mobbdev 1.0.23 → 1.0.25

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/dist/index.mjs +156 -60
  2. package/package.json +1 -1
package/dist/index.mjs CHANGED
@@ -49,6 +49,7 @@ var FixQuestionInputType = /* @__PURE__ */ ((FixQuestionInputType2) => {
49
49
  var Language = /* @__PURE__ */ ((Language2) => {
50
50
  Language2["Cpp"] = "CPP";
51
51
  Language2["Csharp"] = "CSHARP";
52
+ Language2["Go"] = "GO";
52
53
  Language2["Java"] = "JAVA";
53
54
  Language2["Js"] = "JS";
54
55
  Language2["Php"] = "PHP";
@@ -99,6 +100,7 @@ var Fix_State_Enum = /* @__PURE__ */ ((Fix_State_Enum2) => {
99
100
  var IssueLanguage_Enum = /* @__PURE__ */ ((IssueLanguage_Enum2) => {
100
101
  IssueLanguage_Enum2["CSharp"] = "CSharp";
101
102
  IssueLanguage_Enum2["Cpp"] = "Cpp";
103
+ IssueLanguage_Enum2["Go"] = "Go";
102
104
  IssueLanguage_Enum2["Java"] = "Java";
103
105
  IssueLanguage_Enum2["JavaScript"] = "JavaScript";
104
106
  IssueLanguage_Enum2["Php"] = "PHP";
@@ -203,6 +205,18 @@ var Project_Role_Type_Enum = /* @__PURE__ */ ((Project_Role_Type_Enum2) => {
203
205
  Project_Role_Type_Enum2["Writer"] = "writer";
204
206
  return Project_Role_Type_Enum2;
205
207
  })(Project_Role_Type_Enum || {});
208
+ var Vulnerability_Report_Issue_State_Enum = /* @__PURE__ */ ((Vulnerability_Report_Issue_State_Enum2) => {
209
+ Vulnerability_Report_Issue_State_Enum2["Digested"] = "Digested";
210
+ Vulnerability_Report_Issue_State_Enum2["Error"] = "Error";
211
+ Vulnerability_Report_Issue_State_Enum2["FalsePositive"] = "FalsePositive";
212
+ Vulnerability_Report_Issue_State_Enum2["Filtered"] = "Filtered";
213
+ Vulnerability_Report_Issue_State_Enum2["FilteredAiQuota"] = "FilteredAiQuota";
214
+ Vulnerability_Report_Issue_State_Enum2["Fixed"] = "Fixed";
215
+ Vulnerability_Report_Issue_State_Enum2["NoFix"] = "NoFix";
216
+ Vulnerability_Report_Issue_State_Enum2["Pending"] = "Pending";
217
+ Vulnerability_Report_Issue_State_Enum2["Unsupported"] = "Unsupported";
218
+ return Vulnerability_Report_Issue_State_Enum2;
219
+ })(Vulnerability_Report_Issue_State_Enum || {});
206
220
  var Vulnerability_Report_Vendor_Enum = /* @__PURE__ */ ((Vulnerability_Report_Vendor_Enum3) => {
207
221
  Vulnerability_Report_Vendor_Enum3["Checkmarx"] = "checkmarx";
208
222
  Vulnerability_Report_Vendor_Enum3["CheckmarxXml"] = "checkmarxXml";
@@ -886,6 +900,8 @@ var ReportQueryResultZ = z3.object({
886
900
  fixesDownloaded: z3.object({
887
901
  aggregate: z3.object({ count: z3.number() })
888
902
  }),
903
+ fixesDoneCount: z3.number(),
904
+ fixesInprogressCount: z3.number(),
889
905
  fixesReadyCount: z3.number(),
890
906
  issueTypes: z3.record(z3.string(), z3.number()).nullable(),
891
907
  issueLanguages: z3.record(z3.string(), z3.number()).nullable(),
@@ -918,6 +934,7 @@ var ReportQueryResultZ = z3.object({
918
934
  numberOfVulnerabilityIssues: z3.number(),
919
935
  vulnerabilityReportIssues: z3.array(
920
936
  z3.object({
937
+ id: z3.string().uuid(),
921
938
  issueType: z3.string(),
922
939
  issueLanguage: z3.string(),
923
940
  parsedSeverity: ParsedSeverityZ
@@ -978,6 +995,7 @@ var ReportQueryResultZ = z3.object({
978
995
  })
979
996
  }),
980
997
  vulnerabilityReportIssues: z3.object({
998
+ id: z3.string().uuid(),
981
999
  extraData: z3.object({
982
1000
  missing_files: z3.string().array().nullish(),
983
1001
  large_files: z3.string().array().nullish(),
@@ -987,31 +1005,29 @@ var ReportQueryResultZ = z3.object({
987
1005
  })
988
1006
  })
989
1007
  });
990
- var ReportFixesQueryZ = z3.array(
991
- z3.object({
992
- id: z3.string().uuid(),
993
- sharedState: FixSharedStateZ,
994
- confidence: z3.number(),
995
- gitBlameLogin: z3.string().nullable(),
996
- effortToApplyFix: z3.nativeEnum(Effort_To_Apply_Fix_Enum).nullable(),
997
- safeIssueLanguage: z3.string(),
998
- safeIssueType: z3.string(),
999
- fixReportId: z3.string().uuid(),
1000
- filePaths: z3.array(
1001
- z3.object({
1002
- fileRepoRelativePath: z3.string()
1003
- })
1004
- ),
1005
- numberOfVulnerabilityIssues: z3.number(),
1006
- vulnerabilityReportIssues: z3.array(
1007
- z3.object({
1008
- issueType: z3.string(),
1009
- issueLanguage: z3.string(),
1010
- parsedSeverity: ParsedSeverityZ
1011
- })
1012
- ).min(1)
1013
- })
1014
- );
1008
+ var ReportFixesQueryFixZ = z3.object({
1009
+ id: z3.string().uuid(),
1010
+ sharedState: FixSharedStateZ,
1011
+ confidence: z3.number(),
1012
+ gitBlameLogin: z3.string().nullable(),
1013
+ effortToApplyFix: z3.nativeEnum(Effort_To_Apply_Fix_Enum).nullable(),
1014
+ safeIssueLanguage: z3.string(),
1015
+ safeIssueType: z3.string(),
1016
+ fixReportId: z3.string().uuid(),
1017
+ filePaths: z3.array(
1018
+ z3.object({
1019
+ fileRepoRelativePath: z3.string()
1020
+ })
1021
+ ),
1022
+ numberOfVulnerabilityIssues: z3.number(),
1023
+ vulnerabilityReportIssues: z3.array(
1024
+ z3.object({
1025
+ issueType: z3.string(),
1026
+ issueLanguage: z3.string(),
1027
+ parsedSeverity: ParsedSeverityZ
1028
+ })
1029
+ ).min(1)
1030
+ });
1015
1031
  var ExtraContextInternalZ = z3.object({
1016
1032
  key: z3.string(),
1017
1033
  value: z3.string().or(z3.boolean()).or(
@@ -1084,6 +1100,45 @@ var FixQueryZ = z3.object({
1084
1100
  patchAndQuestions: PatchAndQuestionsZ,
1085
1101
  effortToApplyFix: z3.nativeEnum(Effort_To_Apply_Fix_Enum).nullable()
1086
1102
  });
1103
+ var GetReportIssuesQueryZ = z3.object({
1104
+ fixReport: z3.object({
1105
+ vulnerabilityReport: z3.object({
1106
+ id: z3.string().uuid(),
1107
+ lastIssueUpdatedAt: z3.string(),
1108
+ vulnerabilityReportIssues_aggregate: z3.object({
1109
+ aggregate: z3.object({ count: z3.number() })
1110
+ }),
1111
+ vulnerabilityReportIssues: z3.array(
1112
+ z3.object({
1113
+ id: z3.string().uuid(),
1114
+ createdAt: z3.string(),
1115
+ issueType: z3.string(),
1116
+ issueLanguage: z3.string(),
1117
+ state: z3.nativeEnum(Vulnerability_Report_Issue_State_Enum),
1118
+ extraData: z3.object({
1119
+ missing_files: z3.string().array().nullish(),
1120
+ large_files: z3.string().array().nullish(),
1121
+ error_files: z3.string().array().nullish()
1122
+ }),
1123
+ fix: ReportFixesQueryFixZ.nullable(),
1124
+ falsePositive: z3.object({
1125
+ id: z3.string().uuid()
1126
+ }).nullable(),
1127
+ parsedIssueType: z3.nativeEnum(IssueType_Enum),
1128
+ parsedIssueLanguage: z3.nativeEnum(IssueLanguage_Enum),
1129
+ parsedSeverity: z3.nativeEnum(Vulnerability_Severity_Enum),
1130
+ severity: z3.string(),
1131
+ severityValue: z3.number(),
1132
+ vulnerabilityReportIssueTags: z3.array(
1133
+ z3.object({
1134
+ vulnerability_report_issue_tag_value: z3.string()
1135
+ })
1136
+ )
1137
+ })
1138
+ )
1139
+ })
1140
+ }).array()
1141
+ }).nullish();
1087
1142
  var FixScreenQueryResultZ = z3.object({
1088
1143
  fixReport_by_pk: z3.object({
1089
1144
  id: z3.string().uuid(),
@@ -1178,14 +1233,34 @@ var FixPageQueryZ = z3.object({
1178
1233
  data: FixScreenQueryResultZ
1179
1234
  });
1180
1235
  var GetReportFixesQueryZ = z3.object({
1181
- fixReport: z3.object({
1182
- fixes: ReportFixesQueryZ,
1183
- vulnerabilityReport: z3.object({
1184
- vulnerabilityReportIssues_aggregate: z3.object({
1236
+ fixReport: z3.array(
1237
+ z3.object({
1238
+ fixes: z3.array(ReportFixesQueryFixZ),
1239
+ fixes_aggregate: z3.object({
1185
1240
  aggregate: z3.object({ count: z3.number() })
1241
+ }),
1242
+ vulnerabilityReportIssuesTotalCount: z3.object({
1243
+ vulnerabilityReportIssues_aggregate: z3.object({
1244
+ aggregate: z3.object({ count: z3.number() })
1245
+ })
1246
+ }),
1247
+ vulnerabilityReportIssuesFixedCount: z3.object({
1248
+ vulnerabilityReportIssues_aggregate: z3.object({
1249
+ aggregate: z3.object({ count: z3.number() })
1250
+ })
1251
+ }),
1252
+ vulnerabilityReportIssuesIrrelevantCount: z3.object({
1253
+ vulnerabilityReportIssues_aggregate: z3.object({
1254
+ aggregate: z3.object({ count: z3.number() })
1255
+ })
1256
+ }),
1257
+ vulnerabilityReportIssuesRemainingCount: z3.object({
1258
+ vulnerabilityReportIssues_aggregate: z3.object({
1259
+ aggregate: z3.object({ count: z3.number() })
1260
+ })
1186
1261
  })
1187
1262
  })
1188
- }).array()
1263
+ )
1189
1264
  }).nullish();
1190
1265
  var ProjectVulnerabilityReport = z3.object({
1191
1266
  id: z3.string().uuid(),
@@ -1850,6 +1925,10 @@ var vulnerabilities = {
1850
1925
  };
1851
1926
  var csharp_default = vulnerabilities;
1852
1927
 
1928
+ // src/features/analysis/scm/shared/src/storedFixData/go/index.ts
1929
+ var vulnerabilities2 = {};
1930
+ var go_default = vulnerabilities2;
1931
+
1853
1932
  // src/features/analysis/scm/shared/src/storedFixData/java/sqlInjection.ts
1854
1933
  var sqlInjection = {
1855
1934
  guidance: ({
@@ -1875,12 +1954,12 @@ var systemInformationLeak = {
1875
1954
  };
1876
1955
 
1877
1956
  // src/features/analysis/scm/shared/src/storedFixData/java/index.ts
1878
- var vulnerabilities2 = {
1957
+ var vulnerabilities3 = {
1879
1958
  ["PASSWORD_IN_COMMENT" /* PasswordInComment */]: passwordInComment,
1880
1959
  ["SQL_Injection" /* SqlInjection */]: sqlInjection,
1881
1960
  ["SYSTEM_INFORMATION_LEAK" /* SystemInformationLeak */]: systemInformationLeak
1882
1961
  };
1883
- var java_default = vulnerabilities2;
1962
+ var java_default = vulnerabilities3;
1884
1963
 
1885
1964
  // src/features/analysis/scm/shared/src/storedFixData/python/csrf.ts
1886
1965
  var csrf = {
@@ -1923,18 +2002,18 @@ var ssrf = {
1923
2002
  };
1924
2003
 
1925
2004
  // src/features/analysis/scm/shared/src/storedFixData/javascript/index.ts
1926
- var vulnerabilities3 = {
2005
+ var vulnerabilities4 = {
1927
2006
  ["SSRF" /* Ssrf */]: ssrf,
1928
2007
  ["HARDCODED_SECRETS" /* HardcodedSecrets */]: hardcodedSecrets,
1929
2008
  ["PASSWORD_IN_COMMENT" /* PasswordInComment */]: passwordInComment,
1930
2009
  ["NO_LIMITS_OR_THROTTLING" /* NoLimitsOrThrottling */]: noLimitsOrThrottling,
1931
2010
  ["CSRF" /* Csrf */]: csrf
1932
2011
  };
1933
- var javascript_default = vulnerabilities3;
2012
+ var javascript_default = vulnerabilities4;
1934
2013
 
1935
2014
  // src/features/analysis/scm/shared/src/storedFixData/php/index.ts
1936
- var vulnerabilities4 = {};
1937
- var php_default = vulnerabilities4;
2015
+ var vulnerabilities5 = {};
2016
+ var php_default = vulnerabilities5;
1938
2017
 
1939
2018
  // src/features/analysis/scm/shared/src/storedFixData/python/autoEscapeFalse.ts
1940
2019
  var autoEscapeFalse = {
@@ -1956,11 +2035,11 @@ See more information [here](https://jinja.palletsprojects.com/en/3.1.x/templates
1956
2035
  };
1957
2036
 
1958
2037
  // src/features/analysis/scm/shared/src/storedFixData/python/index.ts
1959
- var vulnerabilities5 = {
2038
+ var vulnerabilities6 = {
1960
2039
  ["AUTO_ESCAPE_FALSE" /* AutoEscapeFalse */]: autoEscapeFalse,
1961
2040
  ["CSRF" /* Csrf */]: csrf
1962
2041
  };
1963
- var python_default = vulnerabilities5;
2042
+ var python_default = vulnerabilities6;
1964
2043
 
1965
2044
  // src/features/analysis/scm/shared/src/storedFixData/sql/defaultRightsInObjDefinition.ts
1966
2045
  var defaultRightsInObjDefinition = {
@@ -1968,16 +2047,16 @@ var defaultRightsInObjDefinition = {
1968
2047
  };
1969
2048
 
1970
2049
  // src/features/analysis/scm/shared/src/storedFixData/sql/index.ts
1971
- var vulnerabilities6 = {
2050
+ var vulnerabilities7 = {
1972
2051
  ["DEFAULT_RIGHTS_IN_OBJ_DEFINITION" /* DefaultRightsInObjDefinition */]: defaultRightsInObjDefinition
1973
2052
  };
1974
- var sql_default = vulnerabilities6;
2053
+ var sql_default = vulnerabilities7;
1975
2054
 
1976
2055
  // src/features/analysis/scm/shared/src/storedFixData/xml/index.ts
1977
- var vulnerabilities7 = {
2056
+ var vulnerabilities8 = {
1978
2057
  ["PASSWORD_IN_COMMENT" /* PasswordInComment */]: passwordInComment
1979
2058
  };
1980
- var xml_default = vulnerabilities7;
2059
+ var xml_default = vulnerabilities8;
1981
2060
 
1982
2061
  // src/features/analysis/scm/shared/src/storedFixData/index.ts
1983
2062
  var StoredFixDataItemZ = z6.object({
@@ -1990,7 +2069,8 @@ var languages = {
1990
2069
  ["SQL" /* Sql */]: sql_default,
1991
2070
  ["XML" /* Xml */]: xml_default,
1992
2071
  ["Python" /* Python */]: python_default,
1993
- ["PHP" /* Php */]: php_default
2072
+ ["PHP" /* Php */]: php_default,
2073
+ ["Go" /* Go */]: go_default
1994
2074
  };
1995
2075
 
1996
2076
  // src/features/analysis/scm/shared/src/storedQuestionData/index.ts
@@ -2280,7 +2360,7 @@ var xxe = {
2280
2360
  };
2281
2361
 
2282
2362
  // src/features/analysis/scm/shared/src/storedQuestionData/csharp/index.ts
2283
- var vulnerabilities8 = {
2363
+ var vulnerabilities9 = {
2284
2364
  ["LOG_FORGING" /* LogForging */]: logForging,
2285
2365
  ["SSRF" /* Ssrf */]: ssrf2,
2286
2366
  ["XXE" /* Xxe */]: xxe,
@@ -2300,7 +2380,22 @@ var vulnerabilities8 = {
2300
2380
  ["INSUFFICIENT_LOGGING" /* InsufficientLogging */]: insufficientLogging,
2301
2381
  ["SQL_Injection" /* SqlInjection */]: sqlInjection2
2302
2382
  };
2303
- var csharp_default2 = vulnerabilities8;
2383
+ var csharp_default2 = vulnerabilities9;
2384
+
2385
+ // src/features/analysis/scm/shared/src/storedQuestionData/go/logForging.ts
2386
+ var logForging2 = {
2387
+ isHtmlDisplay: {
2388
+ content: () => "Is the text written to the log going to be displayed as HTML?",
2389
+ description: () => "",
2390
+ guidance: () => ""
2391
+ }
2392
+ };
2393
+
2394
+ // src/features/analysis/scm/shared/src/storedQuestionData/go/index.ts
2395
+ var vulnerabilities10 = {
2396
+ ["LOG_FORGING" /* LogForging */]: logForging2
2397
+ };
2398
+ var go_default2 = vulnerabilities10;
2304
2399
 
2305
2400
  // src/features/analysis/scm/shared/src/storedQuestionData/java/commandInjection.ts
2306
2401
  var commandInjection = {
@@ -2472,7 +2567,7 @@ var localeDependentComparison = {
2472
2567
  };
2473
2568
 
2474
2569
  // src/features/analysis/scm/shared/src/storedQuestionData/java/logForging.ts
2475
- var logForging2 = {
2570
+ var logForging3 = {
2476
2571
  isHtmlDisplay: {
2477
2572
  content: () => "Is the text written to the log going to be displayed as HTML?",
2478
2573
  description: () => "",
@@ -2736,7 +2831,7 @@ var xxe2 = {
2736
2831
  };
2737
2832
 
2738
2833
  // src/features/analysis/scm/shared/src/storedQuestionData/java/index.ts
2739
- var vulnerabilities9 = {
2834
+ var vulnerabilities11 = {
2740
2835
  ["SQL_Injection" /* SqlInjection */]: sqlInjection3,
2741
2836
  ["CMDi_relative_path_command" /* CmDiRelativePathCommand */]: relativePathCommand,
2742
2837
  ["CMDi" /* CmDi */]: commandInjection,
@@ -2747,7 +2842,7 @@ var vulnerabilities9 = {
2747
2842
  ["PRIVACY_VIOLATION" /* PrivacyViolation */]: privacyViolation,
2748
2843
  ["PT" /* Pt */]: pt2,
2749
2844
  ["SSRF" /* Ssrf */]: ssrf3,
2750
- ["LOG_FORGING" /* LogForging */]: logForging2,
2845
+ ["LOG_FORGING" /* LogForging */]: logForging3,
2751
2846
  ["LOCALE_DEPENDENT_COMPARISON" /* LocaleDependentComparison */]: localeDependentComparison,
2752
2847
  ["MISSING_CHECK_AGAINST_NULL" /* MissingCheckAgainstNull */]: missingCheckAgainstNull,
2753
2848
  ["OVERLY_BROAD_CATCH" /* OverlyBroadCatch */]: overlyBroadCatch2,
@@ -2760,7 +2855,7 @@ var vulnerabilities9 = {
2760
2855
  ["LEFTOVER_DEBUG_CODE" /* LeftoverDebugCode */]: leftoverDebugCode,
2761
2856
  ["ERRONEOUS_STRING_COMPARE" /* ErroneousStringCompare */]: erroneousStringCompare
2762
2857
  };
2763
- var java_default2 = vulnerabilities9;
2858
+ var java_default2 = vulnerabilities11;
2764
2859
 
2765
2860
  // src/features/analysis/scm/shared/src/storedQuestionData/python/csrf.ts
2766
2861
  var csrf2 = {
@@ -2871,7 +2966,7 @@ var insecureRandomness2 = {
2871
2966
  };
2872
2967
 
2873
2968
  // src/features/analysis/scm/shared/src/storedQuestionData/js/logForging.ts
2874
- var logForging3 = {
2969
+ var logForging4 = {
2875
2970
  isHtmlDisplay: {
2876
2971
  content: () => "Is the text written to the log going to be displayed as HTML?",
2877
2972
  description: () => "",
@@ -3058,14 +3153,14 @@ var xss3 = {
3058
3153
  };
3059
3154
 
3060
3155
  // src/features/analysis/scm/shared/src/storedQuestionData/js/index.ts
3061
- var vulnerabilities10 = {
3156
+ var vulnerabilities12 = {
3062
3157
  ["CMDi" /* CmDi */]: commandInjection2,
3063
3158
  ["GRAPHQL_DEPTH_LIMIT" /* GraphqlDepthLimit */]: graphqlDepthLimit,
3064
3159
  ["INSECURE_RANDOMNESS" /* InsecureRandomness */]: insecureRandomness2,
3065
3160
  ["SSRF" /* Ssrf */]: ssrf4,
3066
3161
  ["TYPE_CONFUSION" /* TypeConfusion */]: typeConfusion,
3067
3162
  ["INCOMPLETE_URL_SANITIZATION" /* IncompleteUrlSanitization */]: incompleteUrlSanitization,
3068
- ["LOG_FORGING" /* LogForging */]: logForging3,
3163
+ ["LOG_FORGING" /* LogForging */]: logForging4,
3069
3164
  ["XSS" /* Xss */]: xss3,
3070
3165
  ["OPEN_REDIRECT" /* OpenRedirect */]: openRedirect,
3071
3166
  ["SYSTEM_INFORMATION_LEAK" /* SystemInformationLeak */]: sysLeak3,
@@ -3080,10 +3175,10 @@ var vulnerabilities10 = {
3080
3175
  ["HARDCODED_DOMAIN_IN_HTML" /* HardcodedDomainInHtml */]: hardcodedDomainInHtml,
3081
3176
  ["CSRF" /* Csrf */]: csrf2
3082
3177
  };
3083
- var js_default = vulnerabilities10;
3178
+ var js_default = vulnerabilities12;
3084
3179
 
3085
3180
  // src/features/analysis/scm/shared/src/storedQuestionData/python/logForging.ts
3086
- var logForging4 = {
3181
+ var logForging5 = {
3087
3182
  isHtmlDisplay: {
3088
3183
  content: () => "Is the text written to the log going to be displayed as HTML?",
3089
3184
  description: () => "",
@@ -3108,12 +3203,12 @@ var openRedirect2 = {
3108
3203
  };
3109
3204
 
3110
3205
  // src/features/analysis/scm/shared/src/storedQuestionData/python/index.ts
3111
- var vulnerabilities11 = {
3206
+ var vulnerabilities13 = {
3112
3207
  ["CSRF" /* Csrf */]: csrf2,
3113
- ["LOG_FORGING" /* LogForging */]: logForging4,
3208
+ ["LOG_FORGING" /* LogForging */]: logForging5,
3114
3209
  ["LOG_FORGING" /* LogForging */]: openRedirect2
3115
3210
  };
3116
- var python_default2 = vulnerabilities11;
3211
+ var python_default2 = vulnerabilities13;
3117
3212
 
3118
3213
  // src/features/analysis/scm/shared/src/storedQuestionData/xml/unboundedOccurrences.ts
3119
3214
  var unboundedOccurrences = {
@@ -3127,10 +3222,10 @@ A value too high will cause performance issues up to and including denial of ser
3127
3222
  };
3128
3223
 
3129
3224
  // src/features/analysis/scm/shared/src/storedQuestionData/xml/index.ts
3130
- var vulnerabilities12 = {
3225
+ var vulnerabilities14 = {
3131
3226
  ["WEAK_XML_SCHEMA_UNBOUNDED_OCCURRENCES" /* WeakXmlSchemaUnboundedOccurrences */]: unboundedOccurrences
3132
3227
  };
3133
- var xml_default2 = vulnerabilities12;
3228
+ var xml_default2 = vulnerabilities14;
3134
3229
 
3135
3230
  // src/features/analysis/scm/shared/src/storedQuestionData/index.ts
3136
3231
  var StoredQuestionDataItemZ = z7.object({
@@ -3143,7 +3238,8 @@ var languages2 = {
3143
3238
  ["JavaScript" /* JavaScript */]: js_default,
3144
3239
  ["XML" /* Xml */]: xml_default2,
3145
3240
  ["CSharp" /* CSharp */]: csharp_default2,
3146
- ["Python" /* Python */]: python_default2
3241
+ ["Python" /* Python */]: python_default2,
3242
+ ["Go" /* Go */]: go_default2
3147
3243
  };
3148
3244
  var storedQuestionData_default = languages2;
3149
3245
 
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "mobbdev",
3
- "version": "1.0.23",
3
+ "version": "1.0.25",
4
4
  "description": "Automated secure code remediation tool",
5
5
  "repository": "git+https://github.com/mobb-dev/bugsy.git",
6
6
  "main": "dist/index.js",