+ VulnerabilityCode["BAC_HORIZONTAL_PRIVILEGE"] = "BAC_HORIZONTAL_PRIVILEGE";
114
+ VulnerabilityCode["BAC_VERTICAL_PRIVILEGE"] = "BAC_VERTICAL_PRIVILEGE";
115
+ VulnerabilityCode["BAC_IDOR"] = "BAC_IDOR";
116
+ // ========================================
117
+ // SECURITY HEADERS (HEADER_*)
118
+ // ========================================
119
+ VulnerabilityCode["HEADER_MISSING_CSP"] = "HEADER_MISSING_CSP";
120
+ VulnerabilityCode["HEADER_MISSING_HSTS"] = "HEADER_MISSING_HSTS";
121
+ VulnerabilityCode["HEADER_MISSING_XFRAME"] = "HEADER_MISSING_XFRAME";
122
+ VulnerabilityCode["HEADER_MISSING_XCONTENT_TYPE"] = "HEADER_MISSING_XCONTENT_TYPE";
123
+ VulnerabilityCode["HEADER_MISSING_XSS_PROTECTION"] = "HEADER_MISSING_XSS_PROTECTION";
124
+ VulnerabilityCode["HEADER_MISSING_REFERRER_POLICY"] = "HEADER_MISSING_REFERRER_POLICY";
125
+ VulnerabilityCode["HEADER_MISSING_PERMISSIONS_POLICY"] = "HEADER_MISSING_PERMISSIONS_POLICY";
126
+ VulnerabilityCode["HEADER_WEAK_CSP"] = "HEADER_WEAK_CSP";
127
+ VulnerabilityCode["HEADER_CORS_MISCONFIGURED"] = "HEADER_CORS_MISCONFIGURED";
128
+ VulnerabilityCode["HEADER_COEP_WITHOUT_COOP"] = "HEADER_COEP_WITHOUT_COOP";
129
+ VulnerabilityCode["HEADER_CORP_UNUSUAL"] = "HEADER_CORP_UNUSUAL";
130
+ VulnerabilityCode["HEADER_EXPECT_CT_PRESENT"] = "HEADER_EXPECT_CT_PRESENT";
131
+ VulnerabilityCode["HEADER_SERVER_HEADER_PRESENT"] = "HEADER_SERVER_HEADER_PRESENT";
132
+ VulnerabilityCode["HEADER_X_POWERED_BY_PRESENT"] = "HEADER_X_POWERED_BY_PRESENT";
133
+ VulnerabilityCode["HEADER_X_XSS_PROTECTION_ENABLED"] = "HEADER_X_XSS_PROTECTION_ENABLED";
134
+ VulnerabilityCode["COOKIE_SAMESITE_NONE_WITHOUT_SECURE"] = "COOKIE_SAMESITE_NONE_WITHOUT_SECURE";
135
+ VulnerabilityCode["COOKIE_SESSION_MISSING_SECURE"] = "COOKIE_SESSION_MISSING_SECURE";
136
+ VulnerabilityCode["COOKIE_MISSING_SECURE"] = "COOKIE_MISSING_SECURE";
137
+ VulnerabilityCode["COOKIE_SESSION_MISSING_HTTPONLY"] = "COOKIE_SESSION_MISSING_HTTPONLY";
138
+ VulnerabilityCode["COOKIE_MISSING_HTTPONLY"] = "COOKIE_MISSING_HTTPONLY";
139
+ VulnerabilityCode["COOKIE_MISSING_SAMESITE"] = "COOKIE_MISSING_SAMESITE";
140
+ VulnerabilityCode["COOKIE_HOST_PREFIX_INVALID"] = "COOKIE_HOST_PREFIX_INVALID";
141
+ VulnerabilityCode["COOKIE_SECURE_PREFIX_INVALID"] = "COOKIE_SECURE_PREFIX_INVALID";
142
+ VulnerabilityCode["HEADER_DRIFT_CSP"] = "HEADER_DRIFT_CSP";
143
+ VulnerabilityCode["HEADER_DRIFT_HSTS"] = "HEADER_DRIFT_HSTS";
144
+ VulnerabilityCode["HEADER_DRIFT_XCONTENT_TYPE"] = "HEADER_DRIFT_XCONTENT_TYPE";
145
+ VulnerabilityCode["HEADER_DRIFT_REFERRER_POLICY"] = "HEADER_DRIFT_REFERRER_POLICY";
146
+ VulnerabilityCode["HEADER_DRIFT_XFRAME"] = "HEADER_DRIFT_XFRAME";
147
+ VulnerabilityCode["HEADER_DRIFT_PERMISSIONS_POLICY"] = "HEADER_DRIFT_PERMISSIONS_POLICY";
148
+ VulnerabilityCode["HEADER_DRIFT_COOP"] = "HEADER_DRIFT_COOP";
149
+ VulnerabilityCode["HEADER_DRIFT_COEP"] = "HEADER_DRIFT_COEP";
150
+ VulnerabilityCode["HEADER_DRIFT_CORP"] = "HEADER_DRIFT_CORP";
151
+ // ========================================
152
+ // HOST HEADER INJECTION (HOST_*)
153
+ // ========================================
154
+ VulnerabilityCode["HOST_CACHE_POISONING"] = "HOST_CACHE_POISONING";
155
+ VulnerabilityCode["HOST_PASSWORD_RESET"] = "HOST_PASSWORD_RESET";
156
+ VulnerabilityCode["HOST_REDIRECT"] = "HOST_REDIRECT";
157
+ // ========================================
158
+ // DIRECTORY BROWSING (DIRBROWSE_*)
159
+ // ========================================
160
+ VulnerabilityCode["DIRBROWSE_ENABLED"] = "DIRBROWSE_ENABLED";
161
+ VulnerabilityCode["DIRBROWSE_SENSITIVE"] = "DIRBROWSE_SENSITIVE";
162
+ // ========================================
163
+ // MASS ASSIGNMENT (MASSASSIGN_*)
164
+ // ========================================
165
+ VulnerabilityCode["MASSASSIGN_PROTOTYPE_POLLUTION"] = "MASSASSIGN_PROTOTYPE_POLLUTION";
166
+ VulnerabilityCode["MASSASSIGN_ROLE_ESCALATION"] = "MASSASSIGN_ROLE_ESCALATION";
167
+ VulnerabilityCode["MASSASSIGN_HIDDEN_FIELD"] = "MASSASSIGN_HIDDEN_FIELD";
168
+ // ========================================
169
+ // DESERIALIZATION (DESER_*)
170
+ // ========================================
171
+ VulnerabilityCode["DESER_JAVA"] = "DESER_JAVA";
172
+ VulnerabilityCode["DESER_PHP"] = "DESER_PHP";
173
+ VulnerabilityCode["DESER_PYTHON"] = "DESER_PYTHON";
174
+ VulnerabilityCode["DESER_DOTNET"] = "DESER_DOTNET";
175
+ VulnerabilityCode["DESER_RUBY"] = "DESER_RUBY";
176
+ VulnerabilityCode["DESER_NODE"] = "DESER_NODE";
177
+ // ========================================
178
+ // SENSITIVE PATH SCOUT - CRITICAL (SENS_CRIT_*)
179
+ // ========================================
180
+ VulnerabilityCode["SENS_CRIT_AWS_CREDENTIALS"] = "SENS_CRIT_AWS_CREDENTIALS";
181
+ VulnerabilityCode["SENS_CRIT_SSH_PRIVATE_KEY"] = "SENS_CRIT_SSH_PRIVATE_KEY";
182
+ VulnerabilityCode["SENS_CRIT_SSL_PRIVATE_KEY"] = "SENS_CRIT_SSL_PRIVATE_KEY";
183
+ VulnerabilityCode["SENS_CRIT_RAILS_MASTER_KEY"] = "SENS_CRIT_RAILS_MASTER_KEY";
184
+ VulnerabilityCode["SENS_CRIT_TERRAFORM_STATE"] = "SENS_CRIT_TERRAFORM_STATE";
185
+ VulnerabilityCode["SENS_CRIT_FIREBASE_ADMIN_SDK"] = "SENS_CRIT_FIREBASE_ADMIN_SDK";
186
+ VulnerabilityCode["SENS_CRIT_KUBE_CONFIG"] = "SENS_CRIT_KUBE_CONFIG";
187
+ VulnerabilityCode["SENS_CRIT_AZURE_STORAGE_KEY"] = "SENS_CRIT_AZURE_STORAGE_KEY";
188
+ VulnerabilityCode["SENS_CRIT_CONSUL_KV"] = "SENS_CRIT_CONSUL_KV";
189
+ VulnerabilityCode["SENS_CRIT_VAULT_SECRET"] = "SENS_CRIT_VAULT_SECRET";
190
+ VulnerabilityCode["SENS_CRIT_DOCKER_SECRET"] = "SENS_CRIT_DOCKER_SECRET";
191
+ // ========================================
192
+ // SENSITIVE PATH SCOUT - HIGH (SENS_HIGH_*)
193
+ // ========================================
194
+ VulnerabilityCode["SENS_HIGH_GIT_EXPOSED"] = "SENS_HIGH_GIT_EXPOSED";
195
+ VulnerabilityCode["SENS_HIGH_GIT_CONFIG"] = "SENS_HIGH_GIT_CONFIG";
196
+ VulnerabilityCode["SENS_HIGH_WORDPRESS_CONFIG"] = "SENS_HIGH_WORDPRESS_CONFIG";
197
+ VulnerabilityCode["SENS_HIGH_SPRING_ACTUATOR"] = "SENS_HIGH_SPRING_ACTUATOR";
198
+ VulnerabilityCode["SENS_HIGH_SPRING_HEAPDUMP"] = "SENS_HIGH_SPRING_HEAPDUMP";
199
+ VulnerabilityCode["SENS_HIGH_DATABASE_BACKUP"] = "SENS_HIGH_DATABASE_BACKUP";
200
+ VulnerabilityCode["SENS_HIGH_PHPINFO"] = "SENS_HIGH_PHPINFO";
201
+ VulnerabilityCode["SENS_HIGH_LARAVEL_DEBUG"] = "SENS_HIGH_LARAVEL_DEBUG";
202
+ VulnerabilityCode["SENS_HIGH_GCP_SERVICE_ACCOUNT"] = "SENS_HIGH_GCP_SERVICE_ACCOUNT";
203
+ VulnerabilityCode["SENS_HIGH_GRAPHQL_INTROSPECTION"] = "SENS_HIGH_GRAPHQL_INTROSPECTION";
204
+ VulnerabilityCode["SENS_HIGH_PHPMYADMIN"] = "SENS_HIGH_PHPMYADMIN";
205
+ VulnerabilityCode["SENS_HIGH_MONGODB_CONFIG"] = "SENS_HIGH_MONGODB_CONFIG";
206
+ VulnerabilityCode["SENS_HIGH_JAVA_KEYSTORE"] = "SENS_HIGH_JAVA_KEYSTORE";
207
+ VulnerabilityCode["SENS_HIGH_PHP_SESSION"] = "SENS_HIGH_PHP_SESSION";
208
+ VulnerabilityCode["SENS_HIGH_ENV_FILE"] = "SENS_HIGH_ENV_FILE";
209
+ VulnerabilityCode["SENS_HIGH_BACKUP_FILE"] = "SENS_HIGH_BACKUP_FILE";
210
+ VulnerabilityCode["SENS_HIGH_HTPASSWD"] = "SENS_HIGH_HTPASSWD";
211
+ VulnerabilityCode["SENS_HIGH_DS_STORE"] = "SENS_HIGH_DS_STORE";
212
+ // ========================================
213
+ // SENSITIVE PATH SCOUT - MEDIUM (SENS_MED_*)
214
+ // ========================================
215
+ VulnerabilityCode["SENS_MED_SWAGGER_DOCS"] = "SENS_MED_SWAGGER_DOCS";
216
+ VulnerabilityCode["SENS_MED_APACHE_STATUS"] = "SENS_MED_APACHE_STATUS";
217
+ VulnerabilityCode["SENS_MED_PROMETHEUS_METRICS"] = "SENS_MED_PROMETHEUS_METRICS";
218
+ VulnerabilityCode["SENS_MED_DOCKERFILE"] = "SENS_MED_DOCKERFILE";
219
+ VulnerabilityCode["SENS_MED_FIREBASE_CONFIG"] = "SENS_MED_FIREBASE_CONFIG";
220
+ VulnerabilityCode["SENS_MED_SOURCE_MAP"] = "SENS_MED_SOURCE_MAP";
221
+ VulnerabilityCode["SENS_MED_ELASTICSEARCH"] = "SENS_MED_ELASTICSEARCH";
222
+ VulnerabilityCode["SENS_MED_ADMIN_PANEL"] = "SENS_MED_ADMIN_PANEL";
223
+ VulnerabilityCode["SENS_MED_COMPOSER_LOCK"] = "SENS_MED_COMPOSER_LOCK";
224
+ VulnerabilityCode["SENS_MED_PACKAGE_LOCK"] = "SENS_MED_PACKAGE_LOCK";
225
+ VulnerabilityCode["SENS_MED_GEMFILE_LOCK"] = "SENS_MED_GEMFILE_LOCK";
226
+ VulnerabilityCode["SENS_MED_ROBOTS_TXT"] = "SENS_MED_ROBOTS_TXT";
227
+ VulnerabilityCode["SENS_MED_SITEMAP"] = "SENS_MED_SITEMAP";
228
+ VulnerabilityCode["SENS_MED_CROSSDOMAIN_XML"] = "SENS_MED_CROSSDOMAIN_XML";
229
+ // ========================================
230
+ // SENSITIVE PATH SCOUT - LOW (SENS_LOW_*)
231
+ // ========================================
232
+ VulnerabilityCode["SENS_LOW_TRAVIS_CI"] = "SENS_LOW_TRAVIS_CI";
233
+ VulnerabilityCode["SENS_LOW_JENKINSFILE"] = "SENS_LOW_JENKINSFILE";
234
+ VulnerabilityCode["SENS_LOW_CIRCLECI"] = "SENS_LOW_CIRCLECI";
235
+ VulnerabilityCode["SENS_LOW_GITLAB_CI"] = "SENS_LOW_GITLAB_CI";
236
+ VulnerabilityCode["SENS_LOW_README"] = "SENS_LOW_README";
237
+ VulnerabilityCode["SENS_LOW_CHANGELOG"] = "SENS_LOW_CHANGELOG";
238
+ VulnerabilityCode["SENS_LOW_LICENSE"] = "SENS_LOW_LICENSE";
239
+ // ========================================
240
+ // SENSITIVE PATH SCOUT - EXTENDED
241
+ // ========================================
242
+ // HIGH
243
+ VulnerabilityCode["SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED"] = "SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED";
244
+ VulnerabilityCode["SENS_HIGH_APPSETTINGS_JSON_EXPOSED"] = "SENS_HIGH_APPSETTINGS_JSON_EXPOSED";
245
+ VulnerabilityCode["SENS_HIGH_SPRING_CONFIG_EXPOSED"] = "SENS_HIGH_SPRING_CONFIG_EXPOSED";
246
+ VulnerabilityCode["SENS_HIGH_NPMRC_EXPOSED"] = "SENS_HIGH_NPMRC_EXPOSED";
247
+ VulnerabilityCode["SENS_HIGH_RAILS_DATABASE_YML_EXPOSED"] = "SENS_HIGH_RAILS_DATABASE_YML_EXPOSED";
248
+ VulnerabilityCode["SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED"] = "SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED";
249
+ VulnerabilityCode["SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED"] = "SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED";
250
+ VulnerabilityCode["SENS_HIGH_JOLOKIA_EXPOSED"] = "SENS_HIGH_JOLOKIA_EXPOSED";
251
+ VulnerabilityCode["SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED"] = "SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED";
252
+ VulnerabilityCode["SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED"] = "SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED";
253
+ VulnerabilityCode["SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED"] = "SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED";
254
+ VulnerabilityCode["SENS_HIGH_REDIS_RDB_DUMP_DETECTED"] = "SENS_HIGH_REDIS_RDB_DUMP_DETECTED";
255
+ VulnerabilityCode["SENS_HIGH_TRACE_AXD"] = "SENS_HIGH_TRACE_AXD";
256
+ VulnerabilityCode["SENS_HIGH_ELMAH_AXD_EXPOSED"] = "SENS_HIGH_ELMAH_AXD_EXPOSED";
257
+ VulnerabilityCode["SENS_HIGH_SQLITE_DATABASE_DETECTED"] = "SENS_HIGH_SQLITE_DATABASE_DETECTED";
258
+ VulnerabilityCode["SENS_HIGH_AWS_CONFIG_EXPOSED"] = "SENS_HIGH_AWS_CONFIG_EXPOSED";
259
+ VulnerabilityCode["SENS_HIGH_AZURE_CREDENTIALS_EXPOSED"] = "SENS_HIGH_AZURE_CREDENTIALS_EXPOSED";
260
+ VulnerabilityCode["SENS_HIGH_HELM_VALUES_EXPOSED"] = "SENS_HIGH_HELM_VALUES_EXPOSED";
261
+ VulnerabilityCode["SENS_HIGH_TERRAFORM_VARS_EXPOSED"] = "SENS_HIGH_TERRAFORM_VARS_EXPOSED";
262
+ VulnerabilityCode["SENS_HIGH_LARAVEL_LOG_EXPOSED"] = "SENS_HIGH_LARAVEL_LOG_EXPOSED";
263
+ VulnerabilityCode["SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED"] = "SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED";
264
+ VulnerabilityCode["SENS_HIGH_ADMINER_EXPOSED"] = "SENS_HIGH_ADMINER_EXPOSED";
265
+ VulnerabilityCode["SENS_HIGH_DEBUG_ENDPOINT_EXPOSED"] = "SENS_HIGH_DEBUG_ENDPOINT_EXPOSED";
266
+ VulnerabilityCode["SENS_HIGH_GO_DEBUG_VARS_EXPOSED"] = "SENS_HIGH_GO_DEBUG_VARS_EXPOSED";
267
+ VulnerabilityCode["SENS_HIGH_GO_PPROF_EXPOSED"] = "SENS_HIGH_GO_PPROF_EXPOSED";
268
+ VulnerabilityCode["SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED"] = "SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED";
269
+ VulnerabilityCode["SENS_HIGH_MONGO_RC_EXPOSED"] = "SENS_HIGH_MONGO_RC_EXPOSED";
270
+ // MEDIUM
271
+ VulnerabilityCode["SENS_MED_UN_PROTECTED_CONFIG_JSON"] = "SENS_MED_UN_PROTECTED_CONFIG_JSON";
272
+ VulnerabilityCode["SENS_MED_MERCURIAL_REPOSITORY_FOUND"] = "SENS_MED_MERCURIAL_REPOSITORY_FOUND";
273
+ VulnerabilityCode["SENS_MED_MERCURIAL_HGRC_EXPOSED"] = "SENS_MED_MERCURIAL_HGRC_EXPOSED";
274
+ VulnerabilityCode["SENS_MED_CVS_ROOT_EXPOSED"] = "SENS_MED_CVS_ROOT_EXPOSED";
275
+ VulnerabilityCode["SENS_MED_CVS_ENTRIES_EXPOSED"] = "SENS_MED_CVS_ENTRIES_EXPOSED";
276
+ VulnerabilityCode["SENS_MED_BAZAAR_REPO_EXPOSED"] = "SENS_MED_BAZAAR_REPO_EXPOSED";
277
+ VulnerabilityCode["SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED"] = "SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED";
278
+ VulnerabilityCode["SENS_MED_LARAVEL_LOG_VIEWER_ENABLED"] = "SENS_MED_LARAVEL_LOG_VIEWER_ENABLED";
279
+ VulnerabilityCode["SENS_MED_APACHE_HTACCESS_FILE_DETECTED"] = "SENS_MED_APACHE_HTACCESS_FILE_DETECTED";
280
+ VulnerabilityCode["SENS_MED_APACHE_SERVER_INFO_EXPOSED"] = "SENS_MED_APACHE_SERVER_INFO_EXPOSED";
281
+ VulnerabilityCode["SENS_MED_PACKAGE_DEPENDENCIES_DETECTED"] = "SENS_MED_PACKAGE_DEPENDENCIES_DETECTED";
282
+ VulnerabilityCode["SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED"] = "SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED";
283
+ VulnerabilityCode["SENS_MED_SSH_PUBLIC_KEY_EXPOSED"] = "SENS_MED_SSH_PUBLIC_KEY_EXPOSED";
284
+ VulnerabilityCode["SENS_MED_SSL_CERTIFICATE_EXPOSED"] = "SENS_MED_SSL_CERTIFICATE_EXPOSED";
285
+ VulnerabilityCode["SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED"] = "SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED";
286
+ VulnerabilityCode["SENS_MED_GRAPHI_QL_EXPOSED"] = "SENS_MED_GRAPHI_QL_EXPOSED";
287
+ VulnerabilityCode["SENS_MED_TERRAFORM_LOCK_EXPOSED"] = "SENS_MED_TERRAFORM_LOCK_EXPOSED";
288
+ VulnerabilityCode["SENS_MED_ERROR_LOG_EXPOSED"] = "SENS_MED_ERROR_LOG_EXPOSED";
289
+ VulnerabilityCode["SENS_MED_ACCESS_LOG_EXPOSED"] = "SENS_MED_ACCESS_LOG_EXPOSED";
290
+ VulnerabilityCode["SENS_MED_DEBUG_LOG_EXPOSED"] = "SENS_MED_DEBUG_LOG_EXPOSED";
291
+ VulnerabilityCode["SENS_MED_APPLICATION_LOG_EXPOSED"] = "SENS_MED_APPLICATION_LOG_EXPOSED";
292
+ VulnerabilityCode["SENS_MED_WSDL_EXPOSED"] = "SENS_MED_WSDL_EXPOSED";
293
+ VulnerabilityCode["SENS_MED_WORD_PRESS_XML_RPC_EXPOSED"] = "SENS_MED_WORD_PRESS_XML_RPC_EXPOSED";
294
+ // LOW
295
+ VulnerabilityCode["SENS_LOW_TOML_PROJECT_FILE_EXPOSED"] = "SENS_LOW_TOML_PROJECT_FILE_EXPOSED";
296
+ VulnerabilityCode["SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED"] = "SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED";
297
+ VulnerabilityCode["SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED"] = "SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED";
298
+ VulnerabilityCode["SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED"] = "SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED";
299
+ VulnerabilityCode["SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED"] = "SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED";
300
+ VulnerabilityCode["SENS_LOW_PYTHON_REQUIREMENTS_DETECTED"] = "SENS_LOW_PYTHON_REQUIREMENTS_DETECTED";
301
+ VulnerabilityCode["SENS_LOW_TEST_ENDPOINT_EXPOSED"] = "SENS_LOW_TEST_ENDPOINT_EXPOSED";
302
+ VulnerabilityCode["SENS_LOW_STAGING_ENDPOINT_EXPOSED"] = "SENS_LOW_STAGING_ENDPOINT_EXPOSED";
303
+ VulnerabilityCode["SENS_LOW_EDITOR_BACKUP_FILE_DETECTED"] = "SENS_LOW_EDITOR_BACKUP_FILE_DETECTED";
304
+ VulnerabilityCode["SENS_LOW_VIM_SWAP_FILE_DETECTED"] = "SENS_LOW_VIM_SWAP_FILE_DETECTED";
305
+ VulnerabilityCode["SENS_LOW_DIRECTORY_LISTING_ENABLED"] = "SENS_LOW_DIRECTORY_LISTING_ENABLED";
306
+ VulnerabilityCode["SENS_LOW_AWSSAM_TEMPLATE_EXPOSED"] = "SENS_LOW_AWSSAM_TEMPLATE_EXPOSED";
307
+ VulnerabilityCode["SENS_LOW_SERVERLESS_CONFIG_EXPOSED"] = "SENS_LOW_SERVERLESS_CONFIG_EXPOSED";
308
+ VulnerabilityCode["SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED"] = "SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED";
309
+ // ========================================
310
+ // CLICKJACKING (CLICK_*)
311
+ // ========================================
312
+ VulnerabilityCode["CLICK_FRAMEABLE"] = "CLICK_FRAMEABLE";
313
+ VulnerabilityCode["CLICK_PARTIAL_PROTECTION"] = "CLICK_PARTIAL_PROTECTION";
314
+ })(VulnerabilityCode || (exports.VulnerabilityCode = VulnerabilityCode = {}));
315
+ exports.default = VulnerabilityCode;
@@ -0,0 +1 @@
1
+ {"version":3,"file":"error-codes.js","sourceRoot":"","sources":["error-codes.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AAEH,MAAM,CAAN,IAAY,iBAoUX;AApUD,WAAY,iBAAiB;IACzB,2CAA2C;IAC3C,yBAAyB;IACzB,2CAA2C;IAC3C,0DAAqC,CAAA;IACrC,8DAAyC,CAAA;IACzC,wDAAmC,CAAA;IACnC,0DAAqC,CAAA;IACrC,0DAAqC,CAAA;IAErC,2CAA2C;IAC3C,+BAA+B;IAC/B,2CAA2C;IAC3C,oDAA+B,CAAA;IAC/B,8CAAyB,CAAA;IACzB,oDAA+B,CAAA;IAC/B,4DAAuC,CAAA;IACvC,0DAAqC,CAAA;IACrC,kDAA6B,CAAA;IAC7B,4DAAuC,CAAA;IACvC,kEAA6C,CAAA;IAC7C,8DAAyC,CAAA;IACzC,wEAAmD,CAAA;IACnD,sDAAiC,CAAA;IACjC,4DAAuC,CAAA;IACvC,sDAAiC,CAAA;IACjC,kEAA6C,CAAA;IAC7C,8DAAyC,CAAA;IAEzC,2CAA2C;IAC3C,6BAA6B;IAC7B,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,sDAAiC,CAAA;IACjC,wDAAmC,CAAA;IACnC,0DAAqC,CAAA;IAErC,2CAA2C;IAC3C,uCAAuC;IACvC,2CAA2C;IAC3C,gEAA2C,CAAA;IAC3C,oEAA+C,CAAA;IAC/C,wEAAmD,CAAA;IACnD,sDAAiC,CAAA;IACjC,8DAAyC,CAAA;IAEzC,2CAA2C;IAC3C,0CAA0C;IAC1C,2CAA2C;IAC3C,gDAA2B,CAAA;IAC3B,4CAAuB,CAAA;IACvB,wDAAmC,CAAA;IACnC,oDAA+B,CAAA;IAC/B,sDAAiC,CAAA;IACjC,0CAAqB,CAAA;IACrB,0CAAqB,CAAA;IACrB,0CAAqB,CAAA;IACrB,gDAA2B,CAAA;IAC3B,4CAAuB,CAAA;IACvB,kDAA6B,CAAA;IAE7B,2CAA2C;IAC3C,8BAA8B;IAC9B,2CAA2C;IAC3C,gDAA2B,CAAA;IAC3B,4CAAuB,CAAA;IACvB,wCAAmB,CAAA;IACnB,wDAAmC,CAAA;IACnC,kEAA6C,CAAA;IAE7C,2CAA2C;IAC3C,4BAA4B;IAC5B,2CAA2C;IAC3C,4DAAuC,CAAA;IACvC,oEAA+C,CAAA;IAC/C,gDAA2B,CAAA;IAC3B,4DAAuC,CAAA;IAEvC,2CAA2C;IAC3C,+BAA+B;IAC/B,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,4DAAuC,CAAA;IACvC,oEAA+C,CAAA;IAC/C,kEAA6C,CAAA;IAC7C,gEAA2C,CAAA;IAE3C,2CAA2C;IAC3C,8BAA8B;IAC9B,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,wDAAmC,CAAA;IACnC,4DAAuC,CAAA;IACvC,4DAAuC,CAAA;IACvC,8DAAyC,CAAA;IACzC,gEAA2C,CAAA;IAC3C,4DAAuC,CAAA;IACvC,4DAAuC,CAAA;IACvC,0DAAqC,CAAA;IACrC,4DAAuC,CAAA;IAEvC,2CAA2C;IAC3C,6BAA6B;IAC7B,2CAA2C;IAC3C,4EAAuD,CAAA;IACvD,oEAA+C,CAAA;IAC/C,sEAAiD,CAAA;IAEjD,2CAA2C;IAC3C,gCAAgC;IAChC,2CAA2C;IAC3C,kEAA6C,CAAA;IAC7C,0EAAqD,CAAA;IACrD,sEAAiD,CAAA;IACjD,0CAAqB,CAAA;IAErB,2CAA2C;IAC3C,8BAA8B;IAC9B,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,gEAA2C,CAAA;IAC3C,oEAA+C,CAAA;IAC/C,kFAA6D,CAAA;IAC7D,oFAA+D,CAAA;IAC/D,sFAAiE,CAAA;IACjE,4FAAuE,CAAA;IACvE,wDAAmC,CAAA;IACnC,4EAAuD,CAAA;IACvD,0EAAqD,CAAA;IACrD,gEAA2C,CAAA;IAC3C,0EAAqD,CAAA;IACrD,kFAA6D,CAAA;IAC7D,gFAA2D,CAAA;IAC3D,wFAAmE,CAAA;IACnE,gGAA2E,CAAA;IAC3E,oFAA+D,CAAA;IAC/D,oEAA+C,CAAA;IAC/C,wFAAmE,CAAA;IACnE,wEAAmD,CAAA;IACnD,wEAAmD,CAAA;IACnD,8EAAyD,CAAA;IACzD,kFAA6D,CAAA;IAC7D,0DAAqC,CAAA;IACrC,4DAAuC,CAAA;IACvC,8EAAyD,CAAA;IACzD,kFAA6D,CAAA;IAC7D,gEAA2C,CAAA;IAC3C,wFAAmE,CAAA;IACnE,4DAAuC,CAAA;IACvC,4DAAuC,CAAA;IACvC,4DAAuC,CAAA;IAEvC,2CAA2C;IAC3C,iCAAiC;IACjC,2CAA2C;IAC3C,kEAA6C,CAAA;IAC7C,gEAA2C,CAAA;IAC3C,oDAA+B,CAAA;IAE/B,2CAA2C;IAC3C,mCAAmC;IACnC,2CAA2C;IAC3C,4DAAuC,CAAA;IACvC,gEAA2C,CAAA;IAE3C,2CAA2C;IAC3C,iCAAiC;IACjC,2CAA2C;IAC3C,sFAAiE,CAAA;IACjE,8EAAyD,CAAA;IACzD,wEAAmD,CAAA;IAEnD,2CAA2C;IAC3C,4BAA4B;IAC5B,2CAA2C;IAC3C,8CAAyB,CAAA;IACzB,4CAAuB,CAAA;IACvB,kDAA6B,CAAA;IAC7B,kDAA6B,CAAA;IAC7B,8CAAyB,CAAA;IACzB,8CAAyB,CAAA;IAEzB,2CAA2C;IAC3C,gDAAgD;IAChD,2CAA2C;IAC3C,4EAAuD,CAAA;IACvD,4EAAuD,CAAA;IACvD,4EAAuD,CAAA;IACvD,8EAAyD,CAAA;IACzD,4EAAuD,CAAA;IACvD,kFAA6D,CAAA;IAC7D,oEAA+C,CAAA;IAC/C,gFAA2D,CAAA;IAC3D,gEAA2C,CAAA;IAC3C,sEAAiD,CAAA;IACjD,wEAAmD,CAAA;IAEnD,2CAA2C;IAC3C,4CAA4C;IAC5C,2CAA2C;IAC3C,oEAA+C,CAAA;IAC/C,kEAA6C,CAAA;IAC7C,8EAAyD,CAAA;IACzD,4EAAuD,CAAA;IACvD,4EAAuD,CAAA;IACvD,4EAAuD,CAAA;IACvD,4DAAuC,CAAA;IACvC,wEAAmD,CAAA;IACnD,oFAA+D,CAAA;IAC/D,wFAAmE,CAAA;IACnE,kEAA6C,CAAA;IAC7C,0EAAqD,CAAA;IACrD,wEAAmD,CAAA;IACnD,oEAA+C,CAAA;IAC/C,8DAAyC,CAAA;IACzC,oEAA+C,CAAA;IAC/C,8DAAyC,CAAA;IACzC,8DAAyC,CAAA;IAEzC,2CAA2C;IAC3C,6CAA6C;IAC7C,2CAA2C;IAC3C,oEAA+C,CAAA;IAC/C,sEAAiD,CAAA;IACjD,gFAA2D,CAAA;IAC3D,gEAA2C,CAAA;IAC3C,0EAAqD,CAAA;IACrD,gEAA2C,CAAA;IAC3C,sEAAiD,CAAA;IACjD,kEAA6C,CAAA;IAC7C,sEAAiD,CAAA;IACjD,oEAA+C,CAAA;IAC/C,oEAA+C,CAAA;IAC/C,gEAA2C,CAAA;IAC3C,0DAAqC,CAAA;IACrC,0EAAqD,CAAA;IAErD,2CAA2C;IAC3C,0CAA0C;IAC1C,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,kEAA6C,CAAA;IAC7C,4DAAuC,CAAA;IACvC,8DAAyC,CAAA;IACzC,wDAAmC,CAAA;IACnC,8DAAyC,CAAA;IACzC,0DAAqC,CAAA;IAErC,2CAA2C;IAC3C,kCAAkC;IAClC,2CAA2C;IAC3C,OAAO;IACP,0HAAqG,CAAA;IACrG,8FAAyE,CAAA;IACzE,wFAAmE,CAAA;IACnE,wEAAmD,CAAA;IACnD,kGAA6E,CAAA;IAC7E,oGAA+E,CAAA;IAC/E,4FAAuE,CAAA;IACvE,4EAAuD,CAAA;IACvD,gHAA2F,CAAA;IAC3F,0GAAqF,CAAA;IACrF,4GAAuF,CAAA;IACvF,4FAAuE,CAAA;IACvE,gEAA2C,CAAA;IAC3C,gFAA2D,CAAA;IAC3D,8FAAyE,CAAA;IACzE,kFAA6D,CAAA;IAC7D,gGAA2E,CAAA;IAC3E,oFAA+D,CAAA;IAC/D,0FAAqE,CAAA;IACrE,oFAA+D,CAAA;IAC/D,sGAAiF,CAAA;IACjF,4EAAuD,CAAA;IACvD,0FAAqE,CAAA;IACrE,wFAAmE,CAAA;IACnE,8EAAyD,CAAA;IACzD,sGAAiF,CAAA;IACjF,8EAAyD,CAAA;IACzD,SAAS;IACT,4FAAuE,CAAA;IACvE,gGAA2E,CAAA;IAC3E,wFAAmE,CAAA;IACnE,4EAAuD,CAAA;IACvD,kFAA6D,CAAA;IAC7D,kFAA6D,CAAA;IAC7D,sHAAiG,CAAA;IACjG,gGAA2E,CAAA;IAC3E,sGAAiF,CAAA;IACjF,gGAA2E,CAAA;IAC3E,sGAAiF,CAAA;IACjF,gHAA2F,CAAA;IAC3F,wFAAmE,CAAA;IACnE,0FAAqE,CAAA;IACrE,8FAAyE,CAAA;IACzE,8EAAyD,CAAA;IACzD,wFAAmE,CAAA;IACnE,8EAAyD,CAAA;IACzD,gFAA2D,CAAA;IAC3D,8EAAyD,CAAA;IACzD,0FAAqE,CAAA;IACrE,oEAA+C,CAAA;IAC/C,gGAA2E,CAAA;IAC3E,MAAM;IACN,8FAAyE,CAAA;IACzE,oJAA+H,CAAA;IAC/H,wHAAmG,CAAA;IACnG,8GAAyF,CAAA;IACzF,4GAAuF,CAAA;IACvF,oGAA+E,CAAA;IAC/E,sFAAiE,CAAA;IACjE,4FAAuE,CAAA;IACvE,kGAA6E,CAAA;IAC7E,wFAAmE,CAAA;IACnE,8FAAyE,CAAA;IACzE,0FAAqE,CAAA;IACrE,8FAAyE,CAAA;IACzE,4GAAuF,CAAA;IAEvF,2CAA2C;IAC3C,yBAAyB;IACzB,2CAA2C;IAC3C,wDAAmC,CAAA;IACnC,0EAAqD,CAAA;AACzD,CAAC,EApUW,iBAAiB,KAAjB,iBAAiB,QAoU5B;AAED,eAAe,iBAAiB,CAAC"}