mobbdev 1.0.141 → 1.0.145
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.mjs +19 -3
- package/package.json +1 -1
package/dist/index.mjs
CHANGED
|
@@ -1601,6 +1601,7 @@ var IssueType_Enum = /* @__PURE__ */ ((IssueType_Enum2) => {
|
|
|
1601
1601
|
IssueType_Enum2["Redos"] = "REDOS";
|
|
1602
1602
|
IssueType_Enum2["RegexInjection"] = "REGEX_INJECTION";
|
|
1603
1603
|
IssueType_Enum2["RegexMissingTimeout"] = "REGEX_MISSING_TIMEOUT";
|
|
1604
|
+
IssueType_Enum2["RequestParametersBoundViaInput"] = "REQUEST_PARAMETERS_BOUND_VIA_INPUT";
|
|
1604
1605
|
IssueType_Enum2["ReturnShouldNotBeInvariant"] = "RETURN_SHOULD_NOT_BE_INVARIANT";
|
|
1605
1606
|
IssueType_Enum2["SqlInjection"] = "SQL_Injection";
|
|
1606
1607
|
IssueType_Enum2["Ssrf"] = "SSRF";
|
|
@@ -1619,6 +1620,7 @@ var IssueType_Enum = /* @__PURE__ */ ((IssueType_Enum2) => {
|
|
|
1619
1620
|
IssueType_Enum2["UnsafeWebThread"] = "UNSAFE_WEB_THREAD";
|
|
1620
1621
|
IssueType_Enum2["UnvalidatedPublicMethodArgument"] = "UNVALIDATED_PUBLIC_METHOD_ARGUMENT";
|
|
1621
1622
|
IssueType_Enum2["UselessRegexpCharEscape"] = "USELESS_REGEXP_CHAR_ESCAPE";
|
|
1623
|
+
IssueType_Enum2["UselessTernary"] = "USELESS_TERNARY";
|
|
1622
1624
|
IssueType_Enum2["UseOfHardCodedCryptographicKey"] = "USE_OF_HARD_CODED_CRYPTOGRAPHIC_KEY";
|
|
1623
1625
|
IssueType_Enum2["UseOfSystemOutputStream"] = "USE_OF_SYSTEM_OUTPUT_STREAM";
|
|
1624
1626
|
IssueType_Enum2["ValueNeverRead"] = "VALUE_NEVER_READ";
|
|
@@ -2662,7 +2664,9 @@ var fixDetailsData = {
|
|
|
2662
2664
|
["MISSING_ENCODING_FILE_OPEN" /* MissingEncodingFileOpen */]: void 0,
|
|
2663
2665
|
["PORT_ALL_INTERFACES" /* PortAllInterfaces */]: void 0,
|
|
2664
2666
|
["WRITABLE_FILESYSTEM_SERVICE" /* WritableFilesystemService */]: void 0,
|
|
2665
|
-
["NO_NEW_PRIVILEGES" /* NoNewPrivileges */]: void 0
|
|
2667
|
+
["NO_NEW_PRIVILEGES" /* NoNewPrivileges */]: void 0,
|
|
2668
|
+
["USELESS_TERNARY" /* UselessTernary */]: void 0,
|
|
2669
|
+
["REQUEST_PARAMETERS_BOUND_VIA_INPUT" /* RequestParametersBoundViaInput */]: void 0
|
|
2666
2670
|
};
|
|
2667
2671
|
|
|
2668
2672
|
// src/features/analysis/scm/shared/src/getIssueType.ts
|
|
@@ -2787,7 +2791,9 @@ var issueTypeMap = {
|
|
|
2787
2791
|
["MISSING_ENCODING_FILE_OPEN" /* MissingEncodingFileOpen */]: "Missing Encoding File Open",
|
|
2788
2792
|
["PORT_ALL_INTERFACES" /* PortAllInterfaces */]: "Port All Interfaces",
|
|
2789
2793
|
["WRITABLE_FILESYSTEM_SERVICE" /* WritableFilesystemService */]: "Writable Filesystem Service",
|
|
2790
|
-
["NO_NEW_PRIVILEGES" /* NoNewPrivileges */]: "No New Privileges"
|
|
2794
|
+
["NO_NEW_PRIVILEGES" /* NoNewPrivileges */]: "No New Privileges",
|
|
2795
|
+
["USELESS_TERNARY" /* UselessTernary */]: "Useless Ternary",
|
|
2796
|
+
["REQUEST_PARAMETERS_BOUND_VIA_INPUT" /* RequestParametersBoundViaInput */]: "Request Parameters Bound Via Input"
|
|
2791
2797
|
};
|
|
2792
2798
|
var issueTypeZ = z.nativeEnum(IssueType_Enum);
|
|
2793
2799
|
var getIssueTypeFriendlyString = (issueType) => {
|
|
@@ -3287,6 +3293,15 @@ var regexMissingTimeout = {
|
|
|
3287
3293
|
}
|
|
3288
3294
|
};
|
|
3289
3295
|
|
|
3296
|
+
// src/features/analysis/scm/shared/src/storedQuestionData/csharp/requestParametersBoundViaInput.ts
|
|
3297
|
+
var requestParametersBoundViaInput = {
|
|
3298
|
+
fieldsToCopy: {
|
|
3299
|
+
content: () => "Please list all the fields you expect as input from the user. Use comma separated list.",
|
|
3300
|
+
description: () => `This is meant to avoid mass assignment vulnerabilities, where the user would enter an inner unexpected field`,
|
|
3301
|
+
guidance: () => ""
|
|
3302
|
+
}
|
|
3303
|
+
};
|
|
3304
|
+
|
|
3290
3305
|
// src/features/analysis/scm/shared/src/storedQuestionData/csharp/sqlInjection.ts
|
|
3291
3306
|
var sqlInjection2 = {
|
|
3292
3307
|
databaseProvider: {
|
|
@@ -3442,7 +3457,8 @@ var vulnerabilities10 = {
|
|
|
3442
3457
|
["VALUE_SHADOWING" /* ValueShadowing */]: valueShadowing,
|
|
3443
3458
|
["INSECURE_RANDOMNESS" /* InsecureRandomness */]: insecureRandomness,
|
|
3444
3459
|
["INSUFFICIENT_LOGGING" /* InsufficientLogging */]: insufficientLogging,
|
|
3445
|
-
["SQL_Injection" /* SqlInjection */]: sqlInjection2
|
|
3460
|
+
["SQL_Injection" /* SqlInjection */]: sqlInjection2,
|
|
3461
|
+
["REQUEST_PARAMETERS_BOUND_VIA_INPUT" /* RequestParametersBoundViaInput */]: requestParametersBoundViaInput
|
|
3446
3462
|
};
|
|
3447
3463
|
var csharp_default2 = vulnerabilities10;
|
|
3448
3464
|
|