[Integrates] Design for reattacking a machine vulnerability
Problem to solve
We explain to users that reattacks for machine vulnerabilities don't require a detailed description but we don't give users any mechanism to know if vulnerability was detected using a hacker or using to machine because they can't see the reporter.
We could add a "Reported by" with icons for machine and hacker at the Justification form for giving context to users about a detailed description is neccesary.
Intended users
Users
Proposal
Do not require justification if the vulnerability was reported by Machine, as this information will not be used by the tool or our team.
Steps
-
Make sure that the code contributions checklist has been followed.
Links / references
Edited by Frank Aristizabal