@zerothreatai/vulnerability-registry 4.0.0 → 5.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (58) hide show
  1. package/dist/categories/authentication.js +17 -17
  2. package/dist/categories/configuration.js +80 -80
  3. package/dist/categories/injection.js +34 -34
  4. package/dist/categories/sensitive-paths.js +84 -84
  5. package/dist/categories/ssrf.js +11 -11
  6. package/dist/categories/xss.js +15 -15
  7. package/dist-cjs/categories/authentication.js +17 -17
  8. package/dist-cjs/categories/configuration.js +80 -80
  9. package/dist-cjs/categories/injection.js +34 -34
  10. package/dist-cjs/categories/sensitive-paths.js +84 -84
  11. package/dist-cjs/categories/ssrf.js +11 -11
  12. package/dist-cjs/categories/xss.js +15 -15
  13. package/package.json +35 -32
  14. package/scripts/assign-ids.ts +105 -0
  15. package/scripts/check-duplicate-ids.ts +45 -0
  16. package/src/categories/authentication.ts +17 -17
  17. package/src/categories/configuration.ts +80 -80
  18. package/src/categories/injection.ts +34 -34
  19. package/src/categories/sensitive-paths.ts +84 -84
  20. package/src/categories/ssrf.ts +11 -11
  21. package/src/categories/xss.ts +15 -15
  22. package/src/id-registry.json +1235 -0
  23. package/src/categories/authentication.d.ts +0 -8
  24. package/src/categories/authentication.d.ts.map +0 -1
  25. package/src/categories/authentication.js +0 -392
  26. package/src/categories/authentication.js.map +0 -1
  27. package/src/categories/configuration.d.ts +0 -8
  28. package/src/categories/configuration.d.ts.map +0 -1
  29. package/src/categories/configuration.js +0 -1782
  30. package/src/categories/configuration.js.map +0 -1
  31. package/src/categories/injection.d.ts +0 -8
  32. package/src/categories/injection.d.ts.map +0 -1
  33. package/src/categories/injection.js +0 -781
  34. package/src/categories/injection.js.map +0 -1
  35. package/src/categories/sensitive-paths.d.ts +0 -9
  36. package/src/categories/sensitive-paths.d.ts.map +0 -1
  37. package/src/categories/sensitive-paths.js +0 -1872
  38. package/src/categories/sensitive-paths.js.map +0 -1
  39. package/src/categories/ssrf.d.ts +0 -8
  40. package/src/categories/ssrf.d.ts.map +0 -1
  41. package/src/categories/ssrf.js +0 -258
  42. package/src/categories/ssrf.js.map +0 -1
  43. package/src/categories/xss.d.ts +0 -7
  44. package/src/categories/xss.d.ts.map +0 -1
  45. package/src/categories/xss.js +0 -340
  46. package/src/categories/xss.js.map +0 -1
  47. package/src/error-codes.d.ts +0 -280
  48. package/src/error-codes.d.ts.map +0 -1
  49. package/src/error-codes.js +0 -350
  50. package/src/error-codes.js.map +0 -1
  51. package/src/index.d.ts +0 -60
  52. package/src/index.d.ts.map +0 -1
  53. package/src/index.js +0 -92
  54. package/src/index.js.map +0 -1
  55. package/src/types.d.ts +0 -88
  56. package/src/types.d.ts.map +0 -1
  57. package/src/types.js +0 -6
  58. package/src/types.js.map +0 -1
@@ -1,350 +0,0 @@
1
- /**
2
- * Vulnerability Registry - Error Codes
3
- *
4
- * Central enum containing all vulnerability error codes across all scanners.
5
- * Each code maps to a complete VulnerabilityDefinition.
6
- */
7
- export var VulnerabilityCode;
8
- (function (VulnerabilityCode) {
9
- // ========================================
10
- // SQL INJECTION (SQLI_*)
11
- // ========================================
12
- VulnerabilityCode["SQLI_ERROR_BASED"] = "SQLI_ERROR_BASED";
13
- VulnerabilityCode["SQLI_BOOLEAN_BASED"] = "SQLI_BOOLEAN_BASED";
14
- VulnerabilityCode["SQLI_TIME_BASED"] = "SQLI_TIME_BASED";
15
- VulnerabilityCode["SQLI_STACK_BASED"] = "SQLI_STACK_BASED";
16
- VulnerabilityCode["SQLI_UNION_BASED"] = "SQLI_UNION_BASED";
17
- // ========================================
18
- // CROSS-SITE SCRIPTING (XSS_*)
19
- // ========================================
20
- VulnerabilityCode["XSS_REFLECTED"] = "XSS_REFLECTED";
21
- VulnerabilityCode["XSS_STORED"] = "XSS_STORED";
22
- VulnerabilityCode["XSS_DOM_BASED"] = "XSS_DOM_BASED";
23
- VulnerabilityCode["XSS_SVG_INJECTION"] = "XSS_SVG_INJECTION";
24
- VulnerabilityCode["XSS_CSTI_ANGULAR"] = "XSS_CSTI_ANGULAR";
25
- VulnerabilityCode["XSS_CSTI_VUE"] = "XSS_CSTI_VUE";
26
- VulnerabilityCode["XSS_EVENT_HANDLER"] = "XSS_EVENT_HANDLER";
27
- VulnerabilityCode["XSS_SCRIPT_INJECTION"] = "XSS_SCRIPT_INJECTION";
28
- VulnerabilityCode["XSS_HTML_INJECTION"] = "XSS_HTML_INJECTION";
29
- VulnerabilityCode["XSS_ATTRIBUTE_INJECTION"] = "XSS_ATTRIBUTE_INJECTION";
30
- VulnerabilityCode["XSS_JS_CONTEXT"] = "XSS_JS_CONTEXT";
31
- VulnerabilityCode["XSS_CSS_INJECTION"] = "XSS_CSS_INJECTION";
32
- VulnerabilityCode["XSS_CSP_BYPASS"] = "XSS_CSP_BYPASS";
33
- VulnerabilityCode["XSS_TEMPLATE_LITERAL"] = "XSS_TEMPLATE_LITERAL";
34
- VulnerabilityCode["XSS_MUTATION_BASED"] = "XSS_MUTATION_BASED";
35
- // ========================================
36
- // COMMAND INJECTION (CMDI_*)
37
- // ========================================
38
- VulnerabilityCode["CMDI_OOB_CONFIRMED"] = "CMDI_OOB_CONFIRMED";
39
- VulnerabilityCode["CMDI_REFLECTED"] = "CMDI_REFLECTED";
40
- VulnerabilityCode["CMDI_TIME_BASED"] = "CMDI_TIME_BASED";
41
- VulnerabilityCode["CMDI_ERROR_BASED"] = "CMDI_ERROR_BASED";
42
- // ========================================
43
- // SERVER-SIDE REQUEST FORGERY (SSRF_*)
44
- // ========================================
45
- VulnerabilityCode["SSRF_CLOUD_METADATA"] = "SSRF_CLOUD_METADATA";
46
- VulnerabilityCode["SSRF_INTERNAL_SERVICE"] = "SSRF_INTERNAL_SERVICE";
47
- VulnerabilityCode["SSRF_PROTOCOL_SMUGGLING"] = "SSRF_PROTOCOL_SMUGGLING";
48
- VulnerabilityCode["SSRF_BLIND_OOB"] = "SSRF_BLIND_OOB";
49
- VulnerabilityCode["SSRF_FILTER_BYPASS"] = "SSRF_FILTER_BYPASS";
50
- // ========================================
51
- // SERVER-SIDE TEMPLATE INJECTION (SSTI_*)
52
- // ========================================
53
- VulnerabilityCode["SSTI_JINJA2"] = "SSTI_JINJA2";
54
- VulnerabilityCode["SSTI_TWIG"] = "SSTI_TWIG";
55
- VulnerabilityCode["SSTI_FREEMARKER"] = "SSTI_FREEMARKER";
56
- VulnerabilityCode["SSTI_VELOCITY"] = "SSTI_VELOCITY";
57
- VulnerabilityCode["SSTI_THYMELEAF"] = "SSTI_THYMELEAF";
58
- VulnerabilityCode["SSTI_ERB"] = "SSTI_ERB";
59
- VulnerabilityCode["SSTI_EJS"] = "SSTI_EJS";
60
- VulnerabilityCode["SSTI_PUG"] = "SSTI_PUG";
61
- VulnerabilityCode["SSTI_SMARTY"] = "SSTI_SMARTY";
62
- VulnerabilityCode["SSTI_MAKO"] = "SSTI_MAKO";
63
- VulnerabilityCode["SSTI_GENERIC"] = "SSTI_GENERIC";
64
- // ========================================
65
- // XML EXTERNAL ENTITY (XXE_*)
66
- // ========================================
67
- VulnerabilityCode["XXE_CLASSIC"] = "XXE_CLASSIC";
68
- VulnerabilityCode["XXE_BLIND"] = "XXE_BLIND";
69
- VulnerabilityCode["XXE_OOB"] = "XXE_OOB";
70
- VulnerabilityCode["XXE_ERROR_BASED"] = "XXE_ERROR_BASED";
71
- VulnerabilityCode["XXE_PARAMETER_ENTITY"] = "XXE_PARAMETER_ENTITY";
72
- // ========================================
73
- // XPATH INJECTION (XPATH_*)
74
- // ========================================
75
- VulnerabilityCode["XPATH_AUTH_BYPASS"] = "XPATH_AUTH_BYPASS";
76
- VulnerabilityCode["XPATH_DATA_EXTRACTION"] = "XPATH_DATA_EXTRACTION";
77
- VulnerabilityCode["XPATH_BLIND"] = "XPATH_BLIND";
78
- VulnerabilityCode["XPATH_ERROR_BASED"] = "XPATH_ERROR_BASED";
79
- // ========================================
80
- // LOCAL FILE INCLUSION (LFI_*)
81
- // ========================================
82
- VulnerabilityCode["LFI_PATH_TRAVERSAL"] = "LFI_PATH_TRAVERSAL";
83
- VulnerabilityCode["LFI_FILTER_BYPASS"] = "LFI_FILTER_BYPASS";
84
- VulnerabilityCode["LFI_SOURCE_DISCLOSURE"] = "LFI_SOURCE_DISCLOSURE";
85
- VulnerabilityCode["LFI_WRAPPER_PROTOCOL"] = "LFI_WRAPPER_PROTOCOL";
86
- VulnerabilityCode["LFI_PROC_DISCLOSURE"] = "LFI_PROC_DISCLOSURE";
87
- // ========================================
88
- // JWT VULNERABILITIES (JWT_*)
89
- // ========================================
90
- VulnerabilityCode["JWT_NONE_ALGORITHM"] = "JWT_NONE_ALGORITHM";
91
- VulnerabilityCode["JWT_WEAK_SECRET"] = "JWT_WEAK_SECRET";
92
- VulnerabilityCode["JWT_KEY_CONFUSION"] = "JWT_KEY_CONFUSION";
93
- VulnerabilityCode["JWT_EXPIRED_TOKEN"] = "JWT_EXPIRED_TOKEN";
94
- VulnerabilityCode["JWT_MISSING_CLAIMS"] = "JWT_MISSING_CLAIMS";
95
- VulnerabilityCode["JWT_CLAIM_TAMPERING"] = "JWT_CLAIM_TAMPERING";
96
- VulnerabilityCode["JWT_KID_INJECTION"] = "JWT_KID_INJECTION";
97
- VulnerabilityCode["JWT_JKU_INJECTION"] = "JWT_JKU_INJECTION";
98
- VulnerabilityCode["JWT_EMBEDDED_JWK"] = "JWT_EMBEDDED_JWK";
99
- VulnerabilityCode["JWT_X5C_INJECTION"] = "JWT_X5C_INJECTION";
100
- // ========================================
101
- // OPEN REDIRECT (REDIRECT_*)
102
- // ========================================
103
- VulnerabilityCode["REDIRECT_HEADER_INJECTION"] = "REDIRECT_HEADER_INJECTION";
104
- VulnerabilityCode["REDIRECT_META_REFRESH"] = "REDIRECT_META_REFRESH";
105
- VulnerabilityCode["REDIRECT_JS_NAVIGATION"] = "REDIRECT_JS_NAVIGATION";
106
- // ========================================
107
- // BROKEN ACCESS CONTROL (BAC_*)
108
- // ========================================
109
- VulnerabilityCode["BAC_ANONYMOUS_ACCESS"] = "BAC_ANONYMOUS_ACCESS";
110
- VulnerabilityCode["BAC_HORIZONTAL_PRIVILEGE"] = "BAC_HORIZONTAL_PRIVILEGE";
111
- VulnerabilityCode["BAC_VERTICAL_PRIVILEGE"] = "BAC_VERTICAL_PRIVILEGE";
112
- VulnerabilityCode["BAC_IDOR"] = "BAC_IDOR";
113
- // ========================================
114
- // SECURITY HEADERS (HEADER_*)
115
- // ========================================
116
- VulnerabilityCode["HEADER_MISSING_CSP"] = "HEADER_MISSING_CSP";
117
- VulnerabilityCode["HEADER_MISSING_HSTS"] = "HEADER_MISSING_HSTS";
118
- VulnerabilityCode["HEADER_MISSING_XFRAME"] = "HEADER_MISSING_XFRAME";
119
- VulnerabilityCode["HEADER_MISSING_XCONTENT_TYPE"] = "HEADER_MISSING_XCONTENT_TYPE";
120
- VulnerabilityCode["HEADER_MISSING_XSS_PROTECTION"] = "HEADER_MISSING_XSS_PROTECTION";
121
- VulnerabilityCode["HEADER_MISSING_REFERRER_POLICY"] = "HEADER_MISSING_REFERRER_POLICY";
122
- VulnerabilityCode["HEADER_MISSING_PERMISSIONS_POLICY"] = "HEADER_MISSING_PERMISSIONS_POLICY";
123
- VulnerabilityCode["HEADER_WEAK_CSP"] = "HEADER_WEAK_CSP";
124
- VulnerabilityCode["HEADER_CSP_REPORT_ONLY"] = "HEADER_CSP_REPORT_ONLY";
125
- VulnerabilityCode["HEADER_CSP_WEAK_DIRECTIVES"] = "HEADER_CSP_WEAK_DIRECTIVES";
126
- VulnerabilityCode["HEADER_CSP_DATA_URI_SCRIPT"] = "HEADER_CSP_DATA_URI_SCRIPT";
127
- VulnerabilityCode["HEADER_CSP_BLOB_URI_SCRIPT"] = "HEADER_CSP_BLOB_URI_SCRIPT";
128
- VulnerabilityCode["HEADER_CSP_WILDCARD_DEFAULT"] = "HEADER_CSP_WILDCARD_DEFAULT";
129
- VulnerabilityCode["HEADER_CSP_NO_BASE_URI"] = "HEADER_CSP_NO_BASE_URI";
130
- VulnerabilityCode["HEADER_CSP_NO_OBJECT_SRC"] = "HEADER_CSP_NO_OBJECT_SRC";
131
- VulnerabilityCode["HEADER_CSP_NO_FRAME_ANCESTORS"] = "HEADER_CSP_NO_FRAME_ANCESTORS";
132
- VulnerabilityCode["HEADER_CORS_MISCONFIGURED"] = "HEADER_CORS_MISCONFIGURED";
133
- VulnerabilityCode["HEADER_CORS_STAR_WITH_CREDENTIALS"] = "HEADER_CORS_STAR_WITH_CREDENTIALS";
134
- VulnerabilityCode["HEADER_CORS_ORIGIN_REFLECT_NO_VARY"] = "HEADER_CORS_ORIGIN_REFLECT_NO_VARY";
135
- VulnerabilityCode["HEADER_CORS_NULL_ORIGIN"] = "HEADER_CORS_NULL_ORIGIN";
136
- VulnerabilityCode["HEADER_CORS_WILDCARD_SUBDOMAIN"] = "HEADER_CORS_WILDCARD_SUBDOMAIN";
137
- VulnerabilityCode["HEADER_COEP_WITHOUT_COOP"] = "HEADER_COEP_WITHOUT_COOP";
138
- VulnerabilityCode["HEADER_CORP_UNUSUAL"] = "HEADER_CORP_UNUSUAL";
139
- VulnerabilityCode["HEADER_EXPECT_CT_PRESENT"] = "HEADER_EXPECT_CT_PRESENT";
140
- VulnerabilityCode["HEADER_SERVER_HEADER_PRESENT"] = "HEADER_SERVER_HEADER_PRESENT";
141
- VulnerabilityCode["HEADER_X_POWERED_BY_PRESENT"] = "HEADER_X_POWERED_BY_PRESENT";
142
- VulnerabilityCode["HEADER_X_XSS_PROTECTION_ENABLED"] = "HEADER_X_XSS_PROTECTION_ENABLED";
143
- VulnerabilityCode["HEADER_XCONTENT_TYPE_INVALID"] = "HEADER_XCONTENT_TYPE_INVALID";
144
- VulnerabilityCode["HEADER_REFERRER_POLICY_UNSAFE"] = "HEADER_REFERRER_POLICY_UNSAFE";
145
- VulnerabilityCode["HEADER_HSTS_BAD_MAX_AGE"] = "HEADER_HSTS_BAD_MAX_AGE";
146
- VulnerabilityCode["HEADER_HSTS_SHORT_MAX_AGE"] = "HEADER_HSTS_SHORT_MAX_AGE";
147
- VulnerabilityCode["HEADER_HSTS_NO_INCLUDESUBDOMAINS"] = "HEADER_HSTS_NO_INCLUDESUBDOMAINS";
148
- VulnerabilityCode["HEADER_HSTS_PRELOAD_LOW_MAX_AGE"] = "HEADER_HSTS_PRELOAD_LOW_MAX_AGE";
149
- VulnerabilityCode["COOKIE_SAMESITE_NONE_WITHOUT_SECURE"] = "COOKIE_SAMESITE_NONE_WITHOUT_SECURE";
150
- VulnerabilityCode["COOKIE_SESSION_MISSING_SECURE"] = "COOKIE_SESSION_MISSING_SECURE";
151
- VulnerabilityCode["COOKIE_MISSING_SECURE"] = "COOKIE_MISSING_SECURE";
152
- VulnerabilityCode["COOKIE_SESSION_MISSING_HTTPONLY"] = "COOKIE_SESSION_MISSING_HTTPONLY";
153
- VulnerabilityCode["COOKIE_MISSING_HTTPONLY"] = "COOKIE_MISSING_HTTPONLY";
154
- VulnerabilityCode["COOKIE_MISSING_SAMESITE"] = "COOKIE_MISSING_SAMESITE";
155
- VulnerabilityCode["COOKIE_HOST_PREFIX_INVALID"] = "COOKIE_HOST_PREFIX_INVALID";
156
- VulnerabilityCode["COOKIE_SECURE_PREFIX_INVALID"] = "COOKIE_SECURE_PREFIX_INVALID";
157
- VulnerabilityCode["HEADER_DRIFT_CSP"] = "HEADER_DRIFT_CSP";
158
- VulnerabilityCode["HEADER_DRIFT_HSTS"] = "HEADER_DRIFT_HSTS";
159
- VulnerabilityCode["HEADER_DRIFT_XCONTENT_TYPE"] = "HEADER_DRIFT_XCONTENT_TYPE";
160
- VulnerabilityCode["HEADER_DRIFT_REFERRER_POLICY"] = "HEADER_DRIFT_REFERRER_POLICY";
161
- VulnerabilityCode["HEADER_DRIFT_XFRAME"] = "HEADER_DRIFT_XFRAME";
162
- VulnerabilityCode["HEADER_DRIFT_PERMISSIONS_POLICY"] = "HEADER_DRIFT_PERMISSIONS_POLICY";
163
- VulnerabilityCode["HEADER_DRIFT_COOP"] = "HEADER_DRIFT_COOP";
164
- VulnerabilityCode["HEADER_DRIFT_COEP"] = "HEADER_DRIFT_COEP";
165
- VulnerabilityCode["HEADER_DRIFT_CORP"] = "HEADER_DRIFT_CORP";
166
- // ========================================
167
- // HOST HEADER INJECTION (HOST_*)
168
- // ========================================
169
- VulnerabilityCode["HOST_CACHE_POISONING"] = "HOST_CACHE_POISONING";
170
- VulnerabilityCode["HOST_PASSWORD_RESET"] = "HOST_PASSWORD_RESET";
171
- VulnerabilityCode["HOST_REDIRECT"] = "HOST_REDIRECT";
172
- // ========================================
173
- // DIRECTORY BROWSING (DIRBROWSE_*)
174
- // ========================================
175
- VulnerabilityCode["DIRBROWSE_GENERIC"] = "DIRBROWSE_GENERIC";
176
- VulnerabilityCode["DIRBROWSE_GENERIC_SENSITIVE"] = "DIRBROWSE_GENERIC_SENSITIVE";
177
- VulnerabilityCode["DIRBROWSE_APACHE"] = "DIRBROWSE_APACHE";
178
- VulnerabilityCode["DIRBROWSE_APACHE_SENSITIVE"] = "DIRBROWSE_APACHE_SENSITIVE";
179
- VulnerabilityCode["DIRBROWSE_NGINX"] = "DIRBROWSE_NGINX";
180
- VulnerabilityCode["DIRBROWSE_NGINX_SENSITIVE"] = "DIRBROWSE_NGINX_SENSITIVE";
181
- VulnerabilityCode["DIRBROWSE_IIS"] = "DIRBROWSE_IIS";
182
- VulnerabilityCode["DIRBROWSE_IIS_SENSITIVE"] = "DIRBROWSE_IIS_SENSITIVE";
183
- VulnerabilityCode["DIRBROWSE_TOMCAT"] = "DIRBROWSE_TOMCAT";
184
- VulnerabilityCode["DIRBROWSE_TOMCAT_SENSITIVE"] = "DIRBROWSE_TOMCAT_SENSITIVE";
185
- VulnerabilityCode["DIRBROWSE_CADDY"] = "DIRBROWSE_CADDY";
186
- VulnerabilityCode["DIRBROWSE_CADDY_SENSITIVE"] = "DIRBROWSE_CADDY_SENSITIVE";
187
- VulnerabilityCode["DIRBROWSE_WEBDAV"] = "DIRBROWSE_WEBDAV";
188
- VulnerabilityCode["DIRBROWSE_WEBDAV_SENSITIVE"] = "DIRBROWSE_WEBDAV_SENSITIVE";
189
- VulnerabilityCode["DIRBROWSE_S3"] = "DIRBROWSE_S3";
190
- VulnerabilityCode["DIRBROWSE_S3_SENSITIVE"] = "DIRBROWSE_S3_SENSITIVE";
191
- VulnerabilityCode["DIRBROWSE_GCS"] = "DIRBROWSE_GCS";
192
- VulnerabilityCode["DIRBROWSE_GCS_SENSITIVE"] = "DIRBROWSE_GCS_SENSITIVE";
193
- VulnerabilityCode["DIRBROWSE_AZURE_BLOB"] = "DIRBROWSE_AZURE_BLOB";
194
- VulnerabilityCode["DIRBROWSE_AZURE_BLOB_SENSITIVE"] = "DIRBROWSE_AZURE_BLOB_SENSITIVE";
195
- VulnerabilityCode["DIRBROWSE_ENABLED"] = "DIRBROWSE_ENABLED";
196
- VulnerabilityCode["DIRBROWSE_SENSITIVE"] = "DIRBROWSE_SENSITIVE";
197
- // ========================================
198
- // MASS ASSIGNMENT (MASSASSIGN_*)
199
- // ========================================
200
- VulnerabilityCode["MASSASSIGN_PROTOTYPE_POLLUTION"] = "MASSASSIGN_PROTOTYPE_POLLUTION";
201
- VulnerabilityCode["MASSASSIGN_ROLE_ESCALATION"] = "MASSASSIGN_ROLE_ESCALATION";
202
- VulnerabilityCode["MASSASSIGN_HIDDEN_FIELD"] = "MASSASSIGN_HIDDEN_FIELD";
203
- // ========================================
204
- // DESERIALIZATION (DESER_*)
205
- // ========================================
206
- VulnerabilityCode["DESER_JAVA"] = "DESER_JAVA";
207
- VulnerabilityCode["DESER_PHP"] = "DESER_PHP";
208
- VulnerabilityCode["DESER_PYTHON"] = "DESER_PYTHON";
209
- VulnerabilityCode["DESER_DOTNET"] = "DESER_DOTNET";
210
- VulnerabilityCode["DESER_RUBY"] = "DESER_RUBY";
211
- VulnerabilityCode["DESER_NODE"] = "DESER_NODE";
212
- // ========================================
213
- // SENSITIVE PATH SCOUT - CRITICAL (SENS_CRIT_*)
214
- // ========================================
215
- VulnerabilityCode["SENS_CRIT_AWS_CREDENTIALS"] = "SENS_CRIT_AWS_CREDENTIALS";
216
- VulnerabilityCode["SENS_CRIT_SSH_PRIVATE_KEY"] = "SENS_CRIT_SSH_PRIVATE_KEY";
217
- VulnerabilityCode["SENS_CRIT_SSL_PRIVATE_KEY"] = "SENS_CRIT_SSL_PRIVATE_KEY";
218
- VulnerabilityCode["SENS_CRIT_RAILS_MASTER_KEY"] = "SENS_CRIT_RAILS_MASTER_KEY";
219
- VulnerabilityCode["SENS_CRIT_TERRAFORM_STATE"] = "SENS_CRIT_TERRAFORM_STATE";
220
- VulnerabilityCode["SENS_CRIT_FIREBASE_ADMIN_SDK"] = "SENS_CRIT_FIREBASE_ADMIN_SDK";
221
- VulnerabilityCode["SENS_CRIT_KUBE_CONFIG"] = "SENS_CRIT_KUBE_CONFIG";
222
- VulnerabilityCode["SENS_CRIT_AZURE_STORAGE_KEY"] = "SENS_CRIT_AZURE_STORAGE_KEY";
223
- VulnerabilityCode["SENS_CRIT_CONSUL_KV"] = "SENS_CRIT_CONSUL_KV";
224
- VulnerabilityCode["SENS_CRIT_VAULT_SECRET"] = "SENS_CRIT_VAULT_SECRET";
225
- VulnerabilityCode["SENS_CRIT_DOCKER_SECRET"] = "SENS_CRIT_DOCKER_SECRET";
226
- // ========================================
227
- // SENSITIVE PATH SCOUT - HIGH (SENS_HIGH_*)
228
- // ========================================
229
- VulnerabilityCode["SENS_HIGH_GIT_EXPOSED"] = "SENS_HIGH_GIT_EXPOSED";
230
- VulnerabilityCode["SENS_HIGH_GIT_CONFIG"] = "SENS_HIGH_GIT_CONFIG";
231
- VulnerabilityCode["SENS_HIGH_WORDPRESS_CONFIG"] = "SENS_HIGH_WORDPRESS_CONFIG";
232
- VulnerabilityCode["SENS_HIGH_SPRING_ACTUATOR"] = "SENS_HIGH_SPRING_ACTUATOR";
233
- VulnerabilityCode["SENS_HIGH_SPRING_HEAPDUMP"] = "SENS_HIGH_SPRING_HEAPDUMP";
234
- VulnerabilityCode["SENS_HIGH_DATABASE_BACKUP"] = "SENS_HIGH_DATABASE_BACKUP";
235
- VulnerabilityCode["SENS_HIGH_PHPINFO"] = "SENS_HIGH_PHPINFO";
236
- VulnerabilityCode["SENS_HIGH_LARAVEL_DEBUG"] = "SENS_HIGH_LARAVEL_DEBUG";
237
- VulnerabilityCode["SENS_HIGH_GCP_SERVICE_ACCOUNT"] = "SENS_HIGH_GCP_SERVICE_ACCOUNT";
238
- VulnerabilityCode["SENS_HIGH_GRAPHQL_INTROSPECTION"] = "SENS_HIGH_GRAPHQL_INTROSPECTION";
239
- VulnerabilityCode["SENS_HIGH_PHPMYADMIN"] = "SENS_HIGH_PHPMYADMIN";
240
- VulnerabilityCode["SENS_HIGH_MONGODB_CONFIG"] = "SENS_HIGH_MONGODB_CONFIG";
241
- VulnerabilityCode["SENS_HIGH_JAVA_KEYSTORE"] = "SENS_HIGH_JAVA_KEYSTORE";
242
- VulnerabilityCode["SENS_HIGH_PHP_SESSION"] = "SENS_HIGH_PHP_SESSION";
243
- VulnerabilityCode["SENS_HIGH_ENV_FILE"] = "SENS_HIGH_ENV_FILE";
244
- VulnerabilityCode["SENS_HIGH_BACKUP_FILE"] = "SENS_HIGH_BACKUP_FILE";
245
- VulnerabilityCode["SENS_HIGH_HTPASSWD"] = "SENS_HIGH_HTPASSWD";
246
- VulnerabilityCode["SENS_HIGH_DS_STORE"] = "SENS_HIGH_DS_STORE";
247
- // ========================================
248
- // SENSITIVE PATH SCOUT - MEDIUM (SENS_MED_*)
249
- // ========================================
250
- VulnerabilityCode["SENS_MED_SWAGGER_DOCS"] = "SENS_MED_SWAGGER_DOCS";
251
- VulnerabilityCode["SENS_MED_APACHE_STATUS"] = "SENS_MED_APACHE_STATUS";
252
- VulnerabilityCode["SENS_MED_PROMETHEUS_METRICS"] = "SENS_MED_PROMETHEUS_METRICS";
253
- VulnerabilityCode["SENS_MED_DOCKERFILE"] = "SENS_MED_DOCKERFILE";
254
- VulnerabilityCode["SENS_MED_FIREBASE_CONFIG"] = "SENS_MED_FIREBASE_CONFIG";
255
- VulnerabilityCode["SENS_MED_SOURCE_MAP"] = "SENS_MED_SOURCE_MAP";
256
- VulnerabilityCode["SENS_MED_ELASTICSEARCH"] = "SENS_MED_ELASTICSEARCH";
257
- VulnerabilityCode["SENS_MED_ADMIN_PANEL"] = "SENS_MED_ADMIN_PANEL";
258
- VulnerabilityCode["SENS_MED_COMPOSER_LOCK"] = "SENS_MED_COMPOSER_LOCK";
259
- VulnerabilityCode["SENS_MED_PACKAGE_LOCK"] = "SENS_MED_PACKAGE_LOCK";
260
- VulnerabilityCode["SENS_MED_GEMFILE_LOCK"] = "SENS_MED_GEMFILE_LOCK";
261
- VulnerabilityCode["SENS_MED_ROBOTS_TXT"] = "SENS_MED_ROBOTS_TXT";
262
- VulnerabilityCode["SENS_MED_SITEMAP"] = "SENS_MED_SITEMAP";
263
- VulnerabilityCode["SENS_MED_CROSSDOMAIN_XML"] = "SENS_MED_CROSSDOMAIN_XML";
264
- // ========================================
265
- // SENSITIVE PATH SCOUT - LOW (SENS_LOW_*)
266
- // ========================================
267
- VulnerabilityCode["SENS_LOW_TRAVIS_CI"] = "SENS_LOW_TRAVIS_CI";
268
- VulnerabilityCode["SENS_LOW_JENKINSFILE"] = "SENS_LOW_JENKINSFILE";
269
- VulnerabilityCode["SENS_LOW_CIRCLECI"] = "SENS_LOW_CIRCLECI";
270
- VulnerabilityCode["SENS_LOW_GITLAB_CI"] = "SENS_LOW_GITLAB_CI";
271
- VulnerabilityCode["SENS_LOW_README"] = "SENS_LOW_README";
272
- VulnerabilityCode["SENS_LOW_CHANGELOG"] = "SENS_LOW_CHANGELOG";
273
- VulnerabilityCode["SENS_LOW_LICENSE"] = "SENS_LOW_LICENSE";
274
- // ========================================
275
- // SENSITIVE PATH SCOUT - EXTENDED
276
- // ========================================
277
- // HIGH
278
- VulnerabilityCode["SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED"] = "SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED";
279
- VulnerabilityCode["SENS_HIGH_APPSETTINGS_JSON_EXPOSED"] = "SENS_HIGH_APPSETTINGS_JSON_EXPOSED";
280
- VulnerabilityCode["SENS_HIGH_SPRING_CONFIG_EXPOSED"] = "SENS_HIGH_SPRING_CONFIG_EXPOSED";
281
- VulnerabilityCode["SENS_HIGH_NPMRC_EXPOSED"] = "SENS_HIGH_NPMRC_EXPOSED";
282
- VulnerabilityCode["SENS_HIGH_RAILS_DATABASE_YML_EXPOSED"] = "SENS_HIGH_RAILS_DATABASE_YML_EXPOSED";
283
- VulnerabilityCode["SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED"] = "SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED";
284
- VulnerabilityCode["SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED"] = "SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED";
285
- VulnerabilityCode["SENS_HIGH_JOLOKIA_EXPOSED"] = "SENS_HIGH_JOLOKIA_EXPOSED";
286
- VulnerabilityCode["SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED"] = "SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED";
287
- VulnerabilityCode["SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED"] = "SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED";
288
- VulnerabilityCode["SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED"] = "SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED";
289
- VulnerabilityCode["SENS_HIGH_REDIS_RDB_DUMP_DETECTED"] = "SENS_HIGH_REDIS_RDB_DUMP_DETECTED";
290
- VulnerabilityCode["SENS_HIGH_TRACE_AXD"] = "SENS_HIGH_TRACE_AXD";
291
- VulnerabilityCode["SENS_HIGH_ELMAH_AXD_EXPOSED"] = "SENS_HIGH_ELMAH_AXD_EXPOSED";
292
- VulnerabilityCode["SENS_HIGH_SQLITE_DATABASE_DETECTED"] = "SENS_HIGH_SQLITE_DATABASE_DETECTED";
293
- VulnerabilityCode["SENS_HIGH_AWS_CONFIG_EXPOSED"] = "SENS_HIGH_AWS_CONFIG_EXPOSED";
294
- VulnerabilityCode["SENS_HIGH_AZURE_CREDENTIALS_EXPOSED"] = "SENS_HIGH_AZURE_CREDENTIALS_EXPOSED";
295
- VulnerabilityCode["SENS_HIGH_HELM_VALUES_EXPOSED"] = "SENS_HIGH_HELM_VALUES_EXPOSED";
296
- VulnerabilityCode["SENS_HIGH_TERRAFORM_VARS_EXPOSED"] = "SENS_HIGH_TERRAFORM_VARS_EXPOSED";
297
- VulnerabilityCode["SENS_HIGH_LARAVEL_LOG_EXPOSED"] = "SENS_HIGH_LARAVEL_LOG_EXPOSED";
298
- VulnerabilityCode["SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED"] = "SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED";
299
- VulnerabilityCode["SENS_HIGH_ADMINER_EXPOSED"] = "SENS_HIGH_ADMINER_EXPOSED";
300
- VulnerabilityCode["SENS_HIGH_DEBUG_ENDPOINT_EXPOSED"] = "SENS_HIGH_DEBUG_ENDPOINT_EXPOSED";
301
- VulnerabilityCode["SENS_HIGH_GO_DEBUG_VARS_EXPOSED"] = "SENS_HIGH_GO_DEBUG_VARS_EXPOSED";
302
- VulnerabilityCode["SENS_HIGH_GO_PPROF_EXPOSED"] = "SENS_HIGH_GO_PPROF_EXPOSED";
303
- VulnerabilityCode["SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED"] = "SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED";
304
- VulnerabilityCode["SENS_HIGH_MONGO_RC_EXPOSED"] = "SENS_HIGH_MONGO_RC_EXPOSED";
305
- // MEDIUM
306
- VulnerabilityCode["SENS_MED_UN_PROTECTED_CONFIG_JSON"] = "SENS_MED_UN_PROTECTED_CONFIG_JSON";
307
- VulnerabilityCode["SENS_MED_MERCURIAL_REPOSITORY_FOUND"] = "SENS_MED_MERCURIAL_REPOSITORY_FOUND";
308
- VulnerabilityCode["SENS_MED_MERCURIAL_HGRC_EXPOSED"] = "SENS_MED_MERCURIAL_HGRC_EXPOSED";
309
- VulnerabilityCode["SENS_MED_CVS_ROOT_EXPOSED"] = "SENS_MED_CVS_ROOT_EXPOSED";
310
- VulnerabilityCode["SENS_MED_CVS_ENTRIES_EXPOSED"] = "SENS_MED_CVS_ENTRIES_EXPOSED";
311
- VulnerabilityCode["SENS_MED_BAZAAR_REPO_EXPOSED"] = "SENS_MED_BAZAAR_REPO_EXPOSED";
312
- VulnerabilityCode["SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED"] = "SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED";
313
- VulnerabilityCode["SENS_MED_LARAVEL_LOG_VIEWER_ENABLED"] = "SENS_MED_LARAVEL_LOG_VIEWER_ENABLED";
314
- VulnerabilityCode["SENS_MED_APACHE_HTACCESS_FILE_DETECTED"] = "SENS_MED_APACHE_HTACCESS_FILE_DETECTED";
315
- VulnerabilityCode["SENS_MED_APACHE_SERVER_INFO_EXPOSED"] = "SENS_MED_APACHE_SERVER_INFO_EXPOSED";
316
- VulnerabilityCode["SENS_MED_PACKAGE_DEPENDENCIES_DETECTED"] = "SENS_MED_PACKAGE_DEPENDENCIES_DETECTED";
317
- VulnerabilityCode["SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED"] = "SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED";
318
- VulnerabilityCode["SENS_MED_SSH_PUBLIC_KEY_EXPOSED"] = "SENS_MED_SSH_PUBLIC_KEY_EXPOSED";
319
- VulnerabilityCode["SENS_MED_SSL_CERTIFICATE_EXPOSED"] = "SENS_MED_SSL_CERTIFICATE_EXPOSED";
320
- VulnerabilityCode["SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED"] = "SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED";
321
- VulnerabilityCode["SENS_MED_GRAPHI_QL_EXPOSED"] = "SENS_MED_GRAPHI_QL_EXPOSED";
322
- VulnerabilityCode["SENS_MED_TERRAFORM_LOCK_EXPOSED"] = "SENS_MED_TERRAFORM_LOCK_EXPOSED";
323
- VulnerabilityCode["SENS_MED_ERROR_LOG_EXPOSED"] = "SENS_MED_ERROR_LOG_EXPOSED";
324
- VulnerabilityCode["SENS_MED_ACCESS_LOG_EXPOSED"] = "SENS_MED_ACCESS_LOG_EXPOSED";
325
- VulnerabilityCode["SENS_MED_DEBUG_LOG_EXPOSED"] = "SENS_MED_DEBUG_LOG_EXPOSED";
326
- VulnerabilityCode["SENS_MED_APPLICATION_LOG_EXPOSED"] = "SENS_MED_APPLICATION_LOG_EXPOSED";
327
- VulnerabilityCode["SENS_MED_WSDL_EXPOSED"] = "SENS_MED_WSDL_EXPOSED";
328
- VulnerabilityCode["SENS_MED_WORD_PRESS_XML_RPC_EXPOSED"] = "SENS_MED_WORD_PRESS_XML_RPC_EXPOSED";
329
- // LOW
330
- VulnerabilityCode["SENS_LOW_TOML_PROJECT_FILE_EXPOSED"] = "SENS_LOW_TOML_PROJECT_FILE_EXPOSED";
331
- VulnerabilityCode["SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED"] = "SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED";
332
- VulnerabilityCode["SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED"] = "SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED";
333
- VulnerabilityCode["SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED"] = "SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED";
334
- VulnerabilityCode["SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED"] = "SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED";
335
- VulnerabilityCode["SENS_LOW_PYTHON_REQUIREMENTS_DETECTED"] = "SENS_LOW_PYTHON_REQUIREMENTS_DETECTED";
336
- VulnerabilityCode["SENS_LOW_TEST_ENDPOINT_EXPOSED"] = "SENS_LOW_TEST_ENDPOINT_EXPOSED";
337
- VulnerabilityCode["SENS_LOW_STAGING_ENDPOINT_EXPOSED"] = "SENS_LOW_STAGING_ENDPOINT_EXPOSED";
338
- VulnerabilityCode["SENS_LOW_EDITOR_BACKUP_FILE_DETECTED"] = "SENS_LOW_EDITOR_BACKUP_FILE_DETECTED";
339
- VulnerabilityCode["SENS_LOW_VIM_SWAP_FILE_DETECTED"] = "SENS_LOW_VIM_SWAP_FILE_DETECTED";
340
- VulnerabilityCode["SENS_LOW_DIRECTORY_LISTING_ENABLED"] = "SENS_LOW_DIRECTORY_LISTING_ENABLED";
341
- VulnerabilityCode["SENS_LOW_AWSSAM_TEMPLATE_EXPOSED"] = "SENS_LOW_AWSSAM_TEMPLATE_EXPOSED";
342
- VulnerabilityCode["SENS_LOW_SERVERLESS_CONFIG_EXPOSED"] = "SENS_LOW_SERVERLESS_CONFIG_EXPOSED";
343
- VulnerabilityCode["SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED"] = "SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED";
344
- // ========================================
345
- // CLICKJACKING (CLICK_*)
346
- // ========================================
347
- VulnerabilityCode["CLICK_FRAMEABLE"] = "CLICK_FRAMEABLE";
348
- VulnerabilityCode["CLICK_PARTIAL_PROTECTION"] = "CLICK_PARTIAL_PROTECTION";
349
- })(VulnerabilityCode || (VulnerabilityCode = {}));
350
- export default VulnerabilityCode;
@@ -1 +0,0 @@
1
- {"version":3,"file":"error-codes.js","sourceRoot":"","sources":["error-codes.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AAEH,MAAM,CAAN,IAAY,iBAoUX;AApUD,WAAY,iBAAiB;IACzB,2CAA2C;IAC3C,yBAAyB;IACzB,2CAA2C;IAC3C,0DAAqC,CAAA;IACrC,8DAAyC,CAAA;IACzC,wDAAmC,CAAA;IACnC,0DAAqC,CAAA;IACrC,0DAAqC,CAAA;IAErC,2CAA2C;IAC3C,+BAA+B;IAC/B,2CAA2C;IAC3C,oDAA+B,CAAA;IAC/B,8CAAyB,CAAA;IACzB,oDAA+B,CAAA;IAC/B,4DAAuC,CAAA;IACvC,0DAAqC,CAAA;IACrC,kDAA6B,CAAA;IAC7B,4DAAuC,CAAA;IACvC,kEAA6C,CAAA;IAC7C,8DAAyC,CAAA;IACzC,wEAAmD,CAAA;IACnD,sDAAiC,CAAA;IACjC,4DAAuC,CAAA;IACvC,sDAAiC,CAAA;IACjC,kEAA6C,CAAA;IAC7C,8DAAyC,CAAA;IAEzC,2CAA2C;IAC3C,6BAA6B;IAC7B,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,sDAAiC,CAAA;IACjC,wDAAmC,CAAA;IACnC,0DAAqC,CAAA;IAErC,2CAA2C;IAC3C,uCAAuC;IACvC,2CAA2C;IAC3C,gEAA2C,CAAA;IAC3C,oEAA+C,CAAA;IAC/C,wEAAmD,CAAA;IACnD,sDAAiC,CAAA;IACjC,8DAAyC,CAAA;IAEzC,2CAA2C;IAC3C,0CAA0C;IAC1C,2CAA2C;IAC3C,gDAA2B,CAAA;IAC3B,4CAAuB,CAAA;IACvB,wDAAmC,CAAA;IACnC,oDAA+B,CAAA;IAC/B,sDAAiC,CAAA;IACjC,0CAAqB,CAAA;IACrB,0CAAqB,CAAA;IACrB,0CAAqB,CAAA;IACrB,gDAA2B,CAAA;IAC3B,4CAAuB,CAAA;IACvB,kDAA6B,CAAA;IAE7B,2CAA2C;IAC3C,8BAA8B;IAC9B,2CAA2C;IAC3C,gDAA2B,CAAA;IAC3B,4CAAuB,CAAA;IACvB,wCAAmB,CAAA;IACnB,wDAAmC,CAAA;IACnC,kEAA6C,CAAA;IAE7C,2CAA2C;IAC3C,4BAA4B;IAC5B,2CAA2C;IAC3C,4DAAuC,CAAA;IACvC,oEAA+C,CAAA;IAC/C,gDAA2B,CAAA;IAC3B,4DAAuC,CAAA;IAEvC,2CAA2C;IAC3C,+BAA+B;IAC/B,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,4DAAuC,CAAA;IACvC,oEAA+C,CAAA;IAC/C,kEAA6C,CAAA;IAC7C,gEAA2C,CAAA;IAE3C,2CAA2C;IAC3C,8BAA8B;IAC9B,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,wDAAmC,CAAA;IACnC,4DAAuC,CAAA;IACvC,4DAAuC,CAAA;IACvC,8DAAyC,CAAA;IACzC,gEAA2C,CAAA;IAC3C,4DAAuC,CAAA;IACvC,4DAAuC,CAAA;IACvC,0DAAqC,CAAA;IACrC,4DAAuC,CAAA;IAEvC,2CAA2C;IAC3C,6BAA6B;IAC7B,2CAA2C;IAC3C,4EAAuD,CAAA;IACvD,oEAA+C,CAAA;IAC/C,sEAAiD,CAAA;IAEjD,2CAA2C;IAC3C,gCAAgC;IAChC,2CAA2C;IAC3C,kEAA6C,CAAA;IAC7C,0EAAqD,CAAA;IACrD,sEAAiD,CAAA;IACjD,0CAAqB,CAAA;IAErB,2CAA2C;IAC3C,8BAA8B;IAC9B,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,gEAA2C,CAAA;IAC3C,oEAA+C,CAAA;IAC/C,kFAA6D,CAAA;IAC7D,oFAA+D,CAAA;IAC/D,sFAAiE,CAAA;IACjE,4FAAuE,CAAA;IACvE,wDAAmC,CAAA;IACnC,4EAAuD,CAAA;IACvD,0EAAqD,CAAA;IACrD,gEAA2C,CAAA;IAC3C,0EAAqD,CAAA;IACrD,kFAA6D,CAAA;IAC7D,gFAA2D,CAAA;IAC3D,wFAAmE,CAAA;IACnE,gGAA2E,CAAA;IAC3E,oFAA+D,CAAA;IAC/D,oEAA+C,CAAA;IAC/C,wFAAmE,CAAA;IACnE,wEAAmD,CAAA;IACnD,wEAAmD,CAAA;IACnD,8EAAyD,CAAA;IACzD,kFAA6D,CAAA;IAC7D,0DAAqC,CAAA;IACrC,4DAAuC,CAAA;IACvC,8EAAyD,CAAA;IACzD,kFAA6D,CAAA;IAC7D,gEAA2C,CAAA;IAC3C,wFAAmE,CAAA;IACnE,4DAAuC,CAAA;IACvC,4DAAuC,CAAA;IACvC,4DAAuC,CAAA;IAEvC,2CAA2C;IAC3C,iCAAiC;IACjC,2CAA2C;IAC3C,kEAA6C,CAAA;IAC7C,gEAA2C,CAAA;IAC3C,oDAA+B,CAAA;IAE/B,2CAA2C;IAC3C,mCAAmC;IACnC,2CAA2C;IAC3C,4DAAuC,CAAA;IACvC,gEAA2C,CAAA;IAE3C,2CAA2C;IAC3C,iCAAiC;IACjC,2CAA2C;IAC3C,sFAAiE,CAAA;IACjE,8EAAyD,CAAA;IACzD,wEAAmD,CAAA;IAEnD,2CAA2C;IAC3C,4BAA4B;IAC5B,2CAA2C;IAC3C,8CAAyB,CAAA;IACzB,4CAAuB,CAAA;IACvB,kDAA6B,CAAA;IAC7B,kDAA6B,CAAA;IAC7B,8CAAyB,CAAA;IACzB,8CAAyB,CAAA;IAEzB,2CAA2C;IAC3C,gDAAgD;IAChD,2CAA2C;IAC3C,4EAAuD,CAAA;IACvD,4EAAuD,CAAA;IACvD,4EAAuD,CAAA;IACvD,8EAAyD,CAAA;IACzD,4EAAuD,CAAA;IACvD,kFAA6D,CAAA;IAC7D,oEAA+C,CAAA;IAC/C,gFAA2D,CAAA;IAC3D,gEAA2C,CAAA;IAC3C,sEAAiD,CAAA;IACjD,wEAAmD,CAAA;IAEnD,2CAA2C;IAC3C,4CAA4C;IAC5C,2CAA2C;IAC3C,oEAA+C,CAAA;IAC/C,kEAA6C,CAAA;IAC7C,8EAAyD,CAAA;IACzD,4EAAuD,CAAA;IACvD,4EAAuD,CAAA;IACvD,4EAAuD,CAAA;IACvD,4DAAuC,CAAA;IACvC,wEAAmD,CAAA;IACnD,oFAA+D,CAAA;IAC/D,wFAAmE,CAAA;IACnE,kEAA6C,CAAA;IAC7C,0EAAqD,CAAA;IACrD,wEAAmD,CAAA;IACnD,oEAA+C,CAAA;IAC/C,8DAAyC,CAAA;IACzC,oEAA+C,CAAA;IAC/C,8DAAyC,CAAA;IACzC,8DAAyC,CAAA;IAEzC,2CAA2C;IAC3C,6CAA6C;IAC7C,2CAA2C;IAC3C,oEAA+C,CAAA;IAC/C,sEAAiD,CAAA;IACjD,gFAA2D,CAAA;IAC3D,gEAA2C,CAAA;IAC3C,0EAAqD,CAAA;IACrD,gEAA2C,CAAA;IAC3C,sEAAiD,CAAA;IACjD,kEAA6C,CAAA;IAC7C,sEAAiD,CAAA;IACjD,oEAA+C,CAAA;IAC/C,oEAA+C,CAAA;IAC/C,gEAA2C,CAAA;IAC3C,0DAAqC,CAAA;IACrC,0EAAqD,CAAA;IAErD,2CAA2C;IAC3C,0CAA0C;IAC1C,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,kEAA6C,CAAA;IAC7C,4DAAuC,CAAA;IACvC,8DAAyC,CAAA;IACzC,wDAAmC,CAAA;IACnC,8DAAyC,CAAA;IACzC,0DAAqC,CAAA;IAErC,2CAA2C;IAC3C,kCAAkC;IAClC,2CAA2C;IAC3C,OAAO;IACP,0HAAqG,CAAA;IACrG,8FAAyE,CAAA;IACzE,wFAAmE,CAAA;IACnE,wEAAmD,CAAA;IACnD,kGAA6E,CAAA;IAC7E,oGAA+E,CAAA;IAC/E,4FAAuE,CAAA;IACvE,4EAAuD,CAAA;IACvD,gHAA2F,CAAA;IAC3F,0GAAqF,CAAA;IACrF,4GAAuF,CAAA;IACvF,4FAAuE,CAAA;IACvE,gEAA2C,CAAA;IAC3C,gFAA2D,CAAA;IAC3D,8FAAyE,CAAA;IACzE,kFAA6D,CAAA;IAC7D,gGAA2E,CAAA;IAC3E,oFAA+D,CAAA;IAC/D,0FAAqE,CAAA;IACrE,oFAA+D,CAAA;IAC/D,sGAAiF,CAAA;IACjF,4EAAuD,CAAA;IACvD,0FAAqE,CAAA;IACrE,wFAAmE,CAAA;IACnE,8EAAyD,CAAA;IACzD,sGAAiF,CAAA;IACjF,8EAAyD,CAAA;IACzD,SAAS;IACT,4FAAuE,CAAA;IACvE,gGAA2E,CAAA;IAC3E,wFAAmE,CAAA;IACnE,4EAAuD,CAAA;IACvD,kFAA6D,CAAA;IAC7D,kFAA6D,CAAA;IAC7D,sHAAiG,CAAA;IACjG,gGAA2E,CAAA;IAC3E,sGAAiF,CAAA;IACjF,gGAA2E,CAAA;IAC3E,sGAAiF,CAAA;IACjF,gHAA2F,CAAA;IAC3F,wFAAmE,CAAA;IACnE,0FAAqE,CAAA;IACrE,8FAAyE,CAAA;IACzE,8EAAyD,CAAA;IACzD,wFAAmE,CAAA;IACnE,8EAAyD,CAAA;IACzD,gFAA2D,CAAA;IAC3D,8EAAyD,CAAA;IACzD,0FAAqE,CAAA;IACrE,oEAA+C,CAAA;IAC/C,gGAA2E,CAAA;IAC3E,MAAM;IACN,8FAAyE,CAAA;IACzE,oJAA+H,CAAA;IAC/H,wHAAmG,CAAA;IACnG,8GAAyF,CAAA;IACzF,4GAAuF,CAAA;IACvF,oGAA+E,CAAA;IAC/E,sFAAiE,CAAA;IACjE,4FAAuE,CAAA;IACvE,kGAA6E,CAAA;IAC7E,wFAAmE,CAAA;IACnE,8FAAyE,CAAA;IACzE,0FAAqE,CAAA;IACrE,8FAAyE,CAAA;IACzE,4GAAuF,CAAA;IAEvF,2CAA2C;IAC3C,yBAAyB;IACzB,2CAA2C;IAC3C,wDAAmC,CAAA;IACnC,0EAAqD,CAAA;AACzD,CAAC,EApUW,iBAAiB,KAAjB,iBAAiB,QAoU5B;AAED,eAAe,iBAAiB,CAAC"}
package/src/index.d.ts DELETED
@@ -1,60 +0,0 @@
1
- /**
2
- * Vulnerability Registry - Main Entry Point
3
- *
4
- * Exports all vulnerability codes, definitions, and lookup utilities
5
- */
6
- import { VulnerabilityCode } from './error-codes.js';
7
- import type { VulnerabilityDefinition, VulnerabilityLookup, Severity, VulnerabilityCategory } from './types.js';
8
- import { INJECTION_VULNERABILITIES } from './categories/injection.js';
9
- import { XSS_VULNERABILITIES } from './categories/xss.js';
10
- import { SSRF_VULNERABILITIES } from './categories/ssrf.js';
11
- import { AUTH_VULNERABILITIES } from './categories/authentication.js';
12
- import { CONFIG_VULNERABILITIES } from './categories/configuration.js';
13
- import { SENSITIVE_PATH_VULNERABILITIES } from './categories/sensitive-paths.js';
14
- /**
15
- * Complete vulnerability registry combining all categories
16
- */
17
- export declare const VULNERABILITY_REGISTRY: Record<string, VulnerabilityDefinition>;
18
- /**
19
- * Get vulnerability definition by code
20
- */
21
- export declare function getVulnerabilityDefinition(code: VulnerabilityCode | string): VulnerabilityLookup;
22
- /**
23
- * Get all vulnerabilities for a specific scanner
24
- */
25
- export declare function getVulnerabilitiesByScanner(scanner: string): VulnerabilityDefinition[];
26
- /**
27
- * Get all vulnerabilities for a specific category
28
- */
29
- export declare function getVulnerabilitiesByCategory(category: VulnerabilityCategory): VulnerabilityDefinition[];
30
- /**
31
- * Get all vulnerabilities for a specific severity
32
- */
33
- export declare function getVulnerabilitiesBySeverity(severity: Severity): VulnerabilityDefinition[];
34
- /**
35
- * Get all vulnerability codes
36
- */
37
- export declare function getAllVulnerabilityCodes(): VulnerabilityCode[];
38
- /**
39
- * Get total count of registered vulnerabilities
40
- */
41
- export declare function getVulnerabilityCount(): number;
42
- /**
43
- * Create a finding with vulnerability definition
44
- */
45
- export declare function createFinding(code: VulnerabilityCode | string, overrides?: Partial<VulnerabilityDefinition>): VulnerabilityDefinition | null;
46
- export { VulnerabilityCode } from './error-codes.js';
47
- export type { VulnerabilityDefinition, VulnerabilityLookup, CVSSProfile, CWEReference, OWASPReference, Severity, VulnerabilityCategory, } from './types.js';
48
- export { INJECTION_VULNERABILITIES, XSS_VULNERABILITIES, SSRF_VULNERABILITIES, AUTH_VULNERABILITIES, CONFIG_VULNERABILITIES, SENSITIVE_PATH_VULNERABILITIES, };
49
- declare const _default: {
50
- VulnerabilityCode: typeof VulnerabilityCode;
51
- VULNERABILITY_REGISTRY: Record<string, VulnerabilityDefinition>;
52
- getVulnerabilityDefinition: typeof getVulnerabilityDefinition;
53
- getVulnerabilitiesByScanner: typeof getVulnerabilitiesByScanner;
54
- getVulnerabilitiesByCategory: typeof getVulnerabilitiesByCategory;
55
- getVulnerabilitiesBySeverity: typeof getVulnerabilitiesBySeverity;
56
- getAllVulnerabilityCodes: typeof getAllVulnerabilityCodes;
57
- getVulnerabilityCount: typeof getVulnerabilityCount;
58
- createFinding: typeof createFinding;
59
- };
60
- export default _default;
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAEH,OAAO,EAAE,iBAAiB,EAAE,MAAM,kBAAkB,CAAC;AACrD,OAAO,KAAK,EAAE,uBAAuB,EAAE,mBAAmB,EAA6C,QAAQ,EAAE,qBAAqB,EAAE,MAAM,YAAY,CAAC;AAG3J,OAAO,EAAE,yBAAyB,EAAE,MAAM,2BAA2B,CAAC;AACtE,OAAO,EAAE,mBAAmB,EAAE,MAAM,qBAAqB,CAAC;AAC1D,OAAO,EAAE,oBAAoB,EAAE,MAAM,sBAAsB,CAAC;AAC5D,OAAO,EAAE,oBAAoB,EAAE,MAAM,gCAAgC,CAAC;AACtE,OAAO,EAAE,sBAAsB,EAAE,MAAM,+BAA+B,CAAC;AACvE,OAAO,EAAE,8BAA8B,EAAE,MAAM,iCAAiC,CAAC;AAEjF;;GAEG;AACH,eAAO,MAAM,sBAAsB,EAAE,MAAM,CAAC,MAAM,EAAE,uBAAuB,CAO1E,CAAC;AAEF;;GAEG;AACH,wBAAgB,0BAA0B,CAAC,IAAI,EAAE,iBAAiB,GAAG,MAAM,GAAG,mBAAmB,CAMhG;AAED;;GAEG;AACH,wBAAgB,2BAA2B,CAAC,OAAO,EAAE,MAAM,GAAG,uBAAuB,EAAE,CAEtF;AAED;;GAEG;AACH,wBAAgB,4BAA4B,CAAC,QAAQ,EAAE,qBAAqB,GAAG,uBAAuB,EAAE,CAEvG;AAED;;GAEG;AACH,wBAAgB,4BAA4B,CAAC,QAAQ,EAAE,QAAQ,GAAG,uBAAuB,EAAE,CAE1F;AAED;;GAEG;AACH,wBAAgB,wBAAwB,IAAI,iBAAiB,EAAE,CAE9D;AAED;;GAEG;AACH,wBAAgB,qBAAqB,IAAI,MAAM,CAE9C;AAED;;GAEG;AACH,wBAAgB,aAAa,CACzB,IAAI,EAAE,iBAAiB,GAAG,MAAM,EAChC,SAAS,CAAC,EAAE,OAAO,CAAC,uBAAuB,CAAC,GAC7C,uBAAuB,GAAG,IAAI,CAUhC;AAGD,OAAO,EAAE,iBAAiB,EAAE,MAAM,kBAAkB,CAAC;AACrD,YAAY,EACR,uBAAuB,EACvB,mBAAmB,EACnB,WAAW,EACX,YAAY,EACZ,cAAc,EACd,QAAQ,EACR,qBAAqB,GACxB,MAAM,YAAY,CAAC;AAGpB,OAAO,EACH,yBAAyB,EACzB,mBAAmB,EACnB,oBAAoB,EACpB,oBAAoB,EACpB,sBAAsB,EACtB,8BAA8B,GACjC,CAAC;;;;;;;;;;;;AAEF,wBAUE"}
package/src/index.js DELETED
@@ -1,92 +0,0 @@
1
- /**
2
- * Vulnerability Registry - Main Entry Point
3
- *
4
- * Exports all vulnerability codes, definitions, and lookup utilities
5
- */
6
- import { VulnerabilityCode } from './error-codes.js';
7
- // Import all category definitions
8
- import { INJECTION_VULNERABILITIES } from './categories/injection.js';
9
- import { XSS_VULNERABILITIES } from './categories/xss.js';
10
- import { SSRF_VULNERABILITIES } from './categories/ssrf.js';
11
- import { AUTH_VULNERABILITIES } from './categories/authentication.js';
12
- import { CONFIG_VULNERABILITIES } from './categories/configuration.js';
13
- import { SENSITIVE_PATH_VULNERABILITIES } from './categories/sensitive-paths.js';
14
- /**
15
- * Complete vulnerability registry combining all categories
16
- */
17
- export const VULNERABILITY_REGISTRY = {
18
- ...INJECTION_VULNERABILITIES,
19
- ...XSS_VULNERABILITIES,
20
- ...SSRF_VULNERABILITIES,
21
- ...AUTH_VULNERABILITIES,
22
- ...CONFIG_VULNERABILITIES,
23
- ...SENSITIVE_PATH_VULNERABILITIES,
24
- };
25
- /**
26
- * Get vulnerability definition by code
27
- */
28
- export function getVulnerabilityDefinition(code) {
29
- const definition = VULNERABILITY_REGISTRY[code];
30
- if (definition) {
31
- return { found: true, definition };
32
- }
33
- return { found: false };
34
- }
35
- /**
36
- * Get all vulnerabilities for a specific scanner
37
- */
38
- export function getVulnerabilitiesByScanner(scanner) {
39
- return Object.values(VULNERABILITY_REGISTRY).filter(v => v.scanner === scanner);
40
- }
41
- /**
42
- * Get all vulnerabilities for a specific category
43
- */
44
- export function getVulnerabilitiesByCategory(category) {
45
- return Object.values(VULNERABILITY_REGISTRY).filter(v => v.category === category);
46
- }
47
- /**
48
- * Get all vulnerabilities for a specific severity
49
- */
50
- export function getVulnerabilitiesBySeverity(severity) {
51
- return Object.values(VULNERABILITY_REGISTRY).filter(v => v.severity === severity);
52
- }
53
- /**
54
- * Get all vulnerability codes
55
- */
56
- export function getAllVulnerabilityCodes() {
57
- return Object.values(VulnerabilityCode);
58
- }
59
- /**
60
- * Get total count of registered vulnerabilities
61
- */
62
- export function getVulnerabilityCount() {
63
- return Object.keys(VULNERABILITY_REGISTRY).length;
64
- }
65
- /**
66
- * Create a finding with vulnerability definition
67
- */
68
- export function createFinding(code, overrides) {
69
- const lookup = getVulnerabilityDefinition(code);
70
- if (!lookup.found || !lookup.definition) {
71
- return null;
72
- }
73
- return {
74
- ...lookup.definition,
75
- ...overrides,
76
- };
77
- }
78
- // Re-export all types and enums
79
- export { VulnerabilityCode } from './error-codes.js';
80
- // Export category definitions for direct access
81
- export { INJECTION_VULNERABILITIES, XSS_VULNERABILITIES, SSRF_VULNERABILITIES, AUTH_VULNERABILITIES, CONFIG_VULNERABILITIES, SENSITIVE_PATH_VULNERABILITIES, };
82
- export default {
83
- VulnerabilityCode,
84
- VULNERABILITY_REGISTRY,
85
- getVulnerabilityDefinition,
86
- getVulnerabilitiesByScanner,
87
- getVulnerabilitiesByCategory,
88
- getVulnerabilitiesBySeverity,
89
- getAllVulnerabilityCodes,
90
- getVulnerabilityCount,
91
- createFinding,
92
- };
package/src/index.js.map DELETED
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAEH,OAAO,EAAE,iBAAiB,EAAE,MAAM,kBAAkB,CAAC;AAGrD,kCAAkC;AAClC,OAAO,EAAE,yBAAyB,EAAE,MAAM,2BAA2B,CAAC;AACtE,OAAO,EAAE,mBAAmB,EAAE,MAAM,qBAAqB,CAAC;AAC1D,OAAO,EAAE,oBAAoB,EAAE,MAAM,sBAAsB,CAAC;AAC5D,OAAO,EAAE,oBAAoB,EAAE,MAAM,gCAAgC,CAAC;AACtE,OAAO,EAAE,sBAAsB,EAAE,MAAM,+BAA+B,CAAC;AACvE,OAAO,EAAE,8BAA8B,EAAE,MAAM,iCAAiC,CAAC;AAEjF;;GAEG;AACH,MAAM,CAAC,MAAM,sBAAsB,GAA4C;IAC3E,GAAG,yBAAyB;IAC5B,GAAG,mBAAmB;IACtB,GAAG,oBAAoB;IACvB,GAAG,oBAAoB;IACvB,GAAG,sBAAsB;IACzB,GAAG,8BAA8B;CACpC,CAAC;AAEF;;GAEG;AACH,MAAM,UAAU,0BAA0B,CAAC,IAAgC;IACvE,MAAM,UAAU,GAAG,sBAAsB,CAAC,IAAI,CAAC,CAAC;IAChD,IAAI,UAAU,EAAE,CAAC;QACb,OAAO,EAAE,KAAK,EAAE,IAAI,EAAE,UAAU,EAAE,CAAC;IACvC,CAAC;IACD,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,CAAC;AAC5B,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,2BAA2B,CAAC,OAAe;IACvD,OAAO,MAAM,CAAC,MAAM,CAAC,sBAAsB,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,OAAO,KAAK,OAAO,CAAC,CAAC;AACpF,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,4BAA4B,CAAC,QAA+B;IACxE,OAAO,MAAM,CAAC,MAAM,CAAC,sBAAsB,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,KAAK,QAAQ,CAAC,CAAC;AACtF,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,4BAA4B,CAAC,QAAkB;IAC3D,OAAO,MAAM,CAAC,MAAM,CAAC,sBAAsB,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,KAAK,QAAQ,CAAC,CAAC;AACtF,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,wBAAwB;IACpC,OAAO,MAAM,CAAC,MAAM,CAAC,iBAAiB,CAAC,CAAC;AAC5C,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,qBAAqB;IACjC,OAAO,MAAM,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,MAAM,CAAC;AACtD,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,aAAa,CACzB,IAAgC,EAChC,SAA4C;IAE5C,MAAM,MAAM,GAAG,0BAA0B,CAAC,IAAI,CAAC,CAAC;IAChD,IAAI,CAAC,MAAM,CAAC,KAAK,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,CAAC;QACtC,OAAO,IAAI,CAAC;IAChB,CAAC;IAED,OAAO;QACH,GAAG,MAAM,CAAC,UAAU;QACpB,GAAG,SAAS;KACf,CAAC;AACN,CAAC;AAED,gCAAgC;AAChC,OAAO,EAAE,iBAAiB,EAAE,MAAM,kBAAkB,CAAC;AAWrD,gDAAgD;AAChD,OAAO,EACH,yBAAyB,EACzB,mBAAmB,EACnB,oBAAoB,EACpB,oBAAoB,EACpB,sBAAsB,EACtB,8BAA8B,GACjC,CAAC;AAEF,eAAe;IACX,iBAAiB;IACjB,sBAAsB;IACtB,0BAA0B;IAC1B,2BAA2B;IAC3B,4BAA4B;IAC5B,4BAA4B;IAC5B,wBAAwB;IACxB,qBAAqB;IACrB,aAAa;CAChB,CAAC"}
package/src/types.d.ts DELETED
@@ -1,88 +0,0 @@
1
- /**
2
- * Vulnerability Registry - Core Types
3
- *
4
- * Central type definitions for all vulnerability definitions.
5
- */
6
- /**
7
- * Vulnerability severity levels
8
- */
9
- export type Severity = 'critical' | 'high' | 'medium' | 'low' | 'info';
10
- /**
11
- * CVSS v3.1 severity ratings
12
- */
13
- export type CVSSSeverity = 'CRITICAL' | 'HIGH' | 'MEDIUM' | 'LOW' | 'NONE';
14
- /**
15
- * Vulnerability categories
16
- */
17
- export type VulnerabilityCategory = 'injection' | 'xss' | 'authentication' | 'access_control' | 'configuration' | 'information_disclosure' | 'cryptographic' | 'business_logic' | 'ssrf' | 'file_inclusion';
18
- /**
19
- * CVSS v3.1 Score data
20
- */
21
- export interface CVSSProfile {
22
- /** Base score (0.0 - 10.0) */
23
- score: number;
24
- /** Full CVSS vector string */
25
- vector: string;
26
- /** Severity rating derived from score */
27
- severity: CVSSSeverity;
28
- }
29
- /**
30
- * CWE (Common Weakness Enumeration) reference
31
- */
32
- export interface CWEReference {
33
- /** CWE ID (e.g., "CWE-89") */
34
- id: string;
35
- /** CWE name */
36
- name: string;
37
- /** URL to CWE definition */
38
- url: string;
39
- }
40
- /**
41
- * OWASP reference
42
- */
43
- export interface OWASPReference {
44
- /** OWASP ID (e.g., "A03:2021") */
45
- id: string;
46
- /** OWASP category name */
47
- name: string;
48
- /** URL to OWASP definition */
49
- url: string;
50
- }
51
- /**
52
- * Complete vulnerability definition
53
- */
54
- export interface VulnerabilityDefinition {
55
- /** Unique numeric identifier */
56
- id: number;
57
- /** Unique vulnerability code */
58
- code: string;
59
- /** Human-readable title */
60
- title: string;
61
- /** Detailed description (100+ characters) */
62
- description: string;
63
- /** Severity level */
64
- severity: Severity;
65
- /** Severity level numeric mapping (1=critical, 2=high, 3=medium, 4=low, 5=info) */
66
- levelId: 1 | 2 | 3 | 4 | 5;
67
- /** Vulnerability category */
68
- category: VulnerabilityCategory;
69
- /** Scanner that detects this vulnerability */
70
- scanner: string;
71
- /** CVSS v3.1 profile */
72
- cvss: CVSSProfile;
73
- /** Associated CWE references */
74
- cwe: CWEReference[];
75
- /** Associated OWASP references */
76
- owasp: OWASPReference[];
77
- /** Remediation guidance */
78
- remediation: string;
79
- /** Additional reference URLs */
80
- references?: string[];
81
- }
82
- /**
83
- * Vulnerability registry lookup result
84
- */
85
- export interface VulnerabilityLookup {
86
- found: boolean;
87
- definition?: VulnerabilityDefinition;
88
- }
@@ -1 +0,0 @@
1
- {"version":3,"file":"types.d.ts","sourceRoot":"","sources":["types.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAEH;;GAEG;AACH,MAAM,MAAM,QAAQ,GAAG,UAAU,GAAG,MAAM,GAAG,QAAQ,GAAG,KAAK,GAAG,MAAM,CAAC;AAEvE;;GAEG;AACH,MAAM,MAAM,YAAY,GAAG,UAAU,GAAG,MAAM,GAAG,QAAQ,GAAG,KAAK,GAAG,MAAM,CAAC;AAE3E;;GAEG;AACH,MAAM,MAAM,qBAAqB,GAC3B,WAAW,GACX,KAAK,GACL,gBAAgB,GAChB,gBAAgB,GAChB,eAAe,GACf,wBAAwB,GACxB,eAAe,GACf,gBAAgB,GAChB,MAAM,GACN,gBAAgB,CAAC;AAEvB;;GAEG;AACH,MAAM,WAAW,WAAW;IACxB,8BAA8B;IAC9B,KAAK,EAAE,MAAM,CAAC;IACd,8BAA8B;IAC9B,MAAM,EAAE,MAAM,CAAC;IACf,yCAAyC;IACzC,QAAQ,EAAE,YAAY,CAAC;CAC1B;AAED;;GAEG;AACH,MAAM,WAAW,YAAY;IACzB,8BAA8B;IAC9B,EAAE,EAAE,MAAM,CAAC;IACX,eAAe;IACf,IAAI,EAAE,MAAM,CAAC;IACb,4BAA4B;IAC5B,GAAG,EAAE,MAAM,CAAC;CACf;AAED;;GAEG;AACH,MAAM,WAAW,cAAc;IAC3B,kCAAkC;IAClC,EAAE,EAAE,MAAM,CAAC;IACX,0BAA0B;IAC1B,IAAI,EAAE,MAAM,CAAC;IACb,8BAA8B;IAC9B,GAAG,EAAE,MAAM,CAAC;CACf;AAED;;GAEG;AACH,MAAM,WAAW,uBAAuB;IACpC,gCAAgC;IAChC,EAAE,EAAE,MAAM,CAAC;IACX,gCAAgC;IAChC,IAAI,EAAE,MAAM,CAAC;IACb,2BAA2B;IAC3B,KAAK,EAAE,MAAM,CAAC;IACd,6CAA6C;IAC7C,WAAW,EAAE,MAAM,CAAC;IACpB,qBAAqB;IACrB,QAAQ,EAAE,QAAQ,CAAC;IACnB,6BAA6B;IAC7B,QAAQ,EAAE,qBAAqB,CAAC;IAChC,8CAA8C;IAC9C,OAAO,EAAE,MAAM,CAAC;IAEhB,wBAAwB;IACxB,IAAI,EAAE,WAAW,CAAC;IAElB,gCAAgC;IAChC,GAAG,EAAE,YAAY,EAAE,CAAC;IAEpB,kCAAkC;IAClC,KAAK,EAAE,cAAc,EAAE,CAAC;IAExB,2BAA2B;IAC3B,WAAW,EAAE,MAAM,CAAC;IAEpB,gCAAgC;IAChC,UAAU,CAAC,EAAE,MAAM,EAAE,CAAC;CACzB;AAED;;GAEG;AACH,MAAM,WAAW,mBAAmB;IAChC,KAAK,EAAE,OAAO,CAAC;IACf,UAAU,CAAC,EAAE,uBAAuB,CAAC;CACxC"}
package/src/types.js DELETED
@@ -1,6 +0,0 @@
1
- /**
2
- * Vulnerability Registry - Core Types
3
- *
4
- * Central type definitions for all vulnerability definitions.
5
- */
6
- export {};
package/src/types.js.map DELETED
@@ -1 +0,0 @@
1
- {"version":3,"file":"types.js","sourceRoot":"","sources":["types.ts"],"names":[],"mappings":"AAAA;;;;GAIG"}