lib/pwn/plugins/defect_dojo.rb in pwn-0.4.718 vs lib/pwn/plugins/defect_dojo.rb in pwn-0.4.719

- old
+ new

@@ -384,11 +384,12 @@ # file: 'required - path of scan results file', # lead_username: 'required - username of lead to tie to scan', # tags: 'optional - comma-delimited list of tag names to tie to scan', # minimum_severity: 'optional - minimum finding severity Info||Low||Medium||High||Critical (Defaults to Info)', # scan_date: 'optional - date in which scan was kicked off (defaults to now)', - # verified: 'optional - flag finding as verified by a tester (defaults to false)' + # verified: 'optional - flag finding as verified by a tester (defaults to false)', + # create_finding_groups: 'optional - flag to create finding groups (defaults to false)' # ) public_class_method def self.importscan(opts = {}) http_body = {} @@ -719,10 +720,11 @@ file: 'required - path of scan results file', lead_username: 'required - username of lead to tie to scan', tags: 'optional - comma-delimited list of tag names to tie to scan', minimum_severity: 'optional - minimum finding severity Info||Low||Medium||High||Critical (Defaults to Info)', scan_date: 'optional - date in which scan was kicked off (defaults to now)', - verified: 'optional - flag finding as verified by a tester (defaults to false)' + verified: 'optional - flag finding as verified by a tester (defaults to false)', + create_finding_groups: 'optional - flag to create finding groups (defaults to false)' ) reimportscan_response = #{self}.reimportscan( dd_obj: 'required - dd_obj returned from #login_v1 method', engagement_name: 'required - name of engagement to associate w/ scan',