-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Parsers: Specify lists rather than dict.values()
#10945
Conversation
DryRun Security SummaryThe pull request focuses on improving the parsing and ingestion of security findings from various sources, ensuring consistent output formats and enhancing the reliability and usability of the security findings imported into the DefectDojo application. Expand for full summarySummary: The code changes in this pull request are focused on improving the parsing and ingestion of security findings from various sources, including HackerOne, Blackduck, IntSights, Qualys, Mend, SSLScan, SSLyze, and WhiteHat Sentinel. The changes primarily involve ensuring that the parser functions return their findings in a consistent list format, rather than a direct reference to a dictionary or other data structure. From an application security perspective, these changes do not introduce any obvious security vulnerabilities. Instead, they aim to enhance the reliability and usability of the security findings imported into the DefectDojo application. By providing a consistent output format, the changes make it easier for the rest of the application to work with the parsed data, which is an important aspect of maintaining a robust security program. Additionally, the code in these parser modules demonstrates a good understanding of secure coding practices, such as input validation, deduplication of findings, and the extraction of relevant security-related information from the source data. These are all crucial elements of an effective vulnerability management and reporting system. Files Changed:
Overall, the code changes in this pull request are primarily focused on improving the consistency and reliability of the security findings imported into the DefectDojo application, which is an essential aspect of effective vulnerability management and reporting. Code AnalysisWe ran Riskiness🟢 Risk threshold not exceeded. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Approved
A few parsers do not pass a list of findings, but rather an another type of iterable. This PR will correct these parsers to make the return type more explicit
[sc-7629]