lib/pwn/sast/emoticon.rb in pwn-0.4.512 vs lib/pwn/sast/emoticon.rb in pwn-0.4.513
- old
+ new
@@ -49,11 +49,11 @@
else
str = "1:Result larger than 64KB -> Size: #{str.to_s.length}. Please click the \"Path\" link for more details." if str.to_s.length >= 64_000
hash_line = {
timestamp: Time.now.strftime('%Y-%m-%d %H:%M:%S.%9N %z').to_s,
- security_requirements: security_requirements,
+ security_references: security_references,
filename: { git_repo_root_uri: git_repo_root_uri, entry: entry },
line_no_and_contents: '',
raw_content: str,
test_case_filter: test_case_filter
}
@@ -79,13 +79,15 @@
entry_beautified: entry_beautified
)
else
author = 'N/A'
end
- hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(line_no: line_no,
- contents: contents,
- author: author)
+ hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(
+ line_no: line_no,
+ contents: contents,
+ author: author
+ )
current_count += 2
end
result_arr.push(hash_line)
logger_results = "#{logger_results}x" # Seeing progress is good :)
@@ -107,10 +109,10 @@
# Used primarily to map NIST 800-53 Revision 4 Security Controls
# https://web.nvd.nist.gov/view/800-53/Rev4/impact?impactName=HIGH
# to PWN Exploit & Static Code Anti-Pattern Matching Modules to
# Determine the level of Testing Coverage w/ PWN.
- public_class_method def self.security_requirements
+ public_class_method def self.security_references
{
sast_module: self,
section: 'LEAST PRIVILEGE',
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=AC-6',
cwe_id: '546',