-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
extend AWS prowler v3 parser #10372
extend AWS prowler v3 parser #10372
Conversation
…it but use env vars
Hi there 👋, @DryRunSecurity here, below is a summary of our analysis and findings.
Note 🟢 Risk threshold not exceeded. Change Summary (click to expand)The following is a summary of changes in this pull request made by me, your security buddy 🤖. Note that this summary is auto-generated and not meant to be a definitive list of security issues but rather a helpful summary from a security perspective. Summary: The code changes in this pull request are focused on enhancing the integration between the DefectDojo application security tool and the AWS Prowler security assessment tool. The changes include the following key aspects:
Overall, these changes enhance the security assessment capabilities of the DefectDojo platform by providing seamless integration with the AWS Prowler tool and promoting the adoption of security best practices in AWS environments. As an application security engineer, I would recommend thoroughly reviewing the changes and ensuring that the parser implementation is secure and maintains the integrity of the security data it processes. Files Changed:
Powered by DryRun Security |
@kagahd Once the files are separated, this looks ready to approve. Nice work so far 👍 |
As happened also in PR #10372, only 1 unit test in alpine and also in debian failed, but this is not due to my code contribution.
|
@kagahd Those rest tests (prior to that PR) are super flaky and fail intermittently after moving them to Postgres in preparation for deprecating MySQL. The PR that fixes it and to watch is #10387 |
…it but use env vars
Signed-off-by: DefectDojo <[email protected]>
Hi @mtesauro , I followed your suggestion but now, the |
About the Code Path Analyzer see: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Approved
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
Conflicts have been resolved. A maintainer will review the pull request shortly. |
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
It's more than 3 weeks ago that I opened this pull request. If you don't merge it, merge conflicts will accumulate and will be harder to resolve. |
Yes, we're always happy to have PRs from the community. It's summer time (at least in the northern hemisphere) and the combination of:
has kept the maintainers busier that normal in June. You've got the needed 4 approvals, if you can fix this one last merge conflict, I'm ready and very willing to merge this PR. |
# Conflicts: # unittests/tools/test_aws_prowler_v3_parser.py
Conflicts have been resolved. A maintainer will review the pull request shortly. |
Thanks for your explanations and willingness to merge the PR @mtesauro! |
Instead to add a new prowler v4 parser as suggested in PR #10338 this PR extends the existing prowler v3 parser to be able to import also prowler v4 reports in
json-ocsf
format.This approach solves the deduplication problems between prowler v3 and v4 reports, described in PR #10338.