Skip to content

Ingest vulnerability read with owasp_top_10

Bala Kumar requested to merge 419092-vulnerability-read-ingestion-logic into master

What does this MR do and why?

Updates vulnerability_reads.owasp_top_10 value based on the vulnerability identifier.

Related to Step-2 implementation plan on #419092 (closed)

Screenshots or screen recordings

In Rails console for the below validation project we should observe the following results.

Before After
Screenshot_2023-12-12_at_5.37.02_PM Screenshot_2023-12-12_at_5.38.25_PM

How to set up and validate locally

  1. Import project https://gitlab.com/bala.kumar/verify-419092 into local and run the pipeline on the main branch.
  2. We should observe that the vulnerability_reads.pluck(:owasp_top_10) for the imported project is having values ["A1:2017-Injection", "A1:2021-Broken Access Control"] in rails console.

MR acceptance checklist

This checklist encourages us to confirm any changes have been analyzed to reduce risks in quality, performance, reliability, security, and maintainability.

Related to #419092 (closed)

Edited by Bala Kumar

Merge request reports

Loading