mobbdev 1.0.141 → 1.0.145

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/dist/index.mjs +19 -3
  2. package/package.json +1 -1
package/dist/index.mjs CHANGED
@@ -1601,6 +1601,7 @@ var IssueType_Enum = /* @__PURE__ */ ((IssueType_Enum2) => {
1601
1601
  IssueType_Enum2["Redos"] = "REDOS";
1602
1602
  IssueType_Enum2["RegexInjection"] = "REGEX_INJECTION";
1603
1603
  IssueType_Enum2["RegexMissingTimeout"] = "REGEX_MISSING_TIMEOUT";
1604
+ IssueType_Enum2["RequestParametersBoundViaInput"] = "REQUEST_PARAMETERS_BOUND_VIA_INPUT";
1604
1605
  IssueType_Enum2["ReturnShouldNotBeInvariant"] = "RETURN_SHOULD_NOT_BE_INVARIANT";
1605
1606
  IssueType_Enum2["SqlInjection"] = "SQL_Injection";
1606
1607
  IssueType_Enum2["Ssrf"] = "SSRF";
@@ -1619,6 +1620,7 @@ var IssueType_Enum = /* @__PURE__ */ ((IssueType_Enum2) => {
1619
1620
  IssueType_Enum2["UnsafeWebThread"] = "UNSAFE_WEB_THREAD";
1620
1621
  IssueType_Enum2["UnvalidatedPublicMethodArgument"] = "UNVALIDATED_PUBLIC_METHOD_ARGUMENT";
1621
1622
  IssueType_Enum2["UselessRegexpCharEscape"] = "USELESS_REGEXP_CHAR_ESCAPE";
1623
+ IssueType_Enum2["UselessTernary"] = "USELESS_TERNARY";
1622
1624
  IssueType_Enum2["UseOfHardCodedCryptographicKey"] = "USE_OF_HARD_CODED_CRYPTOGRAPHIC_KEY";
1623
1625
  IssueType_Enum2["UseOfSystemOutputStream"] = "USE_OF_SYSTEM_OUTPUT_STREAM";
1624
1626
  IssueType_Enum2["ValueNeverRead"] = "VALUE_NEVER_READ";
@@ -2662,7 +2664,9 @@ var fixDetailsData = {
2662
2664
  ["MISSING_ENCODING_FILE_OPEN" /* MissingEncodingFileOpen */]: void 0,
2663
2665
  ["PORT_ALL_INTERFACES" /* PortAllInterfaces */]: void 0,
2664
2666
  ["WRITABLE_FILESYSTEM_SERVICE" /* WritableFilesystemService */]: void 0,
2665
- ["NO_NEW_PRIVILEGES" /* NoNewPrivileges */]: void 0
2667
+ ["NO_NEW_PRIVILEGES" /* NoNewPrivileges */]: void 0,
2668
+ ["USELESS_TERNARY" /* UselessTernary */]: void 0,
2669
+ ["REQUEST_PARAMETERS_BOUND_VIA_INPUT" /* RequestParametersBoundViaInput */]: void 0
2666
2670
  };
2667
2671
 
2668
2672
  // src/features/analysis/scm/shared/src/getIssueType.ts
@@ -2787,7 +2791,9 @@ var issueTypeMap = {
2787
2791
  ["MISSING_ENCODING_FILE_OPEN" /* MissingEncodingFileOpen */]: "Missing Encoding File Open",
2788
2792
  ["PORT_ALL_INTERFACES" /* PortAllInterfaces */]: "Port All Interfaces",
2789
2793
  ["WRITABLE_FILESYSTEM_SERVICE" /* WritableFilesystemService */]: "Writable Filesystem Service",
2790
- ["NO_NEW_PRIVILEGES" /* NoNewPrivileges */]: "No New Privileges"
2794
+ ["NO_NEW_PRIVILEGES" /* NoNewPrivileges */]: "No New Privileges",
2795
+ ["USELESS_TERNARY" /* UselessTernary */]: "Useless Ternary",
2796
+ ["REQUEST_PARAMETERS_BOUND_VIA_INPUT" /* RequestParametersBoundViaInput */]: "Request Parameters Bound Via Input"
2791
2797
  };
2792
2798
  var issueTypeZ = z.nativeEnum(IssueType_Enum);
2793
2799
  var getIssueTypeFriendlyString = (issueType) => {
@@ -3287,6 +3293,15 @@ var regexMissingTimeout = {
3287
3293
  }
3288
3294
  };
3289
3295
 
3296
+ // src/features/analysis/scm/shared/src/storedQuestionData/csharp/requestParametersBoundViaInput.ts
3297
+ var requestParametersBoundViaInput = {
3298
+ fieldsToCopy: {
3299
+ content: () => "Please list all the fields you expect as input from the user. Use comma separated list.",
3300
+ description: () => `This is meant to avoid mass assignment vulnerabilities, where the user would enter an inner unexpected field`,
3301
+ guidance: () => ""
3302
+ }
3303
+ };
3304
+
3290
3305
  // src/features/analysis/scm/shared/src/storedQuestionData/csharp/sqlInjection.ts
3291
3306
  var sqlInjection2 = {
3292
3307
  databaseProvider: {
@@ -3442,7 +3457,8 @@ var vulnerabilities10 = {
3442
3457
  ["VALUE_SHADOWING" /* ValueShadowing */]: valueShadowing,
3443
3458
  ["INSECURE_RANDOMNESS" /* InsecureRandomness */]: insecureRandomness,
3444
3459
  ["INSUFFICIENT_LOGGING" /* InsufficientLogging */]: insufficientLogging,
3445
- ["SQL_Injection" /* SqlInjection */]: sqlInjection2
3460
+ ["SQL_Injection" /* SqlInjection */]: sqlInjection2,
3461
+ ["REQUEST_PARAMETERS_BOUND_VIA_INPUT" /* RequestParametersBoundViaInput */]: requestParametersBoundViaInput
3446
3462
  };
3447
3463
  var csharp_default2 = vulnerabilities10;
3448
3464
 
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "mobbdev",
3
- "version": "1.0.141",
3
+ "version": "1.0.145",
4
4
  "description": "Automated secure code remediation tool",
5
5
  "repository": "git+https://github.com/mobb-dev/bugsy.git",
6
6
  "main": "dist/index.js",