mobbdev 1.0.132 → 1.0.135
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.mjs +17 -3
- package/package.json +1 -1
package/dist/index.mjs
CHANGED
|
@@ -1570,6 +1570,7 @@ var IssueType_Enum = /* @__PURE__ */ ((IssueType_Enum2) => {
|
|
|
1570
1570
|
IssueType_Enum2["MissingAntiforgeryValidation"] = "MISSING_ANTIFORGERY_VALIDATION";
|
|
1571
1571
|
IssueType_Enum2["MissingCheckAgainstNull"] = "MISSING_CHECK_AGAINST_NULL";
|
|
1572
1572
|
IssueType_Enum2["MissingCspHeader"] = "MISSING_CSP_HEADER";
|
|
1573
|
+
IssueType_Enum2["MissingEncodingFileOpen"] = "MISSING_ENCODING_FILE_OPEN";
|
|
1573
1574
|
IssueType_Enum2["MissingEqualsOrHashcode"] = "MISSING_EQUALS_OR_HASHCODE";
|
|
1574
1575
|
IssueType_Enum2["MissingHstsHeader"] = "MISSING_HSTS_HEADER";
|
|
1575
1576
|
IssueType_Enum2["MissingSslMinversion"] = "MISSING_SSL_MINVERSION";
|
|
@@ -2654,7 +2655,8 @@ var fixDetailsData = {
|
|
|
2654
2655
|
["MISSING_USER" /* MissingUser */]: {
|
|
2655
2656
|
issueDescription: "Missing User occurs when a user is not specified in the Dockerfile, leading to security vulnerabilities.",
|
|
2656
2657
|
fixInstructions: "Specify a user in the Dockerfile to prevent security vulnerabilities."
|
|
2657
|
-
}
|
|
2658
|
+
},
|
|
2659
|
+
["MISSING_ENCODING_FILE_OPEN" /* MissingEncodingFileOpen */]: void 0
|
|
2658
2660
|
};
|
|
2659
2661
|
|
|
2660
2662
|
// src/features/analysis/scm/shared/src/getIssueType.ts
|
|
@@ -2775,7 +2777,8 @@ var issueTypeMap = {
|
|
|
2775
2777
|
["INCOMPLETE_SANITIZATION" /* IncompleteSanitization */]: "Incomplete Sanitization",
|
|
2776
2778
|
["CREDENTIAL_DISCLOSURE" /* CredentialDisclosure */]: "Credential Disclosure",
|
|
2777
2779
|
["INSECURE_POSTMESSAGE" /* InsecurePostmessage */]: "Insecure Postmessage",
|
|
2778
|
-
["MISSING_USER" /* MissingUser */]: "Missing User"
|
|
2780
|
+
["MISSING_USER" /* MissingUser */]: "Missing User",
|
|
2781
|
+
["MISSING_ENCODING_FILE_OPEN" /* MissingEncodingFileOpen */]: "Missing Encoding File Open"
|
|
2779
2782
|
};
|
|
2780
2783
|
var issueTypeZ = z.nativeEnum(IssueType_Enum);
|
|
2781
2784
|
var getIssueTypeFriendlyString = (issueType) => {
|
|
@@ -4304,6 +4307,15 @@ var logForging5 = {
|
|
|
4304
4307
|
}
|
|
4305
4308
|
};
|
|
4306
4309
|
|
|
4310
|
+
// src/features/analysis/scm/shared/src/storedQuestionData/python/missingEncoding.ts
|
|
4311
|
+
var missingEncoding = {
|
|
4312
|
+
fEncoding: {
|
|
4313
|
+
content: () => "Enter the encoding of the file",
|
|
4314
|
+
description: () => "",
|
|
4315
|
+
guidance: () => ""
|
|
4316
|
+
}
|
|
4317
|
+
};
|
|
4318
|
+
|
|
4307
4319
|
// src/features/analysis/scm/shared/src/storedQuestionData/python/openRedirect.ts
|
|
4308
4320
|
var openRedirect3 = {
|
|
4309
4321
|
allowed_hosts: {
|
|
@@ -4333,7 +4345,8 @@ var vulnerabilities14 = {
|
|
|
4333
4345
|
["LOG_FORGING" /* LogForging */]: logForging5,
|
|
4334
4346
|
["OPEN_REDIRECT" /* OpenRedirect */]: openRedirect3,
|
|
4335
4347
|
["UNCHECKED_LOOP_CONDITION" /* UncheckedLoopCondition */]: uncheckedLoopCondition3,
|
|
4336
|
-
["DUPLICATED_STRINGS" /* DuplicatedStrings */]: duplicatedStrings2
|
|
4348
|
+
["DUPLICATED_STRINGS" /* DuplicatedStrings */]: duplicatedStrings2,
|
|
4349
|
+
["MISSING_ENCODING_FILE_OPEN" /* MissingEncodingFileOpen */]: missingEncoding
|
|
4337
4350
|
};
|
|
4338
4351
|
var python_default2 = vulnerabilities14;
|
|
4339
4352
|
|
|
@@ -4633,6 +4646,7 @@ var FixPartsForFixScreenZ = FixQueryZ.merge(
|
|
|
4633
4646
|
z7.object({
|
|
4634
4647
|
vendorIssueId: z7.string(),
|
|
4635
4648
|
issueType: z7.string(),
|
|
4649
|
+
issueLanguage: z7.string(),
|
|
4636
4650
|
sharedState: IssueSharedStateZ
|
|
4637
4651
|
})
|
|
4638
4652
|
)
|