resources/protect/policy.json in contrast-agent-3.8.5 vs resources/protect/policy.json in contrast-agent-3.9.0

- old
+ new

@@ -1,11 +1,11 @@ { "rules":[ { "name": "cmd-injection", "applicator": "Contrast::CoreExtensions::Protect::AppliesCommandInjectionRule", - "applicator_method": "cs__patched_apply_command_injection_rule", + "applicator_method": "apply_command_injection_rule", "required_properties": [], "optional_properties": [], "triggers": [ { "class_name":"IO", @@ -113,11 +113,11 @@ ] }, { "name": "nosql-injection", "applicator": "Contrast::CoreExtensions::Protect::AppliesNoSqliRule", - "applicator_method": "cs__patched_apply_nosql_rule", + "applicator_method": "apply_nosql_rule", "required_properties": ["database"], "optional_properties": [], "triggers": [ { "class_name": "Mongo::Server::Connection", @@ -155,11 +155,11 @@ ] }, { "name":"path-traversal", "applicator": "Contrast::CoreExtensions::Protect::AppliesPathTraversalRule", - "applicator_method": "cs__patched_apply_path_traversal_rule", + "applicator_method": "apply_path_traversal_rule", "required_properties": ["action"], "optional_properties": [], "triggers":[ { "class_name":"File", @@ -253,11 +253,11 @@ ] }, { "name": "sql-injection", "applicator": "Contrast::CoreExtensions::Protect::AppliesSqliRule", - "applicator_method": "cs__patched_apply_sql_rule", + "applicator_method": "apply_sql_rule", "required_properties": ["index", "database"], "optional_properties": [], "triggers": [ { "class_name": "Mysql2::Client", @@ -335,34 +335,36 @@ ] }, { "name": "untrusted-deserialization", "applicator": "Contrast::CoreExtensions::Protect::AppliesDeserializationRule", - "applicator_method": "cs__patched_apply_deserialization_rule", + "applicator_method": "apply_deserialization_rule", "required_properties": [], "optional_properties": [], "triggers": [ { "class_name": "Marshal", "method_name": "load", "instance_method": false, "method_visibility": "public", + "scope": "deserialization", "properties": {} }, { "class_name": "Psych", "method_name": "load", "instance_method": false, "method_visibility": "public", + "scope": "deserialization", "properties": {} } ] }, { "name": "xxe", "applicator": "Contrast::CoreExtensions::Protect::AppliesXxeRule", - "applicator_method": "cs__patched_apply_xxe_rule", + "applicator_method": "apply_xxe_rule", "required_properties": [], "optional_properties": [], "triggers": [ { "class_name": "Nokogiri::XML::Document", @@ -373,11 +375,11 @@ }, { "class_name": "Nokogiri::XML::Document", "method_name": "read_io", "instance_method": false, "method_visibility": "public", - "applicator_method": "cs__patched_apply_xxe_rule__io", + "applicator_method": "apply_xxe_rule__io", "properties": {} },{ "class_name": "Nokogiri::XML::SAX::Parser", "method_name": "parse_memory", "instance_method": true, @@ -386,11 +388,11 @@ }, { "class_name": "Nokogiri::XML::SAX::Parser", "method_name": "parse_io", "instance_method": true, "method_visibility": "public", - "applicator_method": "cs__patched_apply_xxe_rule__io", + "applicator_method": "apply_xxe_rule__io", "properties": {} },{ "class_name": "Ox", "method_name": "parse", "instance_method": false, @@ -405,10 +407,10 @@ }, { "class_name": "Oga::XML::Lexer", "method_name": "read_data", "instance_method": true, "method_visibility": "public", - "applicator_method": "cs__patched_apply_xxe_rule__lexer", + "applicator_method": "apply_xxe_rule__lexer", "properties": {} } ] }