mobbdev 1.0.120 → 1.0.122

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/dist/index.mjs +8 -5
  2. package/package.json +1 -1
package/dist/index.mjs CHANGED
@@ -1513,6 +1513,7 @@ var IssueType_Enum = /* @__PURE__ */ ((IssueType_Enum2) => {
1513
1513
  IssueType_Enum2["CmDiRelativePathCommand"] = "CMDi_relative_path_command";
1514
1514
  IssueType_Enum2["CodeInComment"] = "CODE_IN_COMMENT";
1515
1515
  IssueType_Enum2["ConfusingNaming"] = "CONFUSING_NAMING";
1516
+ IssueType_Enum2["CredentialDisclosure"] = "CREDENTIAL_DISCLOSURE";
1516
1517
  IssueType_Enum2["Csrf"] = "CSRF";
1517
1518
  IssueType_Enum2["DangerousFunctionOverflow"] = "DANGEROUS_FUNCTION_OVERFLOW";
1518
1519
  IssueType_Enum2["DeadCodeUnusedField"] = "DEAD_CODE_UNUSED_FIELD";
@@ -2634,7 +2635,8 @@ var fixDetailsData = {
2634
2635
  issueDescription: "HTTP Parameter Pollution occurs when an attacker can manipulate the parameters of an HTTP request to change the behavior of the server.",
2635
2636
  fixInstructions: "Implement proper input validation and bounds checking to prevent HTTP parameter pollution. Use safe string manipulation functions and ensure that the buffer size is properly managed."
2636
2637
  },
2637
- ["INCOMPLETE_SANITIZATION" /* IncompleteSanitization */]: void 0
2638
+ ["INCOMPLETE_SANITIZATION" /* IncompleteSanitization */]: void 0,
2639
+ ["CREDENTIAL_DISCLOSURE" /* CredentialDisclosure */]: void 0
2638
2640
  };
2639
2641
 
2640
2642
  // src/features/analysis/scm/shared/src/getIssueType.ts
@@ -2752,7 +2754,8 @@ var issueTypeMap = {
2752
2754
  ["BUFFER_OVERFLOW" /* BufferOverflow */]: "Buffer Overflow",
2753
2755
  ["STRING_TERMINATION_ERROR" /* StringTerminationError */]: "String Termination Error",
2754
2756
  ["HTTP_PARAMETER_POLLUTION" /* HttpParameterPollution */]: "HTTP Parameter Pollution",
2755
- ["INCOMPLETE_SANITIZATION" /* IncompleteSanitization */]: "Incomplete Sanitization"
2757
+ ["INCOMPLETE_SANITIZATION" /* IncompleteSanitization */]: "Incomplete Sanitization",
2758
+ ["CREDENTIAL_DISCLOSURE" /* CredentialDisclosure */]: "Credential Disclosure"
2756
2759
  };
2757
2760
  var issueTypeZ = z.nativeEnum(IssueType_Enum);
2758
2761
  var getIssueTypeFriendlyString = (issueType) => {
@@ -4552,7 +4555,7 @@ var IssueSharedStateZ = z7.object({
4552
4555
  url: z7.string()
4553
4556
  })
4554
4557
  )
4555
- });
4558
+ }).nullable();
4556
4559
  var FixSharedStateZ = z7.object({
4557
4560
  state: z7.nativeEnum(Fix_State_Enum),
4558
4561
  isArchived: z7.boolean(),
@@ -4593,7 +4596,7 @@ var FixQueryZ = z7.object({
4593
4596
  id: z7.string().uuid(),
4594
4597
  isArchived: z7.boolean(),
4595
4598
  ticketIntegrationId: z7.string().uuid().nullable()
4596
- })
4599
+ }).nullable()
4597
4600
  })
4598
4601
  ),
4599
4602
  patchAndQuestions: PatchAndQuestionsZ,
@@ -4896,7 +4899,7 @@ var IssueSharedStateZ2 = z11.object({
4896
4899
  url: z11.string()
4897
4900
  })
4898
4901
  )
4899
- });
4902
+ }).nullable();
4900
4903
  var ReportQueryResultZ = z11.object({
4901
4904
  fixReport_by_pk: z11.object({
4902
4905
  id: z11.string().uuid(),
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "mobbdev",
3
- "version": "1.0.120",
3
+ "version": "1.0.122",
4
4
  "description": "Automated secure code remediation tool",
5
5
  "repository": "git+https://github.com/mobb-dev/bugsy.git",
6
6
  "main": "dist/index.js",