mobbdev 1.0.23 → 1.0.24

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/dist/index.mjs +30 -23
  2. package/package.json +1 -1
package/dist/index.mjs CHANGED
@@ -49,6 +49,7 @@ var FixQuestionInputType = /* @__PURE__ */ ((FixQuestionInputType2) => {
49
49
  var Language = /* @__PURE__ */ ((Language2) => {
50
50
  Language2["Cpp"] = "CPP";
51
51
  Language2["Csharp"] = "CSHARP";
52
+ Language2["Go"] = "GO";
52
53
  Language2["Java"] = "JAVA";
53
54
  Language2["Js"] = "JS";
54
55
  Language2["Php"] = "PHP";
@@ -99,6 +100,7 @@ var Fix_State_Enum = /* @__PURE__ */ ((Fix_State_Enum2) => {
99
100
  var IssueLanguage_Enum = /* @__PURE__ */ ((IssueLanguage_Enum2) => {
100
101
  IssueLanguage_Enum2["CSharp"] = "CSharp";
101
102
  IssueLanguage_Enum2["Cpp"] = "Cpp";
103
+ IssueLanguage_Enum2["Go"] = "Go";
102
104
  IssueLanguage_Enum2["Java"] = "Java";
103
105
  IssueLanguage_Enum2["JavaScript"] = "JavaScript";
104
106
  IssueLanguage_Enum2["Php"] = "PHP";
@@ -1850,6 +1852,10 @@ var vulnerabilities = {
1850
1852
  };
1851
1853
  var csharp_default = vulnerabilities;
1852
1854
 
1855
+ // src/features/analysis/scm/shared/src/storedFixData/go/index.ts
1856
+ var vulnerabilities2 = {};
1857
+ var go_default = vulnerabilities2;
1858
+
1853
1859
  // src/features/analysis/scm/shared/src/storedFixData/java/sqlInjection.ts
1854
1860
  var sqlInjection = {
1855
1861
  guidance: ({
@@ -1875,12 +1881,12 @@ var systemInformationLeak = {
1875
1881
  };
1876
1882
 
1877
1883
  // src/features/analysis/scm/shared/src/storedFixData/java/index.ts
1878
- var vulnerabilities2 = {
1884
+ var vulnerabilities3 = {
1879
1885
  ["PASSWORD_IN_COMMENT" /* PasswordInComment */]: passwordInComment,
1880
1886
  ["SQL_Injection" /* SqlInjection */]: sqlInjection,
1881
1887
  ["SYSTEM_INFORMATION_LEAK" /* SystemInformationLeak */]: systemInformationLeak
1882
1888
  };
1883
- var java_default = vulnerabilities2;
1889
+ var java_default = vulnerabilities3;
1884
1890
 
1885
1891
  // src/features/analysis/scm/shared/src/storedFixData/python/csrf.ts
1886
1892
  var csrf = {
@@ -1923,18 +1929,18 @@ var ssrf = {
1923
1929
  };
1924
1930
 
1925
1931
  // src/features/analysis/scm/shared/src/storedFixData/javascript/index.ts
1926
- var vulnerabilities3 = {
1932
+ var vulnerabilities4 = {
1927
1933
  ["SSRF" /* Ssrf */]: ssrf,
1928
1934
  ["HARDCODED_SECRETS" /* HardcodedSecrets */]: hardcodedSecrets,
1929
1935
  ["PASSWORD_IN_COMMENT" /* PasswordInComment */]: passwordInComment,
1930
1936
  ["NO_LIMITS_OR_THROTTLING" /* NoLimitsOrThrottling */]: noLimitsOrThrottling,
1931
1937
  ["CSRF" /* Csrf */]: csrf
1932
1938
  };
1933
- var javascript_default = vulnerabilities3;
1939
+ var javascript_default = vulnerabilities4;
1934
1940
 
1935
1941
  // src/features/analysis/scm/shared/src/storedFixData/php/index.ts
1936
- var vulnerabilities4 = {};
1937
- var php_default = vulnerabilities4;
1942
+ var vulnerabilities5 = {};
1943
+ var php_default = vulnerabilities5;
1938
1944
 
1939
1945
  // src/features/analysis/scm/shared/src/storedFixData/python/autoEscapeFalse.ts
1940
1946
  var autoEscapeFalse = {
@@ -1956,11 +1962,11 @@ See more information [here](https://jinja.palletsprojects.com/en/3.1.x/templates
1956
1962
  };
1957
1963
 
1958
1964
  // src/features/analysis/scm/shared/src/storedFixData/python/index.ts
1959
- var vulnerabilities5 = {
1965
+ var vulnerabilities6 = {
1960
1966
  ["AUTO_ESCAPE_FALSE" /* AutoEscapeFalse */]: autoEscapeFalse,
1961
1967
  ["CSRF" /* Csrf */]: csrf
1962
1968
  };
1963
- var python_default = vulnerabilities5;
1969
+ var python_default = vulnerabilities6;
1964
1970
 
1965
1971
  // src/features/analysis/scm/shared/src/storedFixData/sql/defaultRightsInObjDefinition.ts
1966
1972
  var defaultRightsInObjDefinition = {
@@ -1968,16 +1974,16 @@ var defaultRightsInObjDefinition = {
1968
1974
  };
1969
1975
 
1970
1976
  // src/features/analysis/scm/shared/src/storedFixData/sql/index.ts
1971
- var vulnerabilities6 = {
1977
+ var vulnerabilities7 = {
1972
1978
  ["DEFAULT_RIGHTS_IN_OBJ_DEFINITION" /* DefaultRightsInObjDefinition */]: defaultRightsInObjDefinition
1973
1979
  };
1974
- var sql_default = vulnerabilities6;
1980
+ var sql_default = vulnerabilities7;
1975
1981
 
1976
1982
  // src/features/analysis/scm/shared/src/storedFixData/xml/index.ts
1977
- var vulnerabilities7 = {
1983
+ var vulnerabilities8 = {
1978
1984
  ["PASSWORD_IN_COMMENT" /* PasswordInComment */]: passwordInComment
1979
1985
  };
1980
- var xml_default = vulnerabilities7;
1986
+ var xml_default = vulnerabilities8;
1981
1987
 
1982
1988
  // src/features/analysis/scm/shared/src/storedFixData/index.ts
1983
1989
  var StoredFixDataItemZ = z6.object({
@@ -1990,7 +1996,8 @@ var languages = {
1990
1996
  ["SQL" /* Sql */]: sql_default,
1991
1997
  ["XML" /* Xml */]: xml_default,
1992
1998
  ["Python" /* Python */]: python_default,
1993
- ["PHP" /* Php */]: php_default
1999
+ ["PHP" /* Php */]: php_default,
2000
+ ["Go" /* Go */]: go_default
1994
2001
  };
1995
2002
 
1996
2003
  // src/features/analysis/scm/shared/src/storedQuestionData/index.ts
@@ -2280,7 +2287,7 @@ var xxe = {
2280
2287
  };
2281
2288
 
2282
2289
  // src/features/analysis/scm/shared/src/storedQuestionData/csharp/index.ts
2283
- var vulnerabilities8 = {
2290
+ var vulnerabilities9 = {
2284
2291
  ["LOG_FORGING" /* LogForging */]: logForging,
2285
2292
  ["SSRF" /* Ssrf */]: ssrf2,
2286
2293
  ["XXE" /* Xxe */]: xxe,
@@ -2300,7 +2307,7 @@ var vulnerabilities8 = {
2300
2307
  ["INSUFFICIENT_LOGGING" /* InsufficientLogging */]: insufficientLogging,
2301
2308
  ["SQL_Injection" /* SqlInjection */]: sqlInjection2
2302
2309
  };
2303
- var csharp_default2 = vulnerabilities8;
2310
+ var csharp_default2 = vulnerabilities9;
2304
2311
 
2305
2312
  // src/features/analysis/scm/shared/src/storedQuestionData/java/commandInjection.ts
2306
2313
  var commandInjection = {
@@ -2736,7 +2743,7 @@ var xxe2 = {
2736
2743
  };
2737
2744
 
2738
2745
  // src/features/analysis/scm/shared/src/storedQuestionData/java/index.ts
2739
- var vulnerabilities9 = {
2746
+ var vulnerabilities10 = {
2740
2747
  ["SQL_Injection" /* SqlInjection */]: sqlInjection3,
2741
2748
  ["CMDi_relative_path_command" /* CmDiRelativePathCommand */]: relativePathCommand,
2742
2749
  ["CMDi" /* CmDi */]: commandInjection,
@@ -2760,7 +2767,7 @@ var vulnerabilities9 = {
2760
2767
  ["LEFTOVER_DEBUG_CODE" /* LeftoverDebugCode */]: leftoverDebugCode,
2761
2768
  ["ERRONEOUS_STRING_COMPARE" /* ErroneousStringCompare */]: erroneousStringCompare
2762
2769
  };
2763
- var java_default2 = vulnerabilities9;
2770
+ var java_default2 = vulnerabilities10;
2764
2771
 
2765
2772
  // src/features/analysis/scm/shared/src/storedQuestionData/python/csrf.ts
2766
2773
  var csrf2 = {
@@ -3058,7 +3065,7 @@ var xss3 = {
3058
3065
  };
3059
3066
 
3060
3067
  // src/features/analysis/scm/shared/src/storedQuestionData/js/index.ts
3061
- var vulnerabilities10 = {
3068
+ var vulnerabilities11 = {
3062
3069
  ["CMDi" /* CmDi */]: commandInjection2,
3063
3070
  ["GRAPHQL_DEPTH_LIMIT" /* GraphqlDepthLimit */]: graphqlDepthLimit,
3064
3071
  ["INSECURE_RANDOMNESS" /* InsecureRandomness */]: insecureRandomness2,
@@ -3080,7 +3087,7 @@ var vulnerabilities10 = {
3080
3087
  ["HARDCODED_DOMAIN_IN_HTML" /* HardcodedDomainInHtml */]: hardcodedDomainInHtml,
3081
3088
  ["CSRF" /* Csrf */]: csrf2
3082
3089
  };
3083
- var js_default = vulnerabilities10;
3090
+ var js_default = vulnerabilities11;
3084
3091
 
3085
3092
  // src/features/analysis/scm/shared/src/storedQuestionData/python/logForging.ts
3086
3093
  var logForging4 = {
@@ -3108,12 +3115,12 @@ var openRedirect2 = {
3108
3115
  };
3109
3116
 
3110
3117
  // src/features/analysis/scm/shared/src/storedQuestionData/python/index.ts
3111
- var vulnerabilities11 = {
3118
+ var vulnerabilities12 = {
3112
3119
  ["CSRF" /* Csrf */]: csrf2,
3113
3120
  ["LOG_FORGING" /* LogForging */]: logForging4,
3114
3121
  ["LOG_FORGING" /* LogForging */]: openRedirect2
3115
3122
  };
3116
- var python_default2 = vulnerabilities11;
3123
+ var python_default2 = vulnerabilities12;
3117
3124
 
3118
3125
  // src/features/analysis/scm/shared/src/storedQuestionData/xml/unboundedOccurrences.ts
3119
3126
  var unboundedOccurrences = {
@@ -3127,10 +3134,10 @@ A value too high will cause performance issues up to and including denial of ser
3127
3134
  };
3128
3135
 
3129
3136
  // src/features/analysis/scm/shared/src/storedQuestionData/xml/index.ts
3130
- var vulnerabilities12 = {
3137
+ var vulnerabilities13 = {
3131
3138
  ["WEAK_XML_SCHEMA_UNBOUNDED_OCCURRENCES" /* WeakXmlSchemaUnboundedOccurrences */]: unboundedOccurrences
3132
3139
  };
3133
- var xml_default2 = vulnerabilities12;
3140
+ var xml_default2 = vulnerabilities13;
3134
3141
 
3135
3142
  // src/features/analysis/scm/shared/src/storedQuestionData/index.ts
3136
3143
  var StoredQuestionDataItemZ = z7.object({
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "mobbdev",
3
- "version": "1.0.23",
3
+ "version": "1.0.24",
4
4
  "description": "Automated secure code remediation tool",
5
5
  "repository": "git+https://github.com/mobb-dev/bugsy.git",
6
6
  "main": "dist/index.js",