lib/pwn/plugins/defect_dojo.rb in pwn-0.4.718 vs lib/pwn/plugins/defect_dojo.rb in pwn-0.4.719
- old
+ new
@@ -384,11 +384,12 @@
# file: 'required - path of scan results file',
# lead_username: 'required - username of lead to tie to scan',
# tags: 'optional - comma-delimited list of tag names to tie to scan',
# minimum_severity: 'optional - minimum finding severity Info||Low||Medium||High||Critical (Defaults to Info)',
# scan_date: 'optional - date in which scan was kicked off (defaults to now)',
- # verified: 'optional - flag finding as verified by a tester (defaults to false)'
+ # verified: 'optional - flag finding as verified by a tester (defaults to false)',
+ # create_finding_groups: 'optional - flag to create finding groups (defaults to false)'
# )
public_class_method def self.importscan(opts = {})
http_body = {}
@@ -719,10 +720,11 @@
file: 'required - path of scan results file',
lead_username: 'required - username of lead to tie to scan',
tags: 'optional - comma-delimited list of tag names to tie to scan',
minimum_severity: 'optional - minimum finding severity Info||Low||Medium||High||Critical (Defaults to Info)',
scan_date: 'optional - date in which scan was kicked off (defaults to now)',
- verified: 'optional - flag finding as verified by a tester (defaults to false)'
+ verified: 'optional - flag finding as verified by a tester (defaults to false)',
+ create_finding_groups: 'optional - flag to create finding groups (defaults to false)'
)
reimportscan_response = #{self}.reimportscan(
dd_obj: 'required - dd_obj returned from #login_v1 method',
engagement_name: 'required - name of engagement to associate w/ scan',