Skip to content

Commit 5f965c9

Browse files
committed
delete ThreatImpact from e2etests, scripts
1 parent fc8acb8 commit 5f965c9

File tree

4 files changed

+0
-11
lines changed

4 files changed

+0
-11
lines changed

e2etests/constants.py

-4
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,6 @@
5555
"topic_id": uuid4(),
5656
"title": "topic one",
5757
"abstract": "abstract one",
58-
"threat_impact": 1,
5958
"tags": [TAG1],
6059
"misp_tags": [MISPTAG1],
6160
"actions": [],
@@ -64,7 +63,6 @@
6463
"topic_id": uuid4(),
6564
"title": "topic two",
6665
"abstract": "abstract two",
67-
"threat_impact": 2,
6866
"tags": [TAG1],
6967
"misp_tags": [],
7068
"actions": [],
@@ -73,7 +71,6 @@
7371
"topic_id": uuid4(),
7472
"title": "topic three",
7573
"abstract": "abstract three",
76-
"threat_impact": 1,
7774
"tags": [TAG1, TAG3],
7875
"misp_tags": [],
7976
"actions": [],
@@ -82,7 +79,6 @@
8279
"topic_id": uuid4(),
8380
"title": "topic four",
8481
"abstract": "abstract four",
85-
"threat_impact": 2,
8682
"tags": [TAG3],
8783
"misp_tags": [],
8884
"actions": [],

scripts/get_misp_status.py

-1
Original file line numberDiff line numberDiff line change
@@ -284,7 +284,6 @@ def main(args: argparse.Namespace) -> None:
284284
print(f"==[ {idx} ]==")
285285
print(f"Title: {topic['title']}")
286286
print(f"TopicID: {topic['topic_id']}")
287-
print(f"ThreatImpact: {impact_labels.get(topic['threat_impact'])}")
288287
print("Artifact tags & statuses")
289288
str_statuses = []
290289
for status in statuses:

scripts/sample-data/topics.json

-2
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@
33
"topic_id": "4c7807ea-2b97-47e5-b499-6d893e44d6a7",
44
"title": "npmjs-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser",
55
"abstract": "websocket-extensions npm module prior to 0.1.4 allows Denial of Service (DoS) via Regex Backtracking. The extension parser may take quadratic time when parsing a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other character. This could be abused by an attacker to conduct Regex Denial Of Service (ReDoS) on a single-threaded server by providing a malicious payload with the Sec-WebSocket-Extensions header.",
6-
"threat_impact": 2,
76
"tags": ["websocket-extensions:npm:"],
87
"misp_tags": ["CVE-2020-7662"],
98
"zone_names": [],
@@ -38,7 +37,6 @@
3837
"topic_id": "fdd35bfb-f47c-4275-b1bc-e6e34ea8cf80",
3938
"title": "A ReDoS issue was discovered in pygments/lexers/smithy.py in pygments ...",
4039
"abstract": "A ReDoS issue was discovered in pygments/lexers/smithy.py in pygments through 2.15.0 via SmithyLexer.",
41-
"threat_impact": 3,
4240
"tags": ["pygments:pypi:"],
4341
"misp_tags": ["CVE-2022-40896"],
4442
"zone_names": [],

scripts/trivydb2tc.py

-4
Original file line numberDiff line numberDiff line change
@@ -533,7 +533,6 @@ def main() -> None:
533533
abstract = "\n".join(vuln_details["References"])
534534
else:
535535
abstract = "There is no description."
536-
severity = vuln_details["Severity"]
537536

538537
if (
539538
"CVSS" in vuln_details
@@ -547,7 +546,6 @@ def main() -> None:
547546
else:
548547
title = vuln_id
549548
abstract = "This Vuln is not yet published."
550-
severity = "UNKNOWN"
551549
cvss_v3_score = None
552550
if vuln_content["tags"]:
553551
tags = list(vuln_content["tags"])
@@ -568,11 +566,9 @@ def main() -> None:
568566
for x in vuln_content["actions"].values()
569567
]
570568

571-
convert_impact = {"CRITICAL": 1, "HIGH": 2, "MEDIUM": 3, "LOW": 3, "UNKNOWN": 4}
572569
topics[topic_id] = {
573570
"title": title,
574571
"abstract": abstract,
575-
"threat_impact": convert_impact.get(severity, 4),
576572
"tags": tags,
577573
"misp_tags": misp_tags,
578574
"actions": actions,

0 commit comments

Comments
 (0)