@zerothreatai/vulnerability-registry 3.0.0 → 5.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (77) hide show
  1. package/dist/categories/authentication.js +34 -17
  2. package/dist/categories/configuration.js +561 -60
  3. package/dist/categories/injection.js +68 -34
  4. package/dist/categories/sensitive-paths.js +168 -84
  5. package/dist/categories/ssrf.js +22 -11
  6. package/dist/categories/xss.js +30 -15
  7. package/dist/category.d.ts +6 -0
  8. package/dist/category.js +15 -0
  9. package/dist/error-codes.d.ts +20 -0
  10. package/dist/error-codes.js +20 -0
  11. package/dist/index.d.ts +9 -1
  12. package/dist/index.js +5 -1
  13. package/dist/scanner.d.ts +6 -0
  14. package/dist/scanner.js +22 -0
  15. package/dist/types.d.ts +2 -0
  16. package/dist-cjs/categories/authentication.js +34 -17
  17. package/dist-cjs/categories/configuration.js +561 -60
  18. package/dist-cjs/categories/injection.js +68 -34
  19. package/dist-cjs/categories/sensitive-paths.js +168 -84
  20. package/dist-cjs/categories/ssrf.js +22 -11
  21. package/dist-cjs/categories/xss.js +30 -15
  22. package/dist-cjs/category.js +18 -0
  23. package/dist-cjs/error-codes.js +20 -0
  24. package/dist-cjs/index.js +7 -1
  25. package/dist-cjs/scanner.js +25 -0
  26. package/package.json +35 -32
  27. package/scripts/assign-ids.ts +105 -0
  28. package/scripts/check-duplicate-ids.ts +45 -0
  29. package/src/categories/authentication.ts +145 -128
  30. package/src/categories/configuration.ts +1632 -1111
  31. package/src/categories/injection.ts +158 -124
  32. package/src/categories/sensitive-paths.ts +168 -84
  33. package/src/categories/ssrf.ts +22 -11
  34. package/src/categories/xss.ts +30 -15
  35. package/src/category.ts +16 -0
  36. package/src/error-codes.ts +25 -5
  37. package/src/id-registry.json +1235 -0
  38. package/src/index.ts +20 -14
  39. package/src/scanner.ts +23 -0
  40. package/src/types.ts +4 -2
  41. package/zerothreatai-vulnerability-registry-4npm .0.0.tgz +0 -0
  42. package/src/categories/authentication.d.ts +0 -8
  43. package/src/categories/authentication.d.ts.map +0 -1
  44. package/src/categories/authentication.js +0 -378
  45. package/src/categories/authentication.js.map +0 -1
  46. package/src/categories/configuration.d.ts +0 -8
  47. package/src/categories/configuration.d.ts.map +0 -1
  48. package/src/categories/configuration.js +0 -906
  49. package/src/categories/configuration.js.map +0 -1
  50. package/src/categories/injection.d.ts +0 -8
  51. package/src/categories/injection.d.ts.map +0 -1
  52. package/src/categories/injection.js +0 -750
  53. package/src/categories/injection.js.map +0 -1
  54. package/src/categories/sensitive-paths.d.ts +0 -9
  55. package/src/categories/sensitive-paths.d.ts.map +0 -1
  56. package/src/categories/sensitive-paths.js +0 -1791
  57. package/src/categories/sensitive-paths.js.map +0 -1
  58. package/src/categories/ssrf.d.ts +0 -8
  59. package/src/categories/ssrf.d.ts.map +0 -1
  60. package/src/categories/ssrf.js +0 -250
  61. package/src/categories/ssrf.js.map +0 -1
  62. package/src/categories/xss.d.ts +0 -7
  63. package/src/categories/xss.d.ts.map +0 -1
  64. package/src/categories/xss.js +0 -328
  65. package/src/categories/xss.js.map +0 -1
  66. package/src/error-codes.d.ts +0 -242
  67. package/src/error-codes.d.ts.map +0 -1
  68. package/src/error-codes.js +0 -315
  69. package/src/error-codes.js.map +0 -1
  70. package/src/index.d.ts +0 -60
  71. package/src/index.d.ts.map +0 -1
  72. package/src/index.js +0 -107
  73. package/src/index.js.map +0 -1
  74. package/src/types.d.ts +0 -86
  75. package/src/types.d.ts.map +0 -1
  76. package/src/types.js +0 -7
  77. package/src/types.js.map +0 -1
@@ -1,315 +0,0 @@
1
- "use strict";
2
- /**
3
- * Vulnerability Registry - Error Codes
4
- *
5
- * Central enum containing all vulnerability error codes across all scanners.
6
- * Each code maps to a complete VulnerabilityDefinition.
7
- */
8
- Object.defineProperty(exports, "__esModule", { value: true });
9
- exports.VulnerabilityCode = void 0;
10
- var VulnerabilityCode;
11
- (function (VulnerabilityCode) {
12
- // ========================================
13
- // SQL INJECTION (SQLI_*)
14
- // ========================================
15
- VulnerabilityCode["SQLI_ERROR_BASED"] = "SQLI_ERROR_BASED";
16
- VulnerabilityCode["SQLI_BOOLEAN_BASED"] = "SQLI_BOOLEAN_BASED";
17
- VulnerabilityCode["SQLI_TIME_BASED"] = "SQLI_TIME_BASED";
18
- VulnerabilityCode["SQLI_STACK_BASED"] = "SQLI_STACK_BASED";
19
- VulnerabilityCode["SQLI_UNION_BASED"] = "SQLI_UNION_BASED";
20
- // ========================================
21
- // CROSS-SITE SCRIPTING (XSS_*)
22
- // ========================================
23
- VulnerabilityCode["XSS_REFLECTED"] = "XSS_REFLECTED";
24
- VulnerabilityCode["XSS_STORED"] = "XSS_STORED";
25
- VulnerabilityCode["XSS_DOM_BASED"] = "XSS_DOM_BASED";
26
- VulnerabilityCode["XSS_SVG_INJECTION"] = "XSS_SVG_INJECTION";
27
- VulnerabilityCode["XSS_CSTI_ANGULAR"] = "XSS_CSTI_ANGULAR";
28
- VulnerabilityCode["XSS_CSTI_VUE"] = "XSS_CSTI_VUE";
29
- VulnerabilityCode["XSS_EVENT_HANDLER"] = "XSS_EVENT_HANDLER";
30
- VulnerabilityCode["XSS_SCRIPT_INJECTION"] = "XSS_SCRIPT_INJECTION";
31
- VulnerabilityCode["XSS_HTML_INJECTION"] = "XSS_HTML_INJECTION";
32
- VulnerabilityCode["XSS_ATTRIBUTE_INJECTION"] = "XSS_ATTRIBUTE_INJECTION";
33
- VulnerabilityCode["XSS_JS_CONTEXT"] = "XSS_JS_CONTEXT";
34
- VulnerabilityCode["XSS_CSS_INJECTION"] = "XSS_CSS_INJECTION";
35
- VulnerabilityCode["XSS_CSP_BYPASS"] = "XSS_CSP_BYPASS";
36
- VulnerabilityCode["XSS_TEMPLATE_LITERAL"] = "XSS_TEMPLATE_LITERAL";
37
- VulnerabilityCode["XSS_MUTATION_BASED"] = "XSS_MUTATION_BASED";
38
- // ========================================
39
- // COMMAND INJECTION (CMDI_*)
40
- // ========================================
41
- VulnerabilityCode["CMDI_OOB_CONFIRMED"] = "CMDI_OOB_CONFIRMED";
42
- VulnerabilityCode["CMDI_REFLECTED"] = "CMDI_REFLECTED";
43
- VulnerabilityCode["CMDI_TIME_BASED"] = "CMDI_TIME_BASED";
44
- VulnerabilityCode["CMDI_ERROR_BASED"] = "CMDI_ERROR_BASED";
45
- // ========================================
46
- // SERVER-SIDE REQUEST FORGERY (SSRF_*)
47
- // ========================================
48
- VulnerabilityCode["SSRF_CLOUD_METADATA"] = "SSRF_CLOUD_METADATA";
49
- VulnerabilityCode["SSRF_INTERNAL_SERVICE"] = "SSRF_INTERNAL_SERVICE";
50
- VulnerabilityCode["SSRF_PROTOCOL_SMUGGLING"] = "SSRF_PROTOCOL_SMUGGLING";
51
- VulnerabilityCode["SSRF_BLIND_OOB"] = "SSRF_BLIND_OOB";
52
- VulnerabilityCode["SSRF_FILTER_BYPASS"] = "SSRF_FILTER_BYPASS";
53
- // ========================================
54
- // SERVER-SIDE TEMPLATE INJECTION (SSTI_*)
55
- // ========================================
56
- VulnerabilityCode["SSTI_JINJA2"] = "SSTI_JINJA2";
57
- VulnerabilityCode["SSTI_TWIG"] = "SSTI_TWIG";
58
- VulnerabilityCode["SSTI_FREEMARKER"] = "SSTI_FREEMARKER";
59
- VulnerabilityCode["SSTI_VELOCITY"] = "SSTI_VELOCITY";
60
- VulnerabilityCode["SSTI_THYMELEAF"] = "SSTI_THYMELEAF";
61
- VulnerabilityCode["SSTI_ERB"] = "SSTI_ERB";
62
- VulnerabilityCode["SSTI_EJS"] = "SSTI_EJS";
63
- VulnerabilityCode["SSTI_PUG"] = "SSTI_PUG";
64
- VulnerabilityCode["SSTI_SMARTY"] = "SSTI_SMARTY";
65
- VulnerabilityCode["SSTI_MAKO"] = "SSTI_MAKO";
66
- VulnerabilityCode["SSTI_GENERIC"] = "SSTI_GENERIC";
67
- // ========================================
68
- // XML EXTERNAL ENTITY (XXE_*)
69
- // ========================================
70
- VulnerabilityCode["XXE_CLASSIC"] = "XXE_CLASSIC";
71
- VulnerabilityCode["XXE_BLIND"] = "XXE_BLIND";
72
- VulnerabilityCode["XXE_OOB"] = "XXE_OOB";
73
- VulnerabilityCode["XXE_ERROR_BASED"] = "XXE_ERROR_BASED";
74
- VulnerabilityCode["XXE_PARAMETER_ENTITY"] = "XXE_PARAMETER_ENTITY";
75
- // ========================================
76
- // XPATH INJECTION (XPATH_*)
77
- // ========================================
78
- VulnerabilityCode["XPATH_AUTH_BYPASS"] = "XPATH_AUTH_BYPASS";
79
- VulnerabilityCode["XPATH_DATA_EXTRACTION"] = "XPATH_DATA_EXTRACTION";
80
- VulnerabilityCode["XPATH_BLIND"] = "XPATH_BLIND";
81
- VulnerabilityCode["XPATH_ERROR_BASED"] = "XPATH_ERROR_BASED";
82
- // ========================================
83
- // LOCAL FILE INCLUSION (LFI_*)
84
- // ========================================
85
- VulnerabilityCode["LFI_PATH_TRAVERSAL"] = "LFI_PATH_TRAVERSAL";
86
- VulnerabilityCode["LFI_FILTER_BYPASS"] = "LFI_FILTER_BYPASS";
87
- VulnerabilityCode["LFI_SOURCE_DISCLOSURE"] = "LFI_SOURCE_DISCLOSURE";
88
- VulnerabilityCode["LFI_WRAPPER_PROTOCOL"] = "LFI_WRAPPER_PROTOCOL";
89
- VulnerabilityCode["LFI_PROC_DISCLOSURE"] = "LFI_PROC_DISCLOSURE";
90
- // ========================================
91
- // JWT VULNERABILITIES (JWT_*)
92
- // ========================================
93
- VulnerabilityCode["JWT_NONE_ALGORITHM"] = "JWT_NONE_ALGORITHM";
94
- VulnerabilityCode["JWT_WEAK_SECRET"] = "JWT_WEAK_SECRET";
95
- VulnerabilityCode["JWT_KEY_CONFUSION"] = "JWT_KEY_CONFUSION";
96
- VulnerabilityCode["JWT_EXPIRED_TOKEN"] = "JWT_EXPIRED_TOKEN";
97
- VulnerabilityCode["JWT_MISSING_CLAIMS"] = "JWT_MISSING_CLAIMS";
98
- VulnerabilityCode["JWT_CLAIM_TAMPERING"] = "JWT_CLAIM_TAMPERING";
99
- VulnerabilityCode["JWT_KID_INJECTION"] = "JWT_KID_INJECTION";
100
- VulnerabilityCode["JWT_JKU_INJECTION"] = "JWT_JKU_INJECTION";
101
- VulnerabilityCode["JWT_EMBEDDED_JWK"] = "JWT_EMBEDDED_JWK";
102
- VulnerabilityCode["JWT_X5C_INJECTION"] = "JWT_X5C_INJECTION";
103
- // ========================================
104
- // OPEN REDIRECT (REDIRECT_*)
105
- // ========================================
106
- VulnerabilityCode["REDIRECT_HEADER_INJECTION"] = "REDIRECT_HEADER_INJECTION";
107
- VulnerabilityCode["REDIRECT_META_REFRESH"] = "REDIRECT_META_REFRESH";
108
- VulnerabilityCode["REDIRECT_JS_NAVIGATION"] = "REDIRECT_JS_NAVIGATION";
109
- // ========================================
110
- // BROKEN ACCESS CONTROL (BAC_*)
111
- // ========================================
112
- VulnerabilityCode["BAC_ANONYMOUS_ACCESS"] = "BAC_ANONYMOUS_ACCESS";
113
- VulnerabilityCode["BAC_HORIZONTAL_PRIVILEGE"] = "BAC_HORIZONTAL_PRIVILEGE";
114
- VulnerabilityCode["BAC_VERTICAL_PRIVILEGE"] = "BAC_VERTICAL_PRIVILEGE";
115
- VulnerabilityCode["BAC_IDOR"] = "BAC_IDOR";
116
- // ========================================
117
- // SECURITY HEADERS (HEADER_*)
118
- // ========================================
119
- VulnerabilityCode["HEADER_MISSING_CSP"] = "HEADER_MISSING_CSP";
120
- VulnerabilityCode["HEADER_MISSING_HSTS"] = "HEADER_MISSING_HSTS";
121
- VulnerabilityCode["HEADER_MISSING_XFRAME"] = "HEADER_MISSING_XFRAME";
122
- VulnerabilityCode["HEADER_MISSING_XCONTENT_TYPE"] = "HEADER_MISSING_XCONTENT_TYPE";
123
- VulnerabilityCode["HEADER_MISSING_XSS_PROTECTION"] = "HEADER_MISSING_XSS_PROTECTION";
124
- VulnerabilityCode["HEADER_MISSING_REFERRER_POLICY"] = "HEADER_MISSING_REFERRER_POLICY";
125
- VulnerabilityCode["HEADER_MISSING_PERMISSIONS_POLICY"] = "HEADER_MISSING_PERMISSIONS_POLICY";
126
- VulnerabilityCode["HEADER_WEAK_CSP"] = "HEADER_WEAK_CSP";
127
- VulnerabilityCode["HEADER_CORS_MISCONFIGURED"] = "HEADER_CORS_MISCONFIGURED";
128
- VulnerabilityCode["HEADER_COEP_WITHOUT_COOP"] = "HEADER_COEP_WITHOUT_COOP";
129
- VulnerabilityCode["HEADER_CORP_UNUSUAL"] = "HEADER_CORP_UNUSUAL";
130
- VulnerabilityCode["HEADER_EXPECT_CT_PRESENT"] = "HEADER_EXPECT_CT_PRESENT";
131
- VulnerabilityCode["HEADER_SERVER_HEADER_PRESENT"] = "HEADER_SERVER_HEADER_PRESENT";
132
- VulnerabilityCode["HEADER_X_POWERED_BY_PRESENT"] = "HEADER_X_POWERED_BY_PRESENT";
133
- VulnerabilityCode["HEADER_X_XSS_PROTECTION_ENABLED"] = "HEADER_X_XSS_PROTECTION_ENABLED";
134
- VulnerabilityCode["COOKIE_SAMESITE_NONE_WITHOUT_SECURE"] = "COOKIE_SAMESITE_NONE_WITHOUT_SECURE";
135
- VulnerabilityCode["COOKIE_SESSION_MISSING_SECURE"] = "COOKIE_SESSION_MISSING_SECURE";
136
- VulnerabilityCode["COOKIE_MISSING_SECURE"] = "COOKIE_MISSING_SECURE";
137
- VulnerabilityCode["COOKIE_SESSION_MISSING_HTTPONLY"] = "COOKIE_SESSION_MISSING_HTTPONLY";
138
- VulnerabilityCode["COOKIE_MISSING_HTTPONLY"] = "COOKIE_MISSING_HTTPONLY";
139
- VulnerabilityCode["COOKIE_MISSING_SAMESITE"] = "COOKIE_MISSING_SAMESITE";
140
- VulnerabilityCode["COOKIE_HOST_PREFIX_INVALID"] = "COOKIE_HOST_PREFIX_INVALID";
141
- VulnerabilityCode["COOKIE_SECURE_PREFIX_INVALID"] = "COOKIE_SECURE_PREFIX_INVALID";
142
- VulnerabilityCode["HEADER_DRIFT_CSP"] = "HEADER_DRIFT_CSP";
143
- VulnerabilityCode["HEADER_DRIFT_HSTS"] = "HEADER_DRIFT_HSTS";
144
- VulnerabilityCode["HEADER_DRIFT_XCONTENT_TYPE"] = "HEADER_DRIFT_XCONTENT_TYPE";
145
- VulnerabilityCode["HEADER_DRIFT_REFERRER_POLICY"] = "HEADER_DRIFT_REFERRER_POLICY";
146
- VulnerabilityCode["HEADER_DRIFT_XFRAME"] = "HEADER_DRIFT_XFRAME";
147
- VulnerabilityCode["HEADER_DRIFT_PERMISSIONS_POLICY"] = "HEADER_DRIFT_PERMISSIONS_POLICY";
148
- VulnerabilityCode["HEADER_DRIFT_COOP"] = "HEADER_DRIFT_COOP";
149
- VulnerabilityCode["HEADER_DRIFT_COEP"] = "HEADER_DRIFT_COEP";
150
- VulnerabilityCode["HEADER_DRIFT_CORP"] = "HEADER_DRIFT_CORP";
151
- // ========================================
152
- // HOST HEADER INJECTION (HOST_*)
153
- // ========================================
154
- VulnerabilityCode["HOST_CACHE_POISONING"] = "HOST_CACHE_POISONING";
155
- VulnerabilityCode["HOST_PASSWORD_RESET"] = "HOST_PASSWORD_RESET";
156
- VulnerabilityCode["HOST_REDIRECT"] = "HOST_REDIRECT";
157
- // ========================================
158
- // DIRECTORY BROWSING (DIRBROWSE_*)
159
- // ========================================
160
- VulnerabilityCode["DIRBROWSE_ENABLED"] = "DIRBROWSE_ENABLED";
161
- VulnerabilityCode["DIRBROWSE_SENSITIVE"] = "DIRBROWSE_SENSITIVE";
162
- // ========================================
163
- // MASS ASSIGNMENT (MASSASSIGN_*)
164
- // ========================================
165
- VulnerabilityCode["MASSASSIGN_PROTOTYPE_POLLUTION"] = "MASSASSIGN_PROTOTYPE_POLLUTION";
166
- VulnerabilityCode["MASSASSIGN_ROLE_ESCALATION"] = "MASSASSIGN_ROLE_ESCALATION";
167
- VulnerabilityCode["MASSASSIGN_HIDDEN_FIELD"] = "MASSASSIGN_HIDDEN_FIELD";
168
- // ========================================
169
- // DESERIALIZATION (DESER_*)
170
- // ========================================
171
- VulnerabilityCode["DESER_JAVA"] = "DESER_JAVA";
172
- VulnerabilityCode["DESER_PHP"] = "DESER_PHP";
173
- VulnerabilityCode["DESER_PYTHON"] = "DESER_PYTHON";
174
- VulnerabilityCode["DESER_DOTNET"] = "DESER_DOTNET";
175
- VulnerabilityCode["DESER_RUBY"] = "DESER_RUBY";
176
- VulnerabilityCode["DESER_NODE"] = "DESER_NODE";
177
- // ========================================
178
- // SENSITIVE PATH SCOUT - CRITICAL (SENS_CRIT_*)
179
- // ========================================
180
- VulnerabilityCode["SENS_CRIT_AWS_CREDENTIALS"] = "SENS_CRIT_AWS_CREDENTIALS";
181
- VulnerabilityCode["SENS_CRIT_SSH_PRIVATE_KEY"] = "SENS_CRIT_SSH_PRIVATE_KEY";
182
- VulnerabilityCode["SENS_CRIT_SSL_PRIVATE_KEY"] = "SENS_CRIT_SSL_PRIVATE_KEY";
183
- VulnerabilityCode["SENS_CRIT_RAILS_MASTER_KEY"] = "SENS_CRIT_RAILS_MASTER_KEY";
184
- VulnerabilityCode["SENS_CRIT_TERRAFORM_STATE"] = "SENS_CRIT_TERRAFORM_STATE";
185
- VulnerabilityCode["SENS_CRIT_FIREBASE_ADMIN_SDK"] = "SENS_CRIT_FIREBASE_ADMIN_SDK";
186
- VulnerabilityCode["SENS_CRIT_KUBE_CONFIG"] = "SENS_CRIT_KUBE_CONFIG";
187
- VulnerabilityCode["SENS_CRIT_AZURE_STORAGE_KEY"] = "SENS_CRIT_AZURE_STORAGE_KEY";
188
- VulnerabilityCode["SENS_CRIT_CONSUL_KV"] = "SENS_CRIT_CONSUL_KV";
189
- VulnerabilityCode["SENS_CRIT_VAULT_SECRET"] = "SENS_CRIT_VAULT_SECRET";
190
- VulnerabilityCode["SENS_CRIT_DOCKER_SECRET"] = "SENS_CRIT_DOCKER_SECRET";
191
- // ========================================
192
- // SENSITIVE PATH SCOUT - HIGH (SENS_HIGH_*)
193
- // ========================================
194
- VulnerabilityCode["SENS_HIGH_GIT_EXPOSED"] = "SENS_HIGH_GIT_EXPOSED";
195
- VulnerabilityCode["SENS_HIGH_GIT_CONFIG"] = "SENS_HIGH_GIT_CONFIG";
196
- VulnerabilityCode["SENS_HIGH_WORDPRESS_CONFIG"] = "SENS_HIGH_WORDPRESS_CONFIG";
197
- VulnerabilityCode["SENS_HIGH_SPRING_ACTUATOR"] = "SENS_HIGH_SPRING_ACTUATOR";
198
- VulnerabilityCode["SENS_HIGH_SPRING_HEAPDUMP"] = "SENS_HIGH_SPRING_HEAPDUMP";
199
- VulnerabilityCode["SENS_HIGH_DATABASE_BACKUP"] = "SENS_HIGH_DATABASE_BACKUP";
200
- VulnerabilityCode["SENS_HIGH_PHPINFO"] = "SENS_HIGH_PHPINFO";
201
- VulnerabilityCode["SENS_HIGH_LARAVEL_DEBUG"] = "SENS_HIGH_LARAVEL_DEBUG";
202
- VulnerabilityCode["SENS_HIGH_GCP_SERVICE_ACCOUNT"] = "SENS_HIGH_GCP_SERVICE_ACCOUNT";
203
- VulnerabilityCode["SENS_HIGH_GRAPHQL_INTROSPECTION"] = "SENS_HIGH_GRAPHQL_INTROSPECTION";
204
- VulnerabilityCode["SENS_HIGH_PHPMYADMIN"] = "SENS_HIGH_PHPMYADMIN";
205
- VulnerabilityCode["SENS_HIGH_MONGODB_CONFIG"] = "SENS_HIGH_MONGODB_CONFIG";
206
- VulnerabilityCode["SENS_HIGH_JAVA_KEYSTORE"] = "SENS_HIGH_JAVA_KEYSTORE";
207
- VulnerabilityCode["SENS_HIGH_PHP_SESSION"] = "SENS_HIGH_PHP_SESSION";
208
- VulnerabilityCode["SENS_HIGH_ENV_FILE"] = "SENS_HIGH_ENV_FILE";
209
- VulnerabilityCode["SENS_HIGH_BACKUP_FILE"] = "SENS_HIGH_BACKUP_FILE";
210
- VulnerabilityCode["SENS_HIGH_HTPASSWD"] = "SENS_HIGH_HTPASSWD";
211
- VulnerabilityCode["SENS_HIGH_DS_STORE"] = "SENS_HIGH_DS_STORE";
212
- // ========================================
213
- // SENSITIVE PATH SCOUT - MEDIUM (SENS_MED_*)
214
- // ========================================
215
- VulnerabilityCode["SENS_MED_SWAGGER_DOCS"] = "SENS_MED_SWAGGER_DOCS";
216
- VulnerabilityCode["SENS_MED_APACHE_STATUS"] = "SENS_MED_APACHE_STATUS";
217
- VulnerabilityCode["SENS_MED_PROMETHEUS_METRICS"] = "SENS_MED_PROMETHEUS_METRICS";
218
- VulnerabilityCode["SENS_MED_DOCKERFILE"] = "SENS_MED_DOCKERFILE";
219
- VulnerabilityCode["SENS_MED_FIREBASE_CONFIG"] = "SENS_MED_FIREBASE_CONFIG";
220
- VulnerabilityCode["SENS_MED_SOURCE_MAP"] = "SENS_MED_SOURCE_MAP";
221
- VulnerabilityCode["SENS_MED_ELASTICSEARCH"] = "SENS_MED_ELASTICSEARCH";
222
- VulnerabilityCode["SENS_MED_ADMIN_PANEL"] = "SENS_MED_ADMIN_PANEL";
223
- VulnerabilityCode["SENS_MED_COMPOSER_LOCK"] = "SENS_MED_COMPOSER_LOCK";
224
- VulnerabilityCode["SENS_MED_PACKAGE_LOCK"] = "SENS_MED_PACKAGE_LOCK";
225
- VulnerabilityCode["SENS_MED_GEMFILE_LOCK"] = "SENS_MED_GEMFILE_LOCK";
226
- VulnerabilityCode["SENS_MED_ROBOTS_TXT"] = "SENS_MED_ROBOTS_TXT";
227
- VulnerabilityCode["SENS_MED_SITEMAP"] = "SENS_MED_SITEMAP";
228
- VulnerabilityCode["SENS_MED_CROSSDOMAIN_XML"] = "SENS_MED_CROSSDOMAIN_XML";
229
- // ========================================
230
- // SENSITIVE PATH SCOUT - LOW (SENS_LOW_*)
231
- // ========================================
232
- VulnerabilityCode["SENS_LOW_TRAVIS_CI"] = "SENS_LOW_TRAVIS_CI";
233
- VulnerabilityCode["SENS_LOW_JENKINSFILE"] = "SENS_LOW_JENKINSFILE";
234
- VulnerabilityCode["SENS_LOW_CIRCLECI"] = "SENS_LOW_CIRCLECI";
235
- VulnerabilityCode["SENS_LOW_GITLAB_CI"] = "SENS_LOW_GITLAB_CI";
236
- VulnerabilityCode["SENS_LOW_README"] = "SENS_LOW_README";
237
- VulnerabilityCode["SENS_LOW_CHANGELOG"] = "SENS_LOW_CHANGELOG";
238
- VulnerabilityCode["SENS_LOW_LICENSE"] = "SENS_LOW_LICENSE";
239
- // ========================================
240
- // SENSITIVE PATH SCOUT - EXTENDED
241
- // ========================================
242
- // HIGH
243
- VulnerabilityCode["SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED"] = "SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED";
244
- VulnerabilityCode["SENS_HIGH_APPSETTINGS_JSON_EXPOSED"] = "SENS_HIGH_APPSETTINGS_JSON_EXPOSED";
245
- VulnerabilityCode["SENS_HIGH_SPRING_CONFIG_EXPOSED"] = "SENS_HIGH_SPRING_CONFIG_EXPOSED";
246
- VulnerabilityCode["SENS_HIGH_NPMRC_EXPOSED"] = "SENS_HIGH_NPMRC_EXPOSED";
247
- VulnerabilityCode["SENS_HIGH_RAILS_DATABASE_YML_EXPOSED"] = "SENS_HIGH_RAILS_DATABASE_YML_EXPOSED";
248
- VulnerabilityCode["SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED"] = "SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED";
249
- VulnerabilityCode["SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED"] = "SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED";
250
- VulnerabilityCode["SENS_HIGH_JOLOKIA_EXPOSED"] = "SENS_HIGH_JOLOKIA_EXPOSED";
251
- VulnerabilityCode["SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED"] = "SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED";
252
- VulnerabilityCode["SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED"] = "SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED";
253
- VulnerabilityCode["SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED"] = "SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED";
254
- VulnerabilityCode["SENS_HIGH_REDIS_RDB_DUMP_DETECTED"] = "SENS_HIGH_REDIS_RDB_DUMP_DETECTED";
255
- VulnerabilityCode["SENS_HIGH_TRACE_AXD"] = "SENS_HIGH_TRACE_AXD";
256
- VulnerabilityCode["SENS_HIGH_ELMAH_AXD_EXPOSED"] = "SENS_HIGH_ELMAH_AXD_EXPOSED";
257
- VulnerabilityCode["SENS_HIGH_SQLITE_DATABASE_DETECTED"] = "SENS_HIGH_SQLITE_DATABASE_DETECTED";
258
- VulnerabilityCode["SENS_HIGH_AWS_CONFIG_EXPOSED"] = "SENS_HIGH_AWS_CONFIG_EXPOSED";
259
- VulnerabilityCode["SENS_HIGH_AZURE_CREDENTIALS_EXPOSED"] = "SENS_HIGH_AZURE_CREDENTIALS_EXPOSED";
260
- VulnerabilityCode["SENS_HIGH_HELM_VALUES_EXPOSED"] = "SENS_HIGH_HELM_VALUES_EXPOSED";
261
- VulnerabilityCode["SENS_HIGH_TERRAFORM_VARS_EXPOSED"] = "SENS_HIGH_TERRAFORM_VARS_EXPOSED";
262
- VulnerabilityCode["SENS_HIGH_LARAVEL_LOG_EXPOSED"] = "SENS_HIGH_LARAVEL_LOG_EXPOSED";
263
- VulnerabilityCode["SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED"] = "SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED";
264
- VulnerabilityCode["SENS_HIGH_ADMINER_EXPOSED"] = "SENS_HIGH_ADMINER_EXPOSED";
265
- VulnerabilityCode["SENS_HIGH_DEBUG_ENDPOINT_EXPOSED"] = "SENS_HIGH_DEBUG_ENDPOINT_EXPOSED";
266
- VulnerabilityCode["SENS_HIGH_GO_DEBUG_VARS_EXPOSED"] = "SENS_HIGH_GO_DEBUG_VARS_EXPOSED";
267
- VulnerabilityCode["SENS_HIGH_GO_PPROF_EXPOSED"] = "SENS_HIGH_GO_PPROF_EXPOSED";
268
- VulnerabilityCode["SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED"] = "SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED";
269
- VulnerabilityCode["SENS_HIGH_MONGO_RC_EXPOSED"] = "SENS_HIGH_MONGO_RC_EXPOSED";
270
- // MEDIUM
271
- VulnerabilityCode["SENS_MED_UN_PROTECTED_CONFIG_JSON"] = "SENS_MED_UN_PROTECTED_CONFIG_JSON";
272
- VulnerabilityCode["SENS_MED_MERCURIAL_REPOSITORY_FOUND"] = "SENS_MED_MERCURIAL_REPOSITORY_FOUND";
273
- VulnerabilityCode["SENS_MED_MERCURIAL_HGRC_EXPOSED"] = "SENS_MED_MERCURIAL_HGRC_EXPOSED";
274
- VulnerabilityCode["SENS_MED_CVS_ROOT_EXPOSED"] = "SENS_MED_CVS_ROOT_EXPOSED";
275
- VulnerabilityCode["SENS_MED_CVS_ENTRIES_EXPOSED"] = "SENS_MED_CVS_ENTRIES_EXPOSED";
276
- VulnerabilityCode["SENS_MED_BAZAAR_REPO_EXPOSED"] = "SENS_MED_BAZAAR_REPO_EXPOSED";
277
- VulnerabilityCode["SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED"] = "SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED";
278
- VulnerabilityCode["SENS_MED_LARAVEL_LOG_VIEWER_ENABLED"] = "SENS_MED_LARAVEL_LOG_VIEWER_ENABLED";
279
- VulnerabilityCode["SENS_MED_APACHE_HTACCESS_FILE_DETECTED"] = "SENS_MED_APACHE_HTACCESS_FILE_DETECTED";
280
- VulnerabilityCode["SENS_MED_APACHE_SERVER_INFO_EXPOSED"] = "SENS_MED_APACHE_SERVER_INFO_EXPOSED";
281
- VulnerabilityCode["SENS_MED_PACKAGE_DEPENDENCIES_DETECTED"] = "SENS_MED_PACKAGE_DEPENDENCIES_DETECTED";
282
- VulnerabilityCode["SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED"] = "SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED";
283
- VulnerabilityCode["SENS_MED_SSH_PUBLIC_KEY_EXPOSED"] = "SENS_MED_SSH_PUBLIC_KEY_EXPOSED";
284
- VulnerabilityCode["SENS_MED_SSL_CERTIFICATE_EXPOSED"] = "SENS_MED_SSL_CERTIFICATE_EXPOSED";
285
- VulnerabilityCode["SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED"] = "SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED";
286
- VulnerabilityCode["SENS_MED_GRAPHI_QL_EXPOSED"] = "SENS_MED_GRAPHI_QL_EXPOSED";
287
- VulnerabilityCode["SENS_MED_TERRAFORM_LOCK_EXPOSED"] = "SENS_MED_TERRAFORM_LOCK_EXPOSED";
288
- VulnerabilityCode["SENS_MED_ERROR_LOG_EXPOSED"] = "SENS_MED_ERROR_LOG_EXPOSED";
289
- VulnerabilityCode["SENS_MED_ACCESS_LOG_EXPOSED"] = "SENS_MED_ACCESS_LOG_EXPOSED";
290
- VulnerabilityCode["SENS_MED_DEBUG_LOG_EXPOSED"] = "SENS_MED_DEBUG_LOG_EXPOSED";
291
- VulnerabilityCode["SENS_MED_APPLICATION_LOG_EXPOSED"] = "SENS_MED_APPLICATION_LOG_EXPOSED";
292
- VulnerabilityCode["SENS_MED_WSDL_EXPOSED"] = "SENS_MED_WSDL_EXPOSED";
293
- VulnerabilityCode["SENS_MED_WORD_PRESS_XML_RPC_EXPOSED"] = "SENS_MED_WORD_PRESS_XML_RPC_EXPOSED";
294
- // LOW
295
- VulnerabilityCode["SENS_LOW_TOML_PROJECT_FILE_EXPOSED"] = "SENS_LOW_TOML_PROJECT_FILE_EXPOSED";
296
- VulnerabilityCode["SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED"] = "SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED";
297
- VulnerabilityCode["SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED"] = "SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED";
298
- VulnerabilityCode["SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED"] = "SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED";
299
- VulnerabilityCode["SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED"] = "SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED";
300
- VulnerabilityCode["SENS_LOW_PYTHON_REQUIREMENTS_DETECTED"] = "SENS_LOW_PYTHON_REQUIREMENTS_DETECTED";
301
- VulnerabilityCode["SENS_LOW_TEST_ENDPOINT_EXPOSED"] = "SENS_LOW_TEST_ENDPOINT_EXPOSED";
302
- VulnerabilityCode["SENS_LOW_STAGING_ENDPOINT_EXPOSED"] = "SENS_LOW_STAGING_ENDPOINT_EXPOSED";
303
- VulnerabilityCode["SENS_LOW_EDITOR_BACKUP_FILE_DETECTED"] = "SENS_LOW_EDITOR_BACKUP_FILE_DETECTED";
304
- VulnerabilityCode["SENS_LOW_VIM_SWAP_FILE_DETECTED"] = "SENS_LOW_VIM_SWAP_FILE_DETECTED";
305
- VulnerabilityCode["SENS_LOW_DIRECTORY_LISTING_ENABLED"] = "SENS_LOW_DIRECTORY_LISTING_ENABLED";
306
- VulnerabilityCode["SENS_LOW_AWSSAM_TEMPLATE_EXPOSED"] = "SENS_LOW_AWSSAM_TEMPLATE_EXPOSED";
307
- VulnerabilityCode["SENS_LOW_SERVERLESS_CONFIG_EXPOSED"] = "SENS_LOW_SERVERLESS_CONFIG_EXPOSED";
308
- VulnerabilityCode["SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED"] = "SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED";
309
- // ========================================
310
- // CLICKJACKING (CLICK_*)
311
- // ========================================
312
- VulnerabilityCode["CLICK_FRAMEABLE"] = "CLICK_FRAMEABLE";
313
- VulnerabilityCode["CLICK_PARTIAL_PROTECTION"] = "CLICK_PARTIAL_PROTECTION";
314
- })(VulnerabilityCode || (exports.VulnerabilityCode = VulnerabilityCode = {}));
315
- exports.default = VulnerabilityCode;
@@ -1 +0,0 @@
1
- {"version":3,"file":"error-codes.js","sourceRoot":"","sources":["error-codes.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AAEH,MAAM,CAAN,IAAY,iBAoUX;AApUD,WAAY,iBAAiB;IACzB,2CAA2C;IAC3C,yBAAyB;IACzB,2CAA2C;IAC3C,0DAAqC,CAAA;IACrC,8DAAyC,CAAA;IACzC,wDAAmC,CAAA;IACnC,0DAAqC,CAAA;IACrC,0DAAqC,CAAA;IAErC,2CAA2C;IAC3C,+BAA+B;IAC/B,2CAA2C;IAC3C,oDAA+B,CAAA;IAC/B,8CAAyB,CAAA;IACzB,oDAA+B,CAAA;IAC/B,4DAAuC,CAAA;IACvC,0DAAqC,CAAA;IACrC,kDAA6B,CAAA;IAC7B,4DAAuC,CAAA;IACvC,kEAA6C,CAAA;IAC7C,8DAAyC,CAAA;IACzC,wEAAmD,CAAA;IACnD,sDAAiC,CAAA;IACjC,4DAAuC,CAAA;IACvC,sDAAiC,CAAA;IACjC,kEAA6C,CAAA;IAC7C,8DAAyC,CAAA;IAEzC,2CAA2C;IAC3C,6BAA6B;IAC7B,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,sDAAiC,CAAA;IACjC,wDAAmC,CAAA;IACnC,0DAAqC,CAAA;IAErC,2CAA2C;IAC3C,uCAAuC;IACvC,2CAA2C;IAC3C,gEAA2C,CAAA;IAC3C,oEAA+C,CAAA;IAC/C,wEAAmD,CAAA;IACnD,sDAAiC,CAAA;IACjC,8DAAyC,CAAA;IAEzC,2CAA2C;IAC3C,0CAA0C;IAC1C,2CAA2C;IAC3C,gDAA2B,CAAA;IAC3B,4CAAuB,CAAA;IACvB,wDAAmC,CAAA;IACnC,oDAA+B,CAAA;IAC/B,sDAAiC,CAAA;IACjC,0CAAqB,CAAA;IACrB,0CAAqB,CAAA;IACrB,0CAAqB,CAAA;IACrB,gDAA2B,CAAA;IAC3B,4CAAuB,CAAA;IACvB,kDAA6B,CAAA;IAE7B,2CAA2C;IAC3C,8BAA8B;IAC9B,2CAA2C;IAC3C,gDAA2B,CAAA;IAC3B,4CAAuB,CAAA;IACvB,wCAAmB,CAAA;IACnB,wDAAmC,CAAA;IACnC,kEAA6C,CAAA;IAE7C,2CAA2C;IAC3C,4BAA4B;IAC5B,2CAA2C;IAC3C,4DAAuC,CAAA;IACvC,oEAA+C,CAAA;IAC/C,gDAA2B,CAAA;IAC3B,4DAAuC,CAAA;IAEvC,2CAA2C;IAC3C,+BAA+B;IAC/B,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,4DAAuC,CAAA;IACvC,oEAA+C,CAAA;IAC/C,kEAA6C,CAAA;IAC7C,gEAA2C,CAAA;IAE3C,2CAA2C;IAC3C,8BAA8B;IAC9B,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,wDAAmC,CAAA;IACnC,4DAAuC,CAAA;IACvC,4DAAuC,CAAA;IACvC,8DAAyC,CAAA;IACzC,gEAA2C,CAAA;IAC3C,4DAAuC,CAAA;IACvC,4DAAuC,CAAA;IACvC,0DAAqC,CAAA;IACrC,4DAAuC,CAAA;IAEvC,2CAA2C;IAC3C,6BAA6B;IAC7B,2CAA2C;IAC3C,4EAAuD,CAAA;IACvD,oEAA+C,CAAA;IAC/C,sEAAiD,CAAA;IAEjD,2CAA2C;IAC3C,gCAAgC;IAChC,2CAA2C;IAC3C,kEAA6C,CAAA;IAC7C,0EAAqD,CAAA;IACrD,sEAAiD,CAAA;IACjD,0CAAqB,CAAA;IAErB,2CAA2C;IAC3C,8BAA8B;IAC9B,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,gEAA2C,CAAA;IAC3C,oEAA+C,CAAA;IAC/C,kFAA6D,CAAA;IAC7D,oFAA+D,CAAA;IAC/D,sFAAiE,CAAA;IACjE,4FAAuE,CAAA;IACvE,wDAAmC,CAAA;IACnC,4EAAuD,CAAA;IACvD,0EAAqD,CAAA;IACrD,gEAA2C,CAAA;IAC3C,0EAAqD,CAAA;IACrD,kFAA6D,CAAA;IAC7D,gFAA2D,CAAA;IAC3D,wFAAmE,CAAA;IACnE,gGAA2E,CAAA;IAC3E,oFAA+D,CAAA;IAC/D,oEAA+C,CAAA;IAC/C,wFAAmE,CAAA;IACnE,wEAAmD,CAAA;IACnD,wEAAmD,CAAA;IACnD,8EAAyD,CAAA;IACzD,kFAA6D,CAAA;IAC7D,0DAAqC,CAAA;IACrC,4DAAuC,CAAA;IACvC,8EAAyD,CAAA;IACzD,kFAA6D,CAAA;IAC7D,gEAA2C,CAAA;IAC3C,wFAAmE,CAAA;IACnE,4DAAuC,CAAA;IACvC,4DAAuC,CAAA;IACvC,4DAAuC,CAAA;IAEvC,2CAA2C;IAC3C,iCAAiC;IACjC,2CAA2C;IAC3C,kEAA6C,CAAA;IAC7C,gEAA2C,CAAA;IAC3C,oDAA+B,CAAA;IAE/B,2CAA2C;IAC3C,mCAAmC;IACnC,2CAA2C;IAC3C,4DAAuC,CAAA;IACvC,gEAA2C,CAAA;IAE3C,2CAA2C;IAC3C,iCAAiC;IACjC,2CAA2C;IAC3C,sFAAiE,CAAA;IACjE,8EAAyD,CAAA;IACzD,wEAAmD,CAAA;IAEnD,2CAA2C;IAC3C,4BAA4B;IAC5B,2CAA2C;IAC3C,8CAAyB,CAAA;IACzB,4CAAuB,CAAA;IACvB,kDAA6B,CAAA;IAC7B,kDAA6B,CAAA;IAC7B,8CAAyB,CAAA;IACzB,8CAAyB,CAAA;IAEzB,2CAA2C;IAC3C,gDAAgD;IAChD,2CAA2C;IAC3C,4EAAuD,CAAA;IACvD,4EAAuD,CAAA;IACvD,4EAAuD,CAAA;IACvD,8EAAyD,CAAA;IACzD,4EAAuD,CAAA;IACvD,kFAA6D,CAAA;IAC7D,oEAA+C,CAAA;IAC/C,gFAA2D,CAAA;IAC3D,gEAA2C,CAAA;IAC3C,sEAAiD,CAAA;IACjD,wEAAmD,CAAA;IAEnD,2CAA2C;IAC3C,4CAA4C;IAC5C,2CAA2C;IAC3C,oEAA+C,CAAA;IAC/C,kEAA6C,CAAA;IAC7C,8EAAyD,CAAA;IACzD,4EAAuD,CAAA;IACvD,4EAAuD,CAAA;IACvD,4EAAuD,CAAA;IACvD,4DAAuC,CAAA;IACvC,wEAAmD,CAAA;IACnD,oFAA+D,CAAA;IAC/D,wFAAmE,CAAA;IACnE,kEAA6C,CAAA;IAC7C,0EAAqD,CAAA;IACrD,wEAAmD,CAAA;IACnD,oEAA+C,CAAA;IAC/C,8DAAyC,CAAA;IACzC,oEAA+C,CAAA;IAC/C,8DAAyC,CAAA;IACzC,8DAAyC,CAAA;IAEzC,2CAA2C;IAC3C,6CAA6C;IAC7C,2CAA2C;IAC3C,oEAA+C,CAAA;IAC/C,sEAAiD,CAAA;IACjD,gFAA2D,CAAA;IAC3D,gEAA2C,CAAA;IAC3C,0EAAqD,CAAA;IACrD,gEAA2C,CAAA;IAC3C,sEAAiD,CAAA;IACjD,kEAA6C,CAAA;IAC7C,sEAAiD,CAAA;IACjD,oEAA+C,CAAA;IAC/C,oEAA+C,CAAA;IAC/C,gEAA2C,CAAA;IAC3C,0DAAqC,CAAA;IACrC,0EAAqD,CAAA;IAErD,2CAA2C;IAC3C,0CAA0C;IAC1C,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,kEAA6C,CAAA;IAC7C,4DAAuC,CAAA;IACvC,8DAAyC,CAAA;IACzC,wDAAmC,CAAA;IACnC,8DAAyC,CAAA;IACzC,0DAAqC,CAAA;IAErC,2CAA2C;IAC3C,kCAAkC;IAClC,2CAA2C;IAC3C,OAAO;IACP,0HAAqG,CAAA;IACrG,8FAAyE,CAAA;IACzE,wFAAmE,CAAA;IACnE,wEAAmD,CAAA;IACnD,kGAA6E,CAAA;IAC7E,oGAA+E,CAAA;IAC/E,4FAAuE,CAAA;IACvE,4EAAuD,CAAA;IACvD,gHAA2F,CAAA;IAC3F,0GAAqF,CAAA;IACrF,4GAAuF,CAAA;IACvF,4FAAuE,CAAA;IACvE,gEAA2C,CAAA;IAC3C,gFAA2D,CAAA;IAC3D,8FAAyE,CAAA;IACzE,kFAA6D,CAAA;IAC7D,gGAA2E,CAAA;IAC3E,oFAA+D,CAAA;IAC/D,0FAAqE,CAAA;IACrE,oFAA+D,CAAA;IAC/D,sGAAiF,CAAA;IACjF,4EAAuD,CAAA;IACvD,0FAAqE,CAAA;IACrE,wFAAmE,CAAA;IACnE,8EAAyD,CAAA;IACzD,sGAAiF,CAAA;IACjF,8EAAyD,CAAA;IACzD,SAAS;IACT,4FAAuE,CAAA;IACvE,gGAA2E,CAAA;IAC3E,wFAAmE,CAAA;IACnE,4EAAuD,CAAA;IACvD,kFAA6D,CAAA;IAC7D,kFAA6D,CAAA;IAC7D,sHAAiG,CAAA;IACjG,gGAA2E,CAAA;IAC3E,sGAAiF,CAAA;IACjF,gGAA2E,CAAA;IAC3E,sGAAiF,CAAA;IACjF,gHAA2F,CAAA;IAC3F,wFAAmE,CAAA;IACnE,0FAAqE,CAAA;IACrE,8FAAyE,CAAA;IACzE,8EAAyD,CAAA;IACzD,wFAAmE,CAAA;IACnE,8EAAyD,CAAA;IACzD,gFAA2D,CAAA;IAC3D,8EAAyD,CAAA;IACzD,0FAAqE,CAAA;IACrE,oEAA+C,CAAA;IAC/C,gGAA2E,CAAA;IAC3E,MAAM;IACN,8FAAyE,CAAA;IACzE,oJAA+H,CAAA;IAC/H,wHAAmG,CAAA;IACnG,8GAAyF,CAAA;IACzF,4GAAuF,CAAA;IACvF,oGAA+E,CAAA;IAC/E,sFAAiE,CAAA;IACjE,4FAAuE,CAAA;IACvE,kGAA6E,CAAA;IAC7E,wFAAmE,CAAA;IACnE,8FAAyE,CAAA;IACzE,0FAAqE,CAAA;IACrE,8FAAyE,CAAA;IACzE,4GAAuF,CAAA;IAEvF,2CAA2C;IAC3C,yBAAyB;IACzB,2CAA2C;IAC3C,wDAAmC,CAAA;IACnC,0EAAqD,CAAA;AACzD,CAAC,EApUW,iBAAiB,KAAjB,iBAAiB,QAoU5B;AAED,eAAe,iBAAiB,CAAC"}
package/src/index.d.ts DELETED
@@ -1,60 +0,0 @@
1
- /**
2
- * Vulnerability Registry - Main Entry Point
3
- *
4
- * Exports all vulnerability codes, definitions, and lookup utilities
5
- */
6
- import { VulnerabilityCode } from './error-codes.js';
7
- import type { VulnerabilityDefinition, VulnerabilityLookup, Severity, VulnerabilityCategory } from './types.js';
8
- import { INJECTION_VULNERABILITIES } from './categories/injection.js';
9
- import { XSS_VULNERABILITIES } from './categories/xss.js';
10
- import { SSRF_VULNERABILITIES } from './categories/ssrf.js';
11
- import { AUTH_VULNERABILITIES } from './categories/authentication.js';
12
- import { CONFIG_VULNERABILITIES } from './categories/configuration.js';
13
- import { SENSITIVE_PATH_VULNERABILITIES } from './categories/sensitive-paths.js';
14
- /**
15
- * Complete vulnerability registry combining all categories
16
- */
17
- export declare const VULNERABILITY_REGISTRY: Record<string, VulnerabilityDefinition>;
18
- /**
19
- * Get vulnerability definition by code
20
- */
21
- export declare function getVulnerabilityDefinition(code: VulnerabilityCode | string): VulnerabilityLookup;
22
- /**
23
- * Get all vulnerabilities for a specific scanner
24
- */
25
- export declare function getVulnerabilitiesByScanner(scanner: string): VulnerabilityDefinition[];
26
- /**
27
- * Get all vulnerabilities for a specific category
28
- */
29
- export declare function getVulnerabilitiesByCategory(category: VulnerabilityCategory): VulnerabilityDefinition[];
30
- /**
31
- * Get all vulnerabilities for a specific severity
32
- */
33
- export declare function getVulnerabilitiesBySeverity(severity: Severity): VulnerabilityDefinition[];
34
- /**
35
- * Get all vulnerability codes
36
- */
37
- export declare function getAllVulnerabilityCodes(): VulnerabilityCode[];
38
- /**
39
- * Get total count of registered vulnerabilities
40
- */
41
- export declare function getVulnerabilityCount(): number;
42
- /**
43
- * Create a finding with vulnerability definition
44
- */
45
- export declare function createFinding(code: VulnerabilityCode | string, overrides?: Partial<VulnerabilityDefinition>): VulnerabilityDefinition | null;
46
- export { VulnerabilityCode } from './error-codes.js';
47
- export type { VulnerabilityDefinition, VulnerabilityLookup, CVSSProfile, CWEReference, OWASPReference, Severity, VulnerabilityCategory, } from './types.js';
48
- export { INJECTION_VULNERABILITIES, XSS_VULNERABILITIES, SSRF_VULNERABILITIES, AUTH_VULNERABILITIES, CONFIG_VULNERABILITIES, SENSITIVE_PATH_VULNERABILITIES, };
49
- declare const _default: {
50
- VulnerabilityCode: typeof VulnerabilityCode;
51
- VULNERABILITY_REGISTRY: Record<string, VulnerabilityDefinition>;
52
- getVulnerabilityDefinition: typeof getVulnerabilityDefinition;
53
- getVulnerabilitiesByScanner: typeof getVulnerabilitiesByScanner;
54
- getVulnerabilitiesByCategory: typeof getVulnerabilitiesByCategory;
55
- getVulnerabilitiesBySeverity: typeof getVulnerabilitiesBySeverity;
56
- getAllVulnerabilityCodes: typeof getAllVulnerabilityCodes;
57
- getVulnerabilityCount: typeof getVulnerabilityCount;
58
- createFinding: typeof createFinding;
59
- };
60
- export default _default;
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAEH,OAAO,EAAE,iBAAiB,EAAE,MAAM,kBAAkB,CAAC;AACrD,OAAO,KAAK,EAAE,uBAAuB,EAAE,mBAAmB,EAA6C,QAAQ,EAAE,qBAAqB,EAAE,MAAM,YAAY,CAAC;AAG3J,OAAO,EAAE,yBAAyB,EAAE,MAAM,2BAA2B,CAAC;AACtE,OAAO,EAAE,mBAAmB,EAAE,MAAM,qBAAqB,CAAC;AAC1D,OAAO,EAAE,oBAAoB,EAAE,MAAM,sBAAsB,CAAC;AAC5D,OAAO,EAAE,oBAAoB,EAAE,MAAM,gCAAgC,CAAC;AACtE,OAAO,EAAE,sBAAsB,EAAE,MAAM,+BAA+B,CAAC;AACvE,OAAO,EAAE,8BAA8B,EAAE,MAAM,iCAAiC,CAAC;AAEjF;;GAEG;AACH,eAAO,MAAM,sBAAsB,EAAE,MAAM,CAAC,MAAM,EAAE,uBAAuB,CAO1E,CAAC;AAEF;;GAEG;AACH,wBAAgB,0BAA0B,CAAC,IAAI,EAAE,iBAAiB,GAAG,MAAM,GAAG,mBAAmB,CAMhG;AAED;;GAEG;AACH,wBAAgB,2BAA2B,CAAC,OAAO,EAAE,MAAM,GAAG,uBAAuB,EAAE,CAEtF;AAED;;GAEG;AACH,wBAAgB,4BAA4B,CAAC,QAAQ,EAAE,qBAAqB,GAAG,uBAAuB,EAAE,CAEvG;AAED;;GAEG;AACH,wBAAgB,4BAA4B,CAAC,QAAQ,EAAE,QAAQ,GAAG,uBAAuB,EAAE,CAE1F;AAED;;GAEG;AACH,wBAAgB,wBAAwB,IAAI,iBAAiB,EAAE,CAE9D;AAED;;GAEG;AACH,wBAAgB,qBAAqB,IAAI,MAAM,CAE9C;AAED;;GAEG;AACH,wBAAgB,aAAa,CACzB,IAAI,EAAE,iBAAiB,GAAG,MAAM,EAChC,SAAS,CAAC,EAAE,OAAO,CAAC,uBAAuB,CAAC,GAC7C,uBAAuB,GAAG,IAAI,CAUhC;AAGD,OAAO,EAAE,iBAAiB,EAAE,MAAM,kBAAkB,CAAC;AACrD,YAAY,EACR,uBAAuB,EACvB,mBAAmB,EACnB,WAAW,EACX,YAAY,EACZ,cAAc,EACd,QAAQ,EACR,qBAAqB,GACxB,MAAM,YAAY,CAAC;AAGpB,OAAO,EACH,yBAAyB,EACzB,mBAAmB,EACnB,oBAAoB,EACpB,oBAAoB,EACpB,sBAAsB,EACtB,8BAA8B,GACjC,CAAC;;;;;;;;;;;;AAEF,wBAUE"}
package/src/index.js DELETED
@@ -1,107 +0,0 @@
1
- "use strict";
2
- /**
3
- * Vulnerability Registry - Main Entry Point
4
- *
5
- * Exports all vulnerability codes, definitions, and lookup utilities
6
- */
7
- Object.defineProperty(exports, "__esModule", { value: true });
8
- exports.SENSITIVE_PATH_VULNERABILITIES = exports.CONFIG_VULNERABILITIES = exports.AUTH_VULNERABILITIES = exports.SSRF_VULNERABILITIES = exports.XSS_VULNERABILITIES = exports.INJECTION_VULNERABILITIES = exports.VulnerabilityCode = exports.VULNERABILITY_REGISTRY = void 0;
9
- exports.getVulnerabilityDefinition = getVulnerabilityDefinition;
10
- exports.getVulnerabilitiesByScanner = getVulnerabilitiesByScanner;
11
- exports.getVulnerabilitiesByCategory = getVulnerabilitiesByCategory;
12
- exports.getVulnerabilitiesBySeverity = getVulnerabilitiesBySeverity;
13
- exports.getAllVulnerabilityCodes = getAllVulnerabilityCodes;
14
- exports.getVulnerabilityCount = getVulnerabilityCount;
15
- exports.createFinding = createFinding;
16
- const error_codes_js_1 = require("./error-codes.js");
17
- // Import all category definitions
18
- const injection_js_1 = require("./categories/injection.js");
19
- Object.defineProperty(exports, "INJECTION_VULNERABILITIES", { enumerable: true, get: function () { return injection_js_1.INJECTION_VULNERABILITIES; } });
20
- const xss_js_1 = require("./categories/xss.js");
21
- Object.defineProperty(exports, "XSS_VULNERABILITIES", { enumerable: true, get: function () { return xss_js_1.XSS_VULNERABILITIES; } });
22
- const ssrf_js_1 = require("./categories/ssrf.js");
23
- Object.defineProperty(exports, "SSRF_VULNERABILITIES", { enumerable: true, get: function () { return ssrf_js_1.SSRF_VULNERABILITIES; } });
24
- const authentication_js_1 = require("./categories/authentication.js");
25
- Object.defineProperty(exports, "AUTH_VULNERABILITIES", { enumerable: true, get: function () { return authentication_js_1.AUTH_VULNERABILITIES; } });
26
- const configuration_js_1 = require("./categories/configuration.js");
27
- Object.defineProperty(exports, "CONFIG_VULNERABILITIES", { enumerable: true, get: function () { return configuration_js_1.CONFIG_VULNERABILITIES; } });
28
- const sensitive_paths_js_1 = require("./categories/sensitive-paths.js");
29
- Object.defineProperty(exports, "SENSITIVE_PATH_VULNERABILITIES", { enumerable: true, get: function () { return sensitive_paths_js_1.SENSITIVE_PATH_VULNERABILITIES; } });
30
- /**
31
- * Complete vulnerability registry combining all categories
32
- */
33
- exports.VULNERABILITY_REGISTRY = {
34
- ...injection_js_1.INJECTION_VULNERABILITIES,
35
- ...xss_js_1.XSS_VULNERABILITIES,
36
- ...ssrf_js_1.SSRF_VULNERABILITIES,
37
- ...authentication_js_1.AUTH_VULNERABILITIES,
38
- ...configuration_js_1.CONFIG_VULNERABILITIES,
39
- ...sensitive_paths_js_1.SENSITIVE_PATH_VULNERABILITIES,
40
- };
41
- /**
42
- * Get vulnerability definition by code
43
- */
44
- function getVulnerabilityDefinition(code) {
45
- const definition = exports.VULNERABILITY_REGISTRY[code];
46
- if (definition) {
47
- return { found: true, definition };
48
- }
49
- return { found: false };
50
- }
51
- /**
52
- * Get all vulnerabilities for a specific scanner
53
- */
54
- function getVulnerabilitiesByScanner(scanner) {
55
- return Object.values(exports.VULNERABILITY_REGISTRY).filter(v => v.scanner === scanner);
56
- }
57
- /**
58
- * Get all vulnerabilities for a specific category
59
- */
60
- function getVulnerabilitiesByCategory(category) {
61
- return Object.values(exports.VULNERABILITY_REGISTRY).filter(v => v.category === category);
62
- }
63
- /**
64
- * Get all vulnerabilities for a specific severity
65
- */
66
- function getVulnerabilitiesBySeverity(severity) {
67
- return Object.values(exports.VULNERABILITY_REGISTRY).filter(v => v.severity === severity);
68
- }
69
- /**
70
- * Get all vulnerability codes
71
- */
72
- function getAllVulnerabilityCodes() {
73
- return Object.values(error_codes_js_1.VulnerabilityCode);
74
- }
75
- /**
76
- * Get total count of registered vulnerabilities
77
- */
78
- function getVulnerabilityCount() {
79
- return Object.keys(exports.VULNERABILITY_REGISTRY).length;
80
- }
81
- /**
82
- * Create a finding with vulnerability definition
83
- */
84
- function createFinding(code, overrides) {
85
- const lookup = getVulnerabilityDefinition(code);
86
- if (!lookup.found || !lookup.definition) {
87
- return null;
88
- }
89
- return {
90
- ...lookup.definition,
91
- ...overrides,
92
- };
93
- }
94
- // Re-export all types and enums
95
- var error_codes_js_2 = require("./error-codes.js");
96
- Object.defineProperty(exports, "VulnerabilityCode", { enumerable: true, get: function () { return error_codes_js_2.VulnerabilityCode; } });
97
- exports.default = {
98
- VulnerabilityCode: error_codes_js_1.VulnerabilityCode,
99
- VULNERABILITY_REGISTRY: exports.VULNERABILITY_REGISTRY,
100
- getVulnerabilityDefinition,
101
- getVulnerabilitiesByScanner,
102
- getVulnerabilitiesByCategory,
103
- getVulnerabilitiesBySeverity,
104
- getAllVulnerabilityCodes,
105
- getVulnerabilityCount,
106
- createFinding,
107
- };
package/src/index.js.map DELETED
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAEH,OAAO,EAAE,iBAAiB,EAAE,MAAM,kBAAkB,CAAC;AAGrD,kCAAkC;AAClC,OAAO,EAAE,yBAAyB,EAAE,MAAM,2BAA2B,CAAC;AACtE,OAAO,EAAE,mBAAmB,EAAE,MAAM,qBAAqB,CAAC;AAC1D,OAAO,EAAE,oBAAoB,EAAE,MAAM,sBAAsB,CAAC;AAC5D,OAAO,EAAE,oBAAoB,EAAE,MAAM,gCAAgC,CAAC;AACtE,OAAO,EAAE,sBAAsB,EAAE,MAAM,+BAA+B,CAAC;AACvE,OAAO,EAAE,8BAA8B,EAAE,MAAM,iCAAiC,CAAC;AAEjF;;GAEG;AACH,MAAM,CAAC,MAAM,sBAAsB,GAA4C;IAC3E,GAAG,yBAAyB;IAC5B,GAAG,mBAAmB;IACtB,GAAG,oBAAoB;IACvB,GAAG,oBAAoB;IACvB,GAAG,sBAAsB;IACzB,GAAG,8BAA8B;CACpC,CAAC;AAEF;;GAEG;AACH,MAAM,UAAU,0BAA0B,CAAC,IAAgC;IACvE,MAAM,UAAU,GAAG,sBAAsB,CAAC,IAAI,CAAC,CAAC;IAChD,IAAI,UAAU,EAAE,CAAC;QACb,OAAO,EAAE,KAAK,EAAE,IAAI,EAAE,UAAU,EAAE,CAAC;IACvC,CAAC;IACD,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,CAAC;AAC5B,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,2BAA2B,CAAC,OAAe;IACvD,OAAO,MAAM,CAAC,MAAM,CAAC,sBAAsB,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,OAAO,KAAK,OAAO,CAAC,CAAC;AACpF,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,4BAA4B,CAAC,QAA+B;IACxE,OAAO,MAAM,CAAC,MAAM,CAAC,sBAAsB,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,KAAK,QAAQ,CAAC,CAAC;AACtF,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,4BAA4B,CAAC,QAAkB;IAC3D,OAAO,MAAM,CAAC,MAAM,CAAC,sBAAsB,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,KAAK,QAAQ,CAAC,CAAC;AACtF,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,wBAAwB;IACpC,OAAO,MAAM,CAAC,MAAM,CAAC,iBAAiB,CAAC,CAAC;AAC5C,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,qBAAqB;IACjC,OAAO,MAAM,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,MAAM,CAAC;AACtD,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,aAAa,CACzB,IAAgC,EAChC,SAA4C;IAE5C,MAAM,MAAM,GAAG,0BAA0B,CAAC,IAAI,CAAC,CAAC;IAChD,IAAI,CAAC,MAAM,CAAC,KAAK,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,CAAC;QACtC,OAAO,IAAI,CAAC;IAChB,CAAC;IAED,OAAO;QACH,GAAG,MAAM,CAAC,UAAU;QACpB,GAAG,SAAS;KACf,CAAC;AACN,CAAC;AAED,gCAAgC;AAChC,OAAO,EAAE,iBAAiB,EAAE,MAAM,kBAAkB,CAAC;AAWrD,gDAAgD;AAChD,OAAO,EACH,yBAAyB,EACzB,mBAAmB,EACnB,oBAAoB,EACpB,oBAAoB,EACpB,sBAAsB,EACtB,8BAA8B,GACjC,CAAC;AAEF,eAAe;IACX,iBAAiB;IACjB,sBAAsB;IACtB,0BAA0B;IAC1B,2BAA2B;IAC3B,4BAA4B;IAC5B,4BAA4B;IAC5B,wBAAwB;IACxB,qBAAqB;IACrB,aAAa;CAChB,CAAC"}
package/src/types.d.ts DELETED
@@ -1,86 +0,0 @@
1
- /**
2
- * Vulnerability Registry - Core Types
3
- *
4
- * Central type definitions for all vulnerability definitions.
5
- */
6
- /**
7
- * Vulnerability severity levels
8
- */
9
- export type Severity = 'critical' | 'high' | 'medium' | 'low' | 'info';
10
- /**
11
- * CVSS v3.1 severity ratings
12
- */
13
- export type CVSSSeverity = 'CRITICAL' | 'HIGH' | 'MEDIUM' | 'LOW' | 'NONE';
14
- /**
15
- * Vulnerability categories
16
- */
17
- export type VulnerabilityCategory = 'injection' | 'xss' | 'authentication' | 'access_control' | 'configuration' | 'information_disclosure' | 'cryptographic' | 'business_logic' | 'ssrf' | 'file_inclusion';
18
- /**
19
- * CVSS v3.1 Score data
20
- */
21
- export interface CVSSProfile {
22
- /** Base score (0.0 - 10.0) */
23
- score: number;
24
- /** Full CVSS vector string */
25
- vector: string;
26
- /** Severity rating derived from score */
27
- severity: CVSSSeverity;
28
- }
29
- /**
30
- * CWE (Common Weakness Enumeration) reference
31
- */
32
- export interface CWEReference {
33
- /** CWE ID (e.g., "CWE-89") */
34
- id: string;
35
- /** CWE name */
36
- name: string;
37
- /** URL to CWE definition */
38
- url: string;
39
- }
40
- /**
41
- * OWASP reference
42
- */
43
- export interface OWASPReference {
44
- /** OWASP ID (e.g., "A03:2021") */
45
- id: string;
46
- /** OWASP category name */
47
- name: string;
48
- /** URL to OWASP definition */
49
- url: string;
50
- }
51
- /**
52
- * Complete vulnerability definition
53
- */
54
- export interface VulnerabilityDefinition {
55
- /** Unique numeric identifier */
56
- id: number;
57
- /** Unique vulnerability code */
58
- code: string;
59
- /** Human-readable title */
60
- title: string;
61
- /** Detailed description (100+ characters) */
62
- description: string;
63
- /** Severity level */
64
- severity: Severity;
65
- /** Vulnerability category */
66
- category: VulnerabilityCategory;
67
- /** Scanner that detects this vulnerability */
68
- scanner: string;
69
- /** CVSS v3.1 profile */
70
- cvss: CVSSProfile;
71
- /** Associated CWE references */
72
- cwe: CWEReference[];
73
- /** Associated OWASP references */
74
- owasp: OWASPReference[];
75
- /** Remediation guidance */
76
- remediation: string;
77
- /** Additional reference URLs */
78
- references?: string[];
79
- }
80
- /**
81
- * Vulnerability registry lookup result
82
- */
83
- export interface VulnerabilityLookup {
84
- found: boolean;
85
- definition?: VulnerabilityDefinition;
86
- }
@@ -1 +0,0 @@
1
- {"version":3,"file":"types.d.ts","sourceRoot":"","sources":["types.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAEH;;GAEG;AACH,MAAM,MAAM,QAAQ,GAAG,UAAU,GAAG,MAAM,GAAG,QAAQ,GAAG,KAAK,GAAG,MAAM,CAAC;AAEvE;;GAEG;AACH,MAAM,MAAM,YAAY,GAAG,UAAU,GAAG,MAAM,GAAG,QAAQ,GAAG,KAAK,GAAG,MAAM,CAAC;AAE3E;;GAEG;AACH,MAAM,MAAM,qBAAqB,GAC3B,WAAW,GACX,KAAK,GACL,gBAAgB,GAChB,gBAAgB,GAChB,eAAe,GACf,wBAAwB,GACxB,eAAe,GACf,gBAAgB,GAChB,MAAM,GACN,gBAAgB,CAAC;AAEvB;;GAEG;AACH,MAAM,WAAW,WAAW;IACxB,8BAA8B;IAC9B,KAAK,EAAE,MAAM,CAAC;IACd,8BAA8B;IAC9B,MAAM,EAAE,MAAM,CAAC;IACf,yCAAyC;IACzC,QAAQ,EAAE,YAAY,CAAC;CAC1B;AAED;;GAEG;AACH,MAAM,WAAW,YAAY;IACzB,8BAA8B;IAC9B,EAAE,EAAE,MAAM,CAAC;IACX,eAAe;IACf,IAAI,EAAE,MAAM,CAAC;IACb,4BAA4B;IAC5B,GAAG,EAAE,MAAM,CAAC;CACf;AAED;;GAEG;AACH,MAAM,WAAW,cAAc;IAC3B,kCAAkC;IAClC,EAAE,EAAE,MAAM,CAAC;IACX,0BAA0B;IAC1B,IAAI,EAAE,MAAM,CAAC;IACb,8BAA8B;IAC9B,GAAG,EAAE,MAAM,CAAC;CACf;AAED;;GAEG;AACH,MAAM,WAAW,uBAAuB;IACpC,gCAAgC;IAChC,EAAE,EAAE,MAAM,CAAC;IACX,gCAAgC;IAChC,IAAI,EAAE,MAAM,CAAC;IACb,2BAA2B;IAC3B,KAAK,EAAE,MAAM,CAAC;IACd,6CAA6C;IAC7C,WAAW,EAAE,MAAM,CAAC;IACpB,qBAAqB;IACrB,QAAQ,EAAE,QAAQ,CAAC;IACnB,6BAA6B;IAC7B,QAAQ,EAAE,qBAAqB,CAAC;IAChC,8CAA8C;IAC9C,OAAO,EAAE,MAAM,CAAC;IAEhB,wBAAwB;IACxB,IAAI,EAAE,WAAW,CAAC;IAElB,gCAAgC;IAChC,GAAG,EAAE,YAAY,EAAE,CAAC;IAEpB,kCAAkC;IAClC,KAAK,EAAE,cAAc,EAAE,CAAC;IAExB,2BAA2B;IAC3B,WAAW,EAAE,MAAM,CAAC;IAEpB,gCAAgC;IAChC,UAAU,CAAC,EAAE,MAAM,EAAE,CAAC;CACzB;AAED;;GAEG;AACH,MAAM,WAAW,mBAAmB;IAChC,KAAK,EAAE,OAAO,CAAC;IACf,UAAU,CAAC,EAAE,uBAAuB,CAAC;CACxC"}
package/src/types.js DELETED
@@ -1,7 +0,0 @@
1
- "use strict";
2
- /**
3
- * Vulnerability Registry - Core Types
4
- *
5
- * Central type definitions for all vulnerability definitions.
6
- */
7
- Object.defineProperty(exports, "__esModule", { value: true });
package/src/types.js.map DELETED
@@ -1 +0,0 @@
1
- {"version":3,"file":"types.js","sourceRoot":"","sources":["types.ts"],"names":[],"mappings":"AAAA;;;;GAIG"}