mobbdev 1.0.23 → 1.0.25
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.mjs +156 -60
- package/package.json +1 -1
package/dist/index.mjs
CHANGED
|
@@ -49,6 +49,7 @@ var FixQuestionInputType = /* @__PURE__ */ ((FixQuestionInputType2) => {
|
|
|
49
49
|
var Language = /* @__PURE__ */ ((Language2) => {
|
|
50
50
|
Language2["Cpp"] = "CPP";
|
|
51
51
|
Language2["Csharp"] = "CSHARP";
|
|
52
|
+
Language2["Go"] = "GO";
|
|
52
53
|
Language2["Java"] = "JAVA";
|
|
53
54
|
Language2["Js"] = "JS";
|
|
54
55
|
Language2["Php"] = "PHP";
|
|
@@ -99,6 +100,7 @@ var Fix_State_Enum = /* @__PURE__ */ ((Fix_State_Enum2) => {
|
|
|
99
100
|
var IssueLanguage_Enum = /* @__PURE__ */ ((IssueLanguage_Enum2) => {
|
|
100
101
|
IssueLanguage_Enum2["CSharp"] = "CSharp";
|
|
101
102
|
IssueLanguage_Enum2["Cpp"] = "Cpp";
|
|
103
|
+
IssueLanguage_Enum2["Go"] = "Go";
|
|
102
104
|
IssueLanguage_Enum2["Java"] = "Java";
|
|
103
105
|
IssueLanguage_Enum2["JavaScript"] = "JavaScript";
|
|
104
106
|
IssueLanguage_Enum2["Php"] = "PHP";
|
|
@@ -203,6 +205,18 @@ var Project_Role_Type_Enum = /* @__PURE__ */ ((Project_Role_Type_Enum2) => {
|
|
|
203
205
|
Project_Role_Type_Enum2["Writer"] = "writer";
|
|
204
206
|
return Project_Role_Type_Enum2;
|
|
205
207
|
})(Project_Role_Type_Enum || {});
|
|
208
|
+
var Vulnerability_Report_Issue_State_Enum = /* @__PURE__ */ ((Vulnerability_Report_Issue_State_Enum2) => {
|
|
209
|
+
Vulnerability_Report_Issue_State_Enum2["Digested"] = "Digested";
|
|
210
|
+
Vulnerability_Report_Issue_State_Enum2["Error"] = "Error";
|
|
211
|
+
Vulnerability_Report_Issue_State_Enum2["FalsePositive"] = "FalsePositive";
|
|
212
|
+
Vulnerability_Report_Issue_State_Enum2["Filtered"] = "Filtered";
|
|
213
|
+
Vulnerability_Report_Issue_State_Enum2["FilteredAiQuota"] = "FilteredAiQuota";
|
|
214
|
+
Vulnerability_Report_Issue_State_Enum2["Fixed"] = "Fixed";
|
|
215
|
+
Vulnerability_Report_Issue_State_Enum2["NoFix"] = "NoFix";
|
|
216
|
+
Vulnerability_Report_Issue_State_Enum2["Pending"] = "Pending";
|
|
217
|
+
Vulnerability_Report_Issue_State_Enum2["Unsupported"] = "Unsupported";
|
|
218
|
+
return Vulnerability_Report_Issue_State_Enum2;
|
|
219
|
+
})(Vulnerability_Report_Issue_State_Enum || {});
|
|
206
220
|
var Vulnerability_Report_Vendor_Enum = /* @__PURE__ */ ((Vulnerability_Report_Vendor_Enum3) => {
|
|
207
221
|
Vulnerability_Report_Vendor_Enum3["Checkmarx"] = "checkmarx";
|
|
208
222
|
Vulnerability_Report_Vendor_Enum3["CheckmarxXml"] = "checkmarxXml";
|
|
@@ -886,6 +900,8 @@ var ReportQueryResultZ = z3.object({
|
|
|
886
900
|
fixesDownloaded: z3.object({
|
|
887
901
|
aggregate: z3.object({ count: z3.number() })
|
|
888
902
|
}),
|
|
903
|
+
fixesDoneCount: z3.number(),
|
|
904
|
+
fixesInprogressCount: z3.number(),
|
|
889
905
|
fixesReadyCount: z3.number(),
|
|
890
906
|
issueTypes: z3.record(z3.string(), z3.number()).nullable(),
|
|
891
907
|
issueLanguages: z3.record(z3.string(), z3.number()).nullable(),
|
|
@@ -918,6 +934,7 @@ var ReportQueryResultZ = z3.object({
|
|
|
918
934
|
numberOfVulnerabilityIssues: z3.number(),
|
|
919
935
|
vulnerabilityReportIssues: z3.array(
|
|
920
936
|
z3.object({
|
|
937
|
+
id: z3.string().uuid(),
|
|
921
938
|
issueType: z3.string(),
|
|
922
939
|
issueLanguage: z3.string(),
|
|
923
940
|
parsedSeverity: ParsedSeverityZ
|
|
@@ -978,6 +995,7 @@ var ReportQueryResultZ = z3.object({
|
|
|
978
995
|
})
|
|
979
996
|
}),
|
|
980
997
|
vulnerabilityReportIssues: z3.object({
|
|
998
|
+
id: z3.string().uuid(),
|
|
981
999
|
extraData: z3.object({
|
|
982
1000
|
missing_files: z3.string().array().nullish(),
|
|
983
1001
|
large_files: z3.string().array().nullish(),
|
|
@@ -987,31 +1005,29 @@ var ReportQueryResultZ = z3.object({
|
|
|
987
1005
|
})
|
|
988
1006
|
})
|
|
989
1007
|
});
|
|
990
|
-
var
|
|
991
|
-
z3.
|
|
992
|
-
|
|
993
|
-
|
|
994
|
-
|
|
995
|
-
|
|
996
|
-
|
|
997
|
-
|
|
998
|
-
|
|
999
|
-
|
|
1000
|
-
|
|
1001
|
-
z3.
|
|
1002
|
-
|
|
1003
|
-
|
|
1004
|
-
|
|
1005
|
-
|
|
1006
|
-
|
|
1007
|
-
z3.
|
|
1008
|
-
|
|
1009
|
-
|
|
1010
|
-
|
|
1011
|
-
|
|
1012
|
-
|
|
1013
|
-
})
|
|
1014
|
-
);
|
|
1008
|
+
var ReportFixesQueryFixZ = z3.object({
|
|
1009
|
+
id: z3.string().uuid(),
|
|
1010
|
+
sharedState: FixSharedStateZ,
|
|
1011
|
+
confidence: z3.number(),
|
|
1012
|
+
gitBlameLogin: z3.string().nullable(),
|
|
1013
|
+
effortToApplyFix: z3.nativeEnum(Effort_To_Apply_Fix_Enum).nullable(),
|
|
1014
|
+
safeIssueLanguage: z3.string(),
|
|
1015
|
+
safeIssueType: z3.string(),
|
|
1016
|
+
fixReportId: z3.string().uuid(),
|
|
1017
|
+
filePaths: z3.array(
|
|
1018
|
+
z3.object({
|
|
1019
|
+
fileRepoRelativePath: z3.string()
|
|
1020
|
+
})
|
|
1021
|
+
),
|
|
1022
|
+
numberOfVulnerabilityIssues: z3.number(),
|
|
1023
|
+
vulnerabilityReportIssues: z3.array(
|
|
1024
|
+
z3.object({
|
|
1025
|
+
issueType: z3.string(),
|
|
1026
|
+
issueLanguage: z3.string(),
|
|
1027
|
+
parsedSeverity: ParsedSeverityZ
|
|
1028
|
+
})
|
|
1029
|
+
).min(1)
|
|
1030
|
+
});
|
|
1015
1031
|
var ExtraContextInternalZ = z3.object({
|
|
1016
1032
|
key: z3.string(),
|
|
1017
1033
|
value: z3.string().or(z3.boolean()).or(
|
|
@@ -1084,6 +1100,45 @@ var FixQueryZ = z3.object({
|
|
|
1084
1100
|
patchAndQuestions: PatchAndQuestionsZ,
|
|
1085
1101
|
effortToApplyFix: z3.nativeEnum(Effort_To_Apply_Fix_Enum).nullable()
|
|
1086
1102
|
});
|
|
1103
|
+
var GetReportIssuesQueryZ = z3.object({
|
|
1104
|
+
fixReport: z3.object({
|
|
1105
|
+
vulnerabilityReport: z3.object({
|
|
1106
|
+
id: z3.string().uuid(),
|
|
1107
|
+
lastIssueUpdatedAt: z3.string(),
|
|
1108
|
+
vulnerabilityReportIssues_aggregate: z3.object({
|
|
1109
|
+
aggregate: z3.object({ count: z3.number() })
|
|
1110
|
+
}),
|
|
1111
|
+
vulnerabilityReportIssues: z3.array(
|
|
1112
|
+
z3.object({
|
|
1113
|
+
id: z3.string().uuid(),
|
|
1114
|
+
createdAt: z3.string(),
|
|
1115
|
+
issueType: z3.string(),
|
|
1116
|
+
issueLanguage: z3.string(),
|
|
1117
|
+
state: z3.nativeEnum(Vulnerability_Report_Issue_State_Enum),
|
|
1118
|
+
extraData: z3.object({
|
|
1119
|
+
missing_files: z3.string().array().nullish(),
|
|
1120
|
+
large_files: z3.string().array().nullish(),
|
|
1121
|
+
error_files: z3.string().array().nullish()
|
|
1122
|
+
}),
|
|
1123
|
+
fix: ReportFixesQueryFixZ.nullable(),
|
|
1124
|
+
falsePositive: z3.object({
|
|
1125
|
+
id: z3.string().uuid()
|
|
1126
|
+
}).nullable(),
|
|
1127
|
+
parsedIssueType: z3.nativeEnum(IssueType_Enum),
|
|
1128
|
+
parsedIssueLanguage: z3.nativeEnum(IssueLanguage_Enum),
|
|
1129
|
+
parsedSeverity: z3.nativeEnum(Vulnerability_Severity_Enum),
|
|
1130
|
+
severity: z3.string(),
|
|
1131
|
+
severityValue: z3.number(),
|
|
1132
|
+
vulnerabilityReportIssueTags: z3.array(
|
|
1133
|
+
z3.object({
|
|
1134
|
+
vulnerability_report_issue_tag_value: z3.string()
|
|
1135
|
+
})
|
|
1136
|
+
)
|
|
1137
|
+
})
|
|
1138
|
+
)
|
|
1139
|
+
})
|
|
1140
|
+
}).array()
|
|
1141
|
+
}).nullish();
|
|
1087
1142
|
var FixScreenQueryResultZ = z3.object({
|
|
1088
1143
|
fixReport_by_pk: z3.object({
|
|
1089
1144
|
id: z3.string().uuid(),
|
|
@@ -1178,14 +1233,34 @@ var FixPageQueryZ = z3.object({
|
|
|
1178
1233
|
data: FixScreenQueryResultZ
|
|
1179
1234
|
});
|
|
1180
1235
|
var GetReportFixesQueryZ = z3.object({
|
|
1181
|
-
fixReport: z3.
|
|
1182
|
-
|
|
1183
|
-
|
|
1184
|
-
|
|
1236
|
+
fixReport: z3.array(
|
|
1237
|
+
z3.object({
|
|
1238
|
+
fixes: z3.array(ReportFixesQueryFixZ),
|
|
1239
|
+
fixes_aggregate: z3.object({
|
|
1185
1240
|
aggregate: z3.object({ count: z3.number() })
|
|
1241
|
+
}),
|
|
1242
|
+
vulnerabilityReportIssuesTotalCount: z3.object({
|
|
1243
|
+
vulnerabilityReportIssues_aggregate: z3.object({
|
|
1244
|
+
aggregate: z3.object({ count: z3.number() })
|
|
1245
|
+
})
|
|
1246
|
+
}),
|
|
1247
|
+
vulnerabilityReportIssuesFixedCount: z3.object({
|
|
1248
|
+
vulnerabilityReportIssues_aggregate: z3.object({
|
|
1249
|
+
aggregate: z3.object({ count: z3.number() })
|
|
1250
|
+
})
|
|
1251
|
+
}),
|
|
1252
|
+
vulnerabilityReportIssuesIrrelevantCount: z3.object({
|
|
1253
|
+
vulnerabilityReportIssues_aggregate: z3.object({
|
|
1254
|
+
aggregate: z3.object({ count: z3.number() })
|
|
1255
|
+
})
|
|
1256
|
+
}),
|
|
1257
|
+
vulnerabilityReportIssuesRemainingCount: z3.object({
|
|
1258
|
+
vulnerabilityReportIssues_aggregate: z3.object({
|
|
1259
|
+
aggregate: z3.object({ count: z3.number() })
|
|
1260
|
+
})
|
|
1186
1261
|
})
|
|
1187
1262
|
})
|
|
1188
|
-
|
|
1263
|
+
)
|
|
1189
1264
|
}).nullish();
|
|
1190
1265
|
var ProjectVulnerabilityReport = z3.object({
|
|
1191
1266
|
id: z3.string().uuid(),
|
|
@@ -1850,6 +1925,10 @@ var vulnerabilities = {
|
|
|
1850
1925
|
};
|
|
1851
1926
|
var csharp_default = vulnerabilities;
|
|
1852
1927
|
|
|
1928
|
+
// src/features/analysis/scm/shared/src/storedFixData/go/index.ts
|
|
1929
|
+
var vulnerabilities2 = {};
|
|
1930
|
+
var go_default = vulnerabilities2;
|
|
1931
|
+
|
|
1853
1932
|
// src/features/analysis/scm/shared/src/storedFixData/java/sqlInjection.ts
|
|
1854
1933
|
var sqlInjection = {
|
|
1855
1934
|
guidance: ({
|
|
@@ -1875,12 +1954,12 @@ var systemInformationLeak = {
|
|
|
1875
1954
|
};
|
|
1876
1955
|
|
|
1877
1956
|
// src/features/analysis/scm/shared/src/storedFixData/java/index.ts
|
|
1878
|
-
var
|
|
1957
|
+
var vulnerabilities3 = {
|
|
1879
1958
|
["PASSWORD_IN_COMMENT" /* PasswordInComment */]: passwordInComment,
|
|
1880
1959
|
["SQL_Injection" /* SqlInjection */]: sqlInjection,
|
|
1881
1960
|
["SYSTEM_INFORMATION_LEAK" /* SystemInformationLeak */]: systemInformationLeak
|
|
1882
1961
|
};
|
|
1883
|
-
var java_default =
|
|
1962
|
+
var java_default = vulnerabilities3;
|
|
1884
1963
|
|
|
1885
1964
|
// src/features/analysis/scm/shared/src/storedFixData/python/csrf.ts
|
|
1886
1965
|
var csrf = {
|
|
@@ -1923,18 +2002,18 @@ var ssrf = {
|
|
|
1923
2002
|
};
|
|
1924
2003
|
|
|
1925
2004
|
// src/features/analysis/scm/shared/src/storedFixData/javascript/index.ts
|
|
1926
|
-
var
|
|
2005
|
+
var vulnerabilities4 = {
|
|
1927
2006
|
["SSRF" /* Ssrf */]: ssrf,
|
|
1928
2007
|
["HARDCODED_SECRETS" /* HardcodedSecrets */]: hardcodedSecrets,
|
|
1929
2008
|
["PASSWORD_IN_COMMENT" /* PasswordInComment */]: passwordInComment,
|
|
1930
2009
|
["NO_LIMITS_OR_THROTTLING" /* NoLimitsOrThrottling */]: noLimitsOrThrottling,
|
|
1931
2010
|
["CSRF" /* Csrf */]: csrf
|
|
1932
2011
|
};
|
|
1933
|
-
var javascript_default =
|
|
2012
|
+
var javascript_default = vulnerabilities4;
|
|
1934
2013
|
|
|
1935
2014
|
// src/features/analysis/scm/shared/src/storedFixData/php/index.ts
|
|
1936
|
-
var
|
|
1937
|
-
var php_default =
|
|
2015
|
+
var vulnerabilities5 = {};
|
|
2016
|
+
var php_default = vulnerabilities5;
|
|
1938
2017
|
|
|
1939
2018
|
// src/features/analysis/scm/shared/src/storedFixData/python/autoEscapeFalse.ts
|
|
1940
2019
|
var autoEscapeFalse = {
|
|
@@ -1956,11 +2035,11 @@ See more information [here](https://jinja.palletsprojects.com/en/3.1.x/templates
|
|
|
1956
2035
|
};
|
|
1957
2036
|
|
|
1958
2037
|
// src/features/analysis/scm/shared/src/storedFixData/python/index.ts
|
|
1959
|
-
var
|
|
2038
|
+
var vulnerabilities6 = {
|
|
1960
2039
|
["AUTO_ESCAPE_FALSE" /* AutoEscapeFalse */]: autoEscapeFalse,
|
|
1961
2040
|
["CSRF" /* Csrf */]: csrf
|
|
1962
2041
|
};
|
|
1963
|
-
var python_default =
|
|
2042
|
+
var python_default = vulnerabilities6;
|
|
1964
2043
|
|
|
1965
2044
|
// src/features/analysis/scm/shared/src/storedFixData/sql/defaultRightsInObjDefinition.ts
|
|
1966
2045
|
var defaultRightsInObjDefinition = {
|
|
@@ -1968,16 +2047,16 @@ var defaultRightsInObjDefinition = {
|
|
|
1968
2047
|
};
|
|
1969
2048
|
|
|
1970
2049
|
// src/features/analysis/scm/shared/src/storedFixData/sql/index.ts
|
|
1971
|
-
var
|
|
2050
|
+
var vulnerabilities7 = {
|
|
1972
2051
|
["DEFAULT_RIGHTS_IN_OBJ_DEFINITION" /* DefaultRightsInObjDefinition */]: defaultRightsInObjDefinition
|
|
1973
2052
|
};
|
|
1974
|
-
var sql_default =
|
|
2053
|
+
var sql_default = vulnerabilities7;
|
|
1975
2054
|
|
|
1976
2055
|
// src/features/analysis/scm/shared/src/storedFixData/xml/index.ts
|
|
1977
|
-
var
|
|
2056
|
+
var vulnerabilities8 = {
|
|
1978
2057
|
["PASSWORD_IN_COMMENT" /* PasswordInComment */]: passwordInComment
|
|
1979
2058
|
};
|
|
1980
|
-
var xml_default =
|
|
2059
|
+
var xml_default = vulnerabilities8;
|
|
1981
2060
|
|
|
1982
2061
|
// src/features/analysis/scm/shared/src/storedFixData/index.ts
|
|
1983
2062
|
var StoredFixDataItemZ = z6.object({
|
|
@@ -1990,7 +2069,8 @@ var languages = {
|
|
|
1990
2069
|
["SQL" /* Sql */]: sql_default,
|
|
1991
2070
|
["XML" /* Xml */]: xml_default,
|
|
1992
2071
|
["Python" /* Python */]: python_default,
|
|
1993
|
-
["PHP" /* Php */]: php_default
|
|
2072
|
+
["PHP" /* Php */]: php_default,
|
|
2073
|
+
["Go" /* Go */]: go_default
|
|
1994
2074
|
};
|
|
1995
2075
|
|
|
1996
2076
|
// src/features/analysis/scm/shared/src/storedQuestionData/index.ts
|
|
@@ -2280,7 +2360,7 @@ var xxe = {
|
|
|
2280
2360
|
};
|
|
2281
2361
|
|
|
2282
2362
|
// src/features/analysis/scm/shared/src/storedQuestionData/csharp/index.ts
|
|
2283
|
-
var
|
|
2363
|
+
var vulnerabilities9 = {
|
|
2284
2364
|
["LOG_FORGING" /* LogForging */]: logForging,
|
|
2285
2365
|
["SSRF" /* Ssrf */]: ssrf2,
|
|
2286
2366
|
["XXE" /* Xxe */]: xxe,
|
|
@@ -2300,7 +2380,22 @@ var vulnerabilities8 = {
|
|
|
2300
2380
|
["INSUFFICIENT_LOGGING" /* InsufficientLogging */]: insufficientLogging,
|
|
2301
2381
|
["SQL_Injection" /* SqlInjection */]: sqlInjection2
|
|
2302
2382
|
};
|
|
2303
|
-
var csharp_default2 =
|
|
2383
|
+
var csharp_default2 = vulnerabilities9;
|
|
2384
|
+
|
|
2385
|
+
// src/features/analysis/scm/shared/src/storedQuestionData/go/logForging.ts
|
|
2386
|
+
var logForging2 = {
|
|
2387
|
+
isHtmlDisplay: {
|
|
2388
|
+
content: () => "Is the text written to the log going to be displayed as HTML?",
|
|
2389
|
+
description: () => "",
|
|
2390
|
+
guidance: () => ""
|
|
2391
|
+
}
|
|
2392
|
+
};
|
|
2393
|
+
|
|
2394
|
+
// src/features/analysis/scm/shared/src/storedQuestionData/go/index.ts
|
|
2395
|
+
var vulnerabilities10 = {
|
|
2396
|
+
["LOG_FORGING" /* LogForging */]: logForging2
|
|
2397
|
+
};
|
|
2398
|
+
var go_default2 = vulnerabilities10;
|
|
2304
2399
|
|
|
2305
2400
|
// src/features/analysis/scm/shared/src/storedQuestionData/java/commandInjection.ts
|
|
2306
2401
|
var commandInjection = {
|
|
@@ -2472,7 +2567,7 @@ var localeDependentComparison = {
|
|
|
2472
2567
|
};
|
|
2473
2568
|
|
|
2474
2569
|
// src/features/analysis/scm/shared/src/storedQuestionData/java/logForging.ts
|
|
2475
|
-
var
|
|
2570
|
+
var logForging3 = {
|
|
2476
2571
|
isHtmlDisplay: {
|
|
2477
2572
|
content: () => "Is the text written to the log going to be displayed as HTML?",
|
|
2478
2573
|
description: () => "",
|
|
@@ -2736,7 +2831,7 @@ var xxe2 = {
|
|
|
2736
2831
|
};
|
|
2737
2832
|
|
|
2738
2833
|
// src/features/analysis/scm/shared/src/storedQuestionData/java/index.ts
|
|
2739
|
-
var
|
|
2834
|
+
var vulnerabilities11 = {
|
|
2740
2835
|
["SQL_Injection" /* SqlInjection */]: sqlInjection3,
|
|
2741
2836
|
["CMDi_relative_path_command" /* CmDiRelativePathCommand */]: relativePathCommand,
|
|
2742
2837
|
["CMDi" /* CmDi */]: commandInjection,
|
|
@@ -2747,7 +2842,7 @@ var vulnerabilities9 = {
|
|
|
2747
2842
|
["PRIVACY_VIOLATION" /* PrivacyViolation */]: privacyViolation,
|
|
2748
2843
|
["PT" /* Pt */]: pt2,
|
|
2749
2844
|
["SSRF" /* Ssrf */]: ssrf3,
|
|
2750
|
-
["LOG_FORGING" /* LogForging */]:
|
|
2845
|
+
["LOG_FORGING" /* LogForging */]: logForging3,
|
|
2751
2846
|
["LOCALE_DEPENDENT_COMPARISON" /* LocaleDependentComparison */]: localeDependentComparison,
|
|
2752
2847
|
["MISSING_CHECK_AGAINST_NULL" /* MissingCheckAgainstNull */]: missingCheckAgainstNull,
|
|
2753
2848
|
["OVERLY_BROAD_CATCH" /* OverlyBroadCatch */]: overlyBroadCatch2,
|
|
@@ -2760,7 +2855,7 @@ var vulnerabilities9 = {
|
|
|
2760
2855
|
["LEFTOVER_DEBUG_CODE" /* LeftoverDebugCode */]: leftoverDebugCode,
|
|
2761
2856
|
["ERRONEOUS_STRING_COMPARE" /* ErroneousStringCompare */]: erroneousStringCompare
|
|
2762
2857
|
};
|
|
2763
|
-
var java_default2 =
|
|
2858
|
+
var java_default2 = vulnerabilities11;
|
|
2764
2859
|
|
|
2765
2860
|
// src/features/analysis/scm/shared/src/storedQuestionData/python/csrf.ts
|
|
2766
2861
|
var csrf2 = {
|
|
@@ -2871,7 +2966,7 @@ var insecureRandomness2 = {
|
|
|
2871
2966
|
};
|
|
2872
2967
|
|
|
2873
2968
|
// src/features/analysis/scm/shared/src/storedQuestionData/js/logForging.ts
|
|
2874
|
-
var
|
|
2969
|
+
var logForging4 = {
|
|
2875
2970
|
isHtmlDisplay: {
|
|
2876
2971
|
content: () => "Is the text written to the log going to be displayed as HTML?",
|
|
2877
2972
|
description: () => "",
|
|
@@ -3058,14 +3153,14 @@ var xss3 = {
|
|
|
3058
3153
|
};
|
|
3059
3154
|
|
|
3060
3155
|
// src/features/analysis/scm/shared/src/storedQuestionData/js/index.ts
|
|
3061
|
-
var
|
|
3156
|
+
var vulnerabilities12 = {
|
|
3062
3157
|
["CMDi" /* CmDi */]: commandInjection2,
|
|
3063
3158
|
["GRAPHQL_DEPTH_LIMIT" /* GraphqlDepthLimit */]: graphqlDepthLimit,
|
|
3064
3159
|
["INSECURE_RANDOMNESS" /* InsecureRandomness */]: insecureRandomness2,
|
|
3065
3160
|
["SSRF" /* Ssrf */]: ssrf4,
|
|
3066
3161
|
["TYPE_CONFUSION" /* TypeConfusion */]: typeConfusion,
|
|
3067
3162
|
["INCOMPLETE_URL_SANITIZATION" /* IncompleteUrlSanitization */]: incompleteUrlSanitization,
|
|
3068
|
-
["LOG_FORGING" /* LogForging */]:
|
|
3163
|
+
["LOG_FORGING" /* LogForging */]: logForging4,
|
|
3069
3164
|
["XSS" /* Xss */]: xss3,
|
|
3070
3165
|
["OPEN_REDIRECT" /* OpenRedirect */]: openRedirect,
|
|
3071
3166
|
["SYSTEM_INFORMATION_LEAK" /* SystemInformationLeak */]: sysLeak3,
|
|
@@ -3080,10 +3175,10 @@ var vulnerabilities10 = {
|
|
|
3080
3175
|
["HARDCODED_DOMAIN_IN_HTML" /* HardcodedDomainInHtml */]: hardcodedDomainInHtml,
|
|
3081
3176
|
["CSRF" /* Csrf */]: csrf2
|
|
3082
3177
|
};
|
|
3083
|
-
var js_default =
|
|
3178
|
+
var js_default = vulnerabilities12;
|
|
3084
3179
|
|
|
3085
3180
|
// src/features/analysis/scm/shared/src/storedQuestionData/python/logForging.ts
|
|
3086
|
-
var
|
|
3181
|
+
var logForging5 = {
|
|
3087
3182
|
isHtmlDisplay: {
|
|
3088
3183
|
content: () => "Is the text written to the log going to be displayed as HTML?",
|
|
3089
3184
|
description: () => "",
|
|
@@ -3108,12 +3203,12 @@ var openRedirect2 = {
|
|
|
3108
3203
|
};
|
|
3109
3204
|
|
|
3110
3205
|
// src/features/analysis/scm/shared/src/storedQuestionData/python/index.ts
|
|
3111
|
-
var
|
|
3206
|
+
var vulnerabilities13 = {
|
|
3112
3207
|
["CSRF" /* Csrf */]: csrf2,
|
|
3113
|
-
["LOG_FORGING" /* LogForging */]:
|
|
3208
|
+
["LOG_FORGING" /* LogForging */]: logForging5,
|
|
3114
3209
|
["LOG_FORGING" /* LogForging */]: openRedirect2
|
|
3115
3210
|
};
|
|
3116
|
-
var python_default2 =
|
|
3211
|
+
var python_default2 = vulnerabilities13;
|
|
3117
3212
|
|
|
3118
3213
|
// src/features/analysis/scm/shared/src/storedQuestionData/xml/unboundedOccurrences.ts
|
|
3119
3214
|
var unboundedOccurrences = {
|
|
@@ -3127,10 +3222,10 @@ A value too high will cause performance issues up to and including denial of ser
|
|
|
3127
3222
|
};
|
|
3128
3223
|
|
|
3129
3224
|
// src/features/analysis/scm/shared/src/storedQuestionData/xml/index.ts
|
|
3130
|
-
var
|
|
3225
|
+
var vulnerabilities14 = {
|
|
3131
3226
|
["WEAK_XML_SCHEMA_UNBOUNDED_OCCURRENCES" /* WeakXmlSchemaUnboundedOccurrences */]: unboundedOccurrences
|
|
3132
3227
|
};
|
|
3133
|
-
var xml_default2 =
|
|
3228
|
+
var xml_default2 = vulnerabilities14;
|
|
3134
3229
|
|
|
3135
3230
|
// src/features/analysis/scm/shared/src/storedQuestionData/index.ts
|
|
3136
3231
|
var StoredQuestionDataItemZ = z7.object({
|
|
@@ -3143,7 +3238,8 @@ var languages2 = {
|
|
|
3143
3238
|
["JavaScript" /* JavaScript */]: js_default,
|
|
3144
3239
|
["XML" /* Xml */]: xml_default2,
|
|
3145
3240
|
["CSharp" /* CSharp */]: csharp_default2,
|
|
3146
|
-
["Python" /* Python */]: python_default2
|
|
3241
|
+
["Python" /* Python */]: python_default2,
|
|
3242
|
+
["Go" /* Go */]: go_default2
|
|
3147
3243
|
};
|
|
3148
3244
|
var storedQuestionData_default = languages2;
|
|
3149
3245
|
|