lib/pwn/sast/emoticon.rb in pwn-0.4.512 vs lib/pwn/sast/emoticon.rb in pwn-0.4.513

- old
+ new

@@ -49,11 +49,11 @@ else str = "1:Result larger than 64KB -> Size: #{str.to_s.length}. Please click the \"Path\" link for more details." if str.to_s.length >= 64_000 hash_line = { timestamp: Time.now.strftime('%Y-%m-%d %H:%M:%S.%9N %z').to_s, - security_requirements: security_requirements, + security_references: security_references, filename: { git_repo_root_uri: git_repo_root_uri, entry: entry }, line_no_and_contents: '', raw_content: str, test_case_filter: test_case_filter } @@ -79,13 +79,15 @@ entry_beautified: entry_beautified ) else author = 'N/A' end - hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(line_no: line_no, - contents: contents, - author: author) + hash_line[:line_no_and_contents] = line_no_and_contents_arr.push( + line_no: line_no, + contents: contents, + author: author + ) current_count += 2 end result_arr.push(hash_line) logger_results = "#{logger_results}x" # Seeing progress is good :) @@ -107,10 +109,10 @@ # Used primarily to map NIST 800-53 Revision 4 Security Controls # https://web.nvd.nist.gov/view/800-53/Rev4/impact?impactName=HIGH # to PWN Exploit & Static Code Anti-Pattern Matching Modules to # Determine the level of Testing Coverage w/ PWN. - public_class_method def self.security_requirements + public_class_method def self.security_references { sast_module: self, section: 'LEAST PRIVILEGE', nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=AC-6', cwe_id: '546',