Please add a test for masking a url in the format of https://user:pass@host - is is a pretty common one - and it did slip from us know - want to make sure it doesn't happen again...
[![👍 Frogbot scanned this pull request and did not find any new security issues.](https://raw.githubusercontent.com/jfrog/frogbot/master/resources/v2/noVulnerabilityBannerPR.png)](https://docs.jfrog-applications.jfrog.io/jfrog-applications/frogbot)
[x] Update documentation about new features / new supported technologies
This PR fixes the issue of printing unmasked URLs in Frogbot's cloning process