mobbdev 1.0.24 → 1.0.25

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/dist/index.mjs +134 -45
  2. package/package.json +1 -1
package/dist/index.mjs CHANGED
@@ -205,6 +205,18 @@ var Project_Role_Type_Enum = /* @__PURE__ */ ((Project_Role_Type_Enum2) => {
205
205
  Project_Role_Type_Enum2["Writer"] = "writer";
206
206
  return Project_Role_Type_Enum2;
207
207
  })(Project_Role_Type_Enum || {});
208
+ var Vulnerability_Report_Issue_State_Enum = /* @__PURE__ */ ((Vulnerability_Report_Issue_State_Enum2) => {
209
+ Vulnerability_Report_Issue_State_Enum2["Digested"] = "Digested";
210
+ Vulnerability_Report_Issue_State_Enum2["Error"] = "Error";
211
+ Vulnerability_Report_Issue_State_Enum2["FalsePositive"] = "FalsePositive";
212
+ Vulnerability_Report_Issue_State_Enum2["Filtered"] = "Filtered";
213
+ Vulnerability_Report_Issue_State_Enum2["FilteredAiQuota"] = "FilteredAiQuota";
214
+ Vulnerability_Report_Issue_State_Enum2["Fixed"] = "Fixed";
215
+ Vulnerability_Report_Issue_State_Enum2["NoFix"] = "NoFix";
216
+ Vulnerability_Report_Issue_State_Enum2["Pending"] = "Pending";
217
+ Vulnerability_Report_Issue_State_Enum2["Unsupported"] = "Unsupported";
218
+ return Vulnerability_Report_Issue_State_Enum2;
219
+ })(Vulnerability_Report_Issue_State_Enum || {});
208
220
  var Vulnerability_Report_Vendor_Enum = /* @__PURE__ */ ((Vulnerability_Report_Vendor_Enum3) => {
209
221
  Vulnerability_Report_Vendor_Enum3["Checkmarx"] = "checkmarx";
210
222
  Vulnerability_Report_Vendor_Enum3["CheckmarxXml"] = "checkmarxXml";
@@ -888,6 +900,8 @@ var ReportQueryResultZ = z3.object({
888
900
  fixesDownloaded: z3.object({
889
901
  aggregate: z3.object({ count: z3.number() })
890
902
  }),
903
+ fixesDoneCount: z3.number(),
904
+ fixesInprogressCount: z3.number(),
891
905
  fixesReadyCount: z3.number(),
892
906
  issueTypes: z3.record(z3.string(), z3.number()).nullable(),
893
907
  issueLanguages: z3.record(z3.string(), z3.number()).nullable(),
@@ -920,6 +934,7 @@ var ReportQueryResultZ = z3.object({
920
934
  numberOfVulnerabilityIssues: z3.number(),
921
935
  vulnerabilityReportIssues: z3.array(
922
936
  z3.object({
937
+ id: z3.string().uuid(),
923
938
  issueType: z3.string(),
924
939
  issueLanguage: z3.string(),
925
940
  parsedSeverity: ParsedSeverityZ
@@ -980,6 +995,7 @@ var ReportQueryResultZ = z3.object({
980
995
  })
981
996
  }),
982
997
  vulnerabilityReportIssues: z3.object({
998
+ id: z3.string().uuid(),
983
999
  extraData: z3.object({
984
1000
  missing_files: z3.string().array().nullish(),
985
1001
  large_files: z3.string().array().nullish(),
@@ -989,31 +1005,29 @@ var ReportQueryResultZ = z3.object({
989
1005
  })
990
1006
  })
991
1007
  });
992
- var ReportFixesQueryZ = z3.array(
993
- z3.object({
994
- id: z3.string().uuid(),
995
- sharedState: FixSharedStateZ,
996
- confidence: z3.number(),
997
- gitBlameLogin: z3.string().nullable(),
998
- effortToApplyFix: z3.nativeEnum(Effort_To_Apply_Fix_Enum).nullable(),
999
- safeIssueLanguage: z3.string(),
1000
- safeIssueType: z3.string(),
1001
- fixReportId: z3.string().uuid(),
1002
- filePaths: z3.array(
1003
- z3.object({
1004
- fileRepoRelativePath: z3.string()
1005
- })
1006
- ),
1007
- numberOfVulnerabilityIssues: z3.number(),
1008
- vulnerabilityReportIssues: z3.array(
1009
- z3.object({
1010
- issueType: z3.string(),
1011
- issueLanguage: z3.string(),
1012
- parsedSeverity: ParsedSeverityZ
1013
- })
1014
- ).min(1)
1015
- })
1016
- );
1008
+ var ReportFixesQueryFixZ = z3.object({
1009
+ id: z3.string().uuid(),
1010
+ sharedState: FixSharedStateZ,
1011
+ confidence: z3.number(),
1012
+ gitBlameLogin: z3.string().nullable(),
1013
+ effortToApplyFix: z3.nativeEnum(Effort_To_Apply_Fix_Enum).nullable(),
1014
+ safeIssueLanguage: z3.string(),
1015
+ safeIssueType: z3.string(),
1016
+ fixReportId: z3.string().uuid(),
1017
+ filePaths: z3.array(
1018
+ z3.object({
1019
+ fileRepoRelativePath: z3.string()
1020
+ })
1021
+ ),
1022
+ numberOfVulnerabilityIssues: z3.number(),
1023
+ vulnerabilityReportIssues: z3.array(
1024
+ z3.object({
1025
+ issueType: z3.string(),
1026
+ issueLanguage: z3.string(),
1027
+ parsedSeverity: ParsedSeverityZ
1028
+ })
1029
+ ).min(1)
1030
+ });
1017
1031
  var ExtraContextInternalZ = z3.object({
1018
1032
  key: z3.string(),
1019
1033
  value: z3.string().or(z3.boolean()).or(
@@ -1086,6 +1100,45 @@ var FixQueryZ = z3.object({
1086
1100
  patchAndQuestions: PatchAndQuestionsZ,
1087
1101
  effortToApplyFix: z3.nativeEnum(Effort_To_Apply_Fix_Enum).nullable()
1088
1102
  });
1103
+ var GetReportIssuesQueryZ = z3.object({
1104
+ fixReport: z3.object({
1105
+ vulnerabilityReport: z3.object({
1106
+ id: z3.string().uuid(),
1107
+ lastIssueUpdatedAt: z3.string(),
1108
+ vulnerabilityReportIssues_aggregate: z3.object({
1109
+ aggregate: z3.object({ count: z3.number() })
1110
+ }),
1111
+ vulnerabilityReportIssues: z3.array(
1112
+ z3.object({
1113
+ id: z3.string().uuid(),
1114
+ createdAt: z3.string(),
1115
+ issueType: z3.string(),
1116
+ issueLanguage: z3.string(),
1117
+ state: z3.nativeEnum(Vulnerability_Report_Issue_State_Enum),
1118
+ extraData: z3.object({
1119
+ missing_files: z3.string().array().nullish(),
1120
+ large_files: z3.string().array().nullish(),
1121
+ error_files: z3.string().array().nullish()
1122
+ }),
1123
+ fix: ReportFixesQueryFixZ.nullable(),
1124
+ falsePositive: z3.object({
1125
+ id: z3.string().uuid()
1126
+ }).nullable(),
1127
+ parsedIssueType: z3.nativeEnum(IssueType_Enum),
1128
+ parsedIssueLanguage: z3.nativeEnum(IssueLanguage_Enum),
1129
+ parsedSeverity: z3.nativeEnum(Vulnerability_Severity_Enum),
1130
+ severity: z3.string(),
1131
+ severityValue: z3.number(),
1132
+ vulnerabilityReportIssueTags: z3.array(
1133
+ z3.object({
1134
+ vulnerability_report_issue_tag_value: z3.string()
1135
+ })
1136
+ )
1137
+ })
1138
+ )
1139
+ })
1140
+ }).array()
1141
+ }).nullish();
1089
1142
  var FixScreenQueryResultZ = z3.object({
1090
1143
  fixReport_by_pk: z3.object({
1091
1144
  id: z3.string().uuid(),
@@ -1180,14 +1233,34 @@ var FixPageQueryZ = z3.object({
1180
1233
  data: FixScreenQueryResultZ
1181
1234
  });
1182
1235
  var GetReportFixesQueryZ = z3.object({
1183
- fixReport: z3.object({
1184
- fixes: ReportFixesQueryZ,
1185
- vulnerabilityReport: z3.object({
1186
- vulnerabilityReportIssues_aggregate: z3.object({
1236
+ fixReport: z3.array(
1237
+ z3.object({
1238
+ fixes: z3.array(ReportFixesQueryFixZ),
1239
+ fixes_aggregate: z3.object({
1187
1240
  aggregate: z3.object({ count: z3.number() })
1241
+ }),
1242
+ vulnerabilityReportIssuesTotalCount: z3.object({
1243
+ vulnerabilityReportIssues_aggregate: z3.object({
1244
+ aggregate: z3.object({ count: z3.number() })
1245
+ })
1246
+ }),
1247
+ vulnerabilityReportIssuesFixedCount: z3.object({
1248
+ vulnerabilityReportIssues_aggregate: z3.object({
1249
+ aggregate: z3.object({ count: z3.number() })
1250
+ })
1251
+ }),
1252
+ vulnerabilityReportIssuesIrrelevantCount: z3.object({
1253
+ vulnerabilityReportIssues_aggregate: z3.object({
1254
+ aggregate: z3.object({ count: z3.number() })
1255
+ })
1256
+ }),
1257
+ vulnerabilityReportIssuesRemainingCount: z3.object({
1258
+ vulnerabilityReportIssues_aggregate: z3.object({
1259
+ aggregate: z3.object({ count: z3.number() })
1260
+ })
1188
1261
  })
1189
1262
  })
1190
- }).array()
1263
+ )
1191
1264
  }).nullish();
1192
1265
  var ProjectVulnerabilityReport = z3.object({
1193
1266
  id: z3.string().uuid(),
@@ -2309,6 +2382,21 @@ var vulnerabilities9 = {
2309
2382
  };
2310
2383
  var csharp_default2 = vulnerabilities9;
2311
2384
 
2385
+ // src/features/analysis/scm/shared/src/storedQuestionData/go/logForging.ts
2386
+ var logForging2 = {
2387
+ isHtmlDisplay: {
2388
+ content: () => "Is the text written to the log going to be displayed as HTML?",
2389
+ description: () => "",
2390
+ guidance: () => ""
2391
+ }
2392
+ };
2393
+
2394
+ // src/features/analysis/scm/shared/src/storedQuestionData/go/index.ts
2395
+ var vulnerabilities10 = {
2396
+ ["LOG_FORGING" /* LogForging */]: logForging2
2397
+ };
2398
+ var go_default2 = vulnerabilities10;
2399
+
2312
2400
  // src/features/analysis/scm/shared/src/storedQuestionData/java/commandInjection.ts
2313
2401
  var commandInjection = {
2314
2402
  isUnixShellCommandPart: {
@@ -2479,7 +2567,7 @@ var localeDependentComparison = {
2479
2567
  };
2480
2568
 
2481
2569
  // src/features/analysis/scm/shared/src/storedQuestionData/java/logForging.ts
2482
- var logForging2 = {
2570
+ var logForging3 = {
2483
2571
  isHtmlDisplay: {
2484
2572
  content: () => "Is the text written to the log going to be displayed as HTML?",
2485
2573
  description: () => "",
@@ -2743,7 +2831,7 @@ var xxe2 = {
2743
2831
  };
2744
2832
 
2745
2833
  // src/features/analysis/scm/shared/src/storedQuestionData/java/index.ts
2746
- var vulnerabilities10 = {
2834
+ var vulnerabilities11 = {
2747
2835
  ["SQL_Injection" /* SqlInjection */]: sqlInjection3,
2748
2836
  ["CMDi_relative_path_command" /* CmDiRelativePathCommand */]: relativePathCommand,
2749
2837
  ["CMDi" /* CmDi */]: commandInjection,
@@ -2754,7 +2842,7 @@ var vulnerabilities10 = {
2754
2842
  ["PRIVACY_VIOLATION" /* PrivacyViolation */]: privacyViolation,
2755
2843
  ["PT" /* Pt */]: pt2,
2756
2844
  ["SSRF" /* Ssrf */]: ssrf3,
2757
- ["LOG_FORGING" /* LogForging */]: logForging2,
2845
+ ["LOG_FORGING" /* LogForging */]: logForging3,
2758
2846
  ["LOCALE_DEPENDENT_COMPARISON" /* LocaleDependentComparison */]: localeDependentComparison,
2759
2847
  ["MISSING_CHECK_AGAINST_NULL" /* MissingCheckAgainstNull */]: missingCheckAgainstNull,
2760
2848
  ["OVERLY_BROAD_CATCH" /* OverlyBroadCatch */]: overlyBroadCatch2,
@@ -2767,7 +2855,7 @@ var vulnerabilities10 = {
2767
2855
  ["LEFTOVER_DEBUG_CODE" /* LeftoverDebugCode */]: leftoverDebugCode,
2768
2856
  ["ERRONEOUS_STRING_COMPARE" /* ErroneousStringCompare */]: erroneousStringCompare
2769
2857
  };
2770
- var java_default2 = vulnerabilities10;
2858
+ var java_default2 = vulnerabilities11;
2771
2859
 
2772
2860
  // src/features/analysis/scm/shared/src/storedQuestionData/python/csrf.ts
2773
2861
  var csrf2 = {
@@ -2878,7 +2966,7 @@ var insecureRandomness2 = {
2878
2966
  };
2879
2967
 
2880
2968
  // src/features/analysis/scm/shared/src/storedQuestionData/js/logForging.ts
2881
- var logForging3 = {
2969
+ var logForging4 = {
2882
2970
  isHtmlDisplay: {
2883
2971
  content: () => "Is the text written to the log going to be displayed as HTML?",
2884
2972
  description: () => "",
@@ -3065,14 +3153,14 @@ var xss3 = {
3065
3153
  };
3066
3154
 
3067
3155
  // src/features/analysis/scm/shared/src/storedQuestionData/js/index.ts
3068
- var vulnerabilities11 = {
3156
+ var vulnerabilities12 = {
3069
3157
  ["CMDi" /* CmDi */]: commandInjection2,
3070
3158
  ["GRAPHQL_DEPTH_LIMIT" /* GraphqlDepthLimit */]: graphqlDepthLimit,
3071
3159
  ["INSECURE_RANDOMNESS" /* InsecureRandomness */]: insecureRandomness2,
3072
3160
  ["SSRF" /* Ssrf */]: ssrf4,
3073
3161
  ["TYPE_CONFUSION" /* TypeConfusion */]: typeConfusion,
3074
3162
  ["INCOMPLETE_URL_SANITIZATION" /* IncompleteUrlSanitization */]: incompleteUrlSanitization,
3075
- ["LOG_FORGING" /* LogForging */]: logForging3,
3163
+ ["LOG_FORGING" /* LogForging */]: logForging4,
3076
3164
  ["XSS" /* Xss */]: xss3,
3077
3165
  ["OPEN_REDIRECT" /* OpenRedirect */]: openRedirect,
3078
3166
  ["SYSTEM_INFORMATION_LEAK" /* SystemInformationLeak */]: sysLeak3,
@@ -3087,10 +3175,10 @@ var vulnerabilities11 = {
3087
3175
  ["HARDCODED_DOMAIN_IN_HTML" /* HardcodedDomainInHtml */]: hardcodedDomainInHtml,
3088
3176
  ["CSRF" /* Csrf */]: csrf2
3089
3177
  };
3090
- var js_default = vulnerabilities11;
3178
+ var js_default = vulnerabilities12;
3091
3179
 
3092
3180
  // src/features/analysis/scm/shared/src/storedQuestionData/python/logForging.ts
3093
- var logForging4 = {
3181
+ var logForging5 = {
3094
3182
  isHtmlDisplay: {
3095
3183
  content: () => "Is the text written to the log going to be displayed as HTML?",
3096
3184
  description: () => "",
@@ -3115,12 +3203,12 @@ var openRedirect2 = {
3115
3203
  };
3116
3204
 
3117
3205
  // src/features/analysis/scm/shared/src/storedQuestionData/python/index.ts
3118
- var vulnerabilities12 = {
3206
+ var vulnerabilities13 = {
3119
3207
  ["CSRF" /* Csrf */]: csrf2,
3120
- ["LOG_FORGING" /* LogForging */]: logForging4,
3208
+ ["LOG_FORGING" /* LogForging */]: logForging5,
3121
3209
  ["LOG_FORGING" /* LogForging */]: openRedirect2
3122
3210
  };
3123
- var python_default2 = vulnerabilities12;
3211
+ var python_default2 = vulnerabilities13;
3124
3212
 
3125
3213
  // src/features/analysis/scm/shared/src/storedQuestionData/xml/unboundedOccurrences.ts
3126
3214
  var unboundedOccurrences = {
@@ -3134,10 +3222,10 @@ A value too high will cause performance issues up to and including denial of ser
3134
3222
  };
3135
3223
 
3136
3224
  // src/features/analysis/scm/shared/src/storedQuestionData/xml/index.ts
3137
- var vulnerabilities13 = {
3225
+ var vulnerabilities14 = {
3138
3226
  ["WEAK_XML_SCHEMA_UNBOUNDED_OCCURRENCES" /* WeakXmlSchemaUnboundedOccurrences */]: unboundedOccurrences
3139
3227
  };
3140
- var xml_default2 = vulnerabilities13;
3228
+ var xml_default2 = vulnerabilities14;
3141
3229
 
3142
3230
  // src/features/analysis/scm/shared/src/storedQuestionData/index.ts
3143
3231
  var StoredQuestionDataItemZ = z7.object({
@@ -3150,7 +3238,8 @@ var languages2 = {
3150
3238
  ["JavaScript" /* JavaScript */]: js_default,
3151
3239
  ["XML" /* Xml */]: xml_default2,
3152
3240
  ["CSharp" /* CSharp */]: csharp_default2,
3153
- ["Python" /* Python */]: python_default2
3241
+ ["Python" /* Python */]: python_default2,
3242
+ ["Go" /* Go */]: go_default2
3154
3243
  };
3155
3244
  var storedQuestionData_default = languages2;
3156
3245
 
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "mobbdev",
3
- "version": "1.0.24",
3
+ "version": "1.0.25",
4
4
  "description": "Automated secure code remediation tool",
5
5
  "repository": "git+https://github.com/mobb-dev/bugsy.git",
6
6
  "main": "dist/index.js",