Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

🐛 Qualys Parser: Support for Monthly PCI Scan #9328

Merged
merged 1 commit into from
Jan 19, 2024

:bug: fix #6932, advance qualys for monthly pci scan

5de225f
Select commit
Loading
Failed to load commit list.
Merged

🐛 Qualys Parser: Support for Monthly PCI Scan #9328

:bug: fix #6932, advance qualys for monthly pci scan
5de225f
Select commit
Loading
Failed to load commit list.
DryRunSecurity / AI-powered Sensitive Function Check succeeded Jan 14, 2024 in 0s

Code Analysis

            # DryRun Security AI-Powered Sensitive Function Check

            Detected a total of 3 potentially sensitive functions.
            
            Names:
            
            ,,

Annotations

Check warning on line 48 in dojo/tools/qualys/csv_parser.py

See this annotation in the file changed.

@dryrunsecurity dryrunsecurity / AI-powered Sensitive Function Check

Possible Sensitive Function

                        Our AI-Powered Sensitive Function checker believes it has discovered
                        a sensitive function being modified in this PR. The name of the function
                        is `undefined`. Extra care must be taken when modifying a 
                        function that is potentially security-sensitive. The following reason was
                        provided for why this function was flagged as sensitive:
    
                        The function build_findings_from_dict() appears to be related to authentication or authorization
                        

Check warning on line 73 in dojo/tools/qualys/csv_parser.py

See this annotation in the file changed.

@dryrunsecurity dryrunsecurity / AI-powered Sensitive Function Check

Possible Sensitive Function

                        Our AI-Powered Sensitive Function checker believes it has discovered
                        a sensitive function being modified in this PR. The name of the function
                        is `undefined`. Extra care must be taken when modifying a 
                        function that is potentially security-sensitive. The following reason was
                        provided for why this function was flagged as sensitive:
    
                        The function build_findings_from_dict() appears to be related to authentication or authorization
                        

Check warning on line 133 in unittests/test_qualys_parser.py

See this annotation in the file changed.

@dryrunsecurity dryrunsecurity / AI-powered Sensitive Function Check

Possible Sensitive Function

                        Our AI-Powered Sensitive Function checker believes it has discovered
                        a sensitive function being modified in this PR. The name of the function
                        is `undefined`. Extra care must be taken when modifying a 
                        function that is potentially security-sensitive. The following reason was
                        provided for why this function was flagged as sensitive:
    
                        The function test_parse_file_monthly_pci_issue6932() appears to be related to authentication or authorization