We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DD supports a ton of tools, the way they support them is via tool IDs, we need to match our vendorNames to tool ids
// var ddToolIDs = map[string]string{ // "Acunetix Scan": "146", // "Anchore Engine Scan": "86", // "Anchore Enterprise Policy Check": "132", // "Anchore Grype": "195", // "AnchoreCTL Policies Report": "89", // "AnchoreCTL Vuln Report": "78", // "API Test": "1", // "AppCheck Web Application Scanner": "139", // "AppSpider Scan": "96", // "Aqua Scan": "24", // "Arachni Scan": "144", // "AuditJS Scan": "57", // "AWS Inspector2 Scan": "202", // "AWS Prowler Scan": "124", // "AWS Prowler V3": "128", // "AWS Security Finding Format (ASFF) Scan": "71", // "AWS Security Hub Scan": "158", // "Azure Security Center Recommendations Scan": "21", // "Bandit Scan": "40", // "Bearer CLI": "62", // "BlackDuck API": "97", // "Blackduck Binary Analysis": "56", // "Blackduck Component Risk": "155", // "Blackduck Hub Scan": "84", // "Brakeman Scan": "10", // "Bugcrowd API Import": "134", // "BugCrowd Scan": "149", // "Bundler-Audit Scan": "79", // "Burp Dastardly Scan": "182", // "Burp Enterprise Scan": "87", // "Burp GraphQL API": "157", // "Burp REST API": "55", // "Burp Scan": "190", // "CargoAudit Scan": "51", // "Checkmarx CxFlow SAST": "204", // "Checkmarx One Scan": "113", // "Checkmarx OSA": "126", // "Checkmarx Scan detailed": "179", // "Checkmarx Scan": "178", // "Checkov Scan": "9", // "Chef Inspect Log": "133", // "Clair Scan": "19", // "Cloudsploit Scan": "69", // "Cobalt.io API Import": "175", // "Cobalt.io Scan": "129", // "Codechecker Report native": "82", // "Contrast Sc": "180", // "Coverity API": "32", // "Coverity Scan JSON Report": "26", // "Crashtest Security JSON File": "29", // "Crashtest Security XML File": "30", // "CredScan Scan": "112", // "Crunch42 Scan": "172", // "CycloneDX Scan": "189", // "DawnScanner Scan": "115", // "Deepfence Threatmapper Report": "165", // "Dependency Check Scan": "201", // "Dependency Track Finding Packaging Format (FPF) Export": "164", // "Detect-secrets Scan": "47", // "docker-bench-security Scan": "125", // "Dockle Scan": "44", // "DrHeader JSON Importer": "168", // "DSOP Scan": "192", // "Edgescan Scan": "22", // "ESLint Scan": "18", // "Fortify Scan": "27", // "Generic Findings Import": "34", // "Ggshield Scan": "58", // "Github Vulnerability Scan": "17", // "GitLab API Fuzzing Report Scan": "33", // "GitLab Container Scan": "194", // "GitLab DAST Report": "20", // "GitLab Dependency Scanning Report": "64", // "GitLab SAST Report": "187", // "GitLab Secret Detection Report": "171", // "Gitleaks Scan": "150", // "Google Cloud Artifact Vulnerability Scan": "121", // "Gosec Scanner": "106", // "Govulncheck Scanner": "85", // "HackerOne Cases": "105", // "Hadolint Dockerfile check": "196", // "Harbor Vulnerability Scan": "111", // "HCL AppScan on Cloud SAST XML": "206", // "HCLAppScan XML": "41", // "Horusec Scan": "68", // "Humble Json Importer": "90", // "HuskyCI Report": "13", // "Hydra Scan": "153", // "IBM AppScan DAST": "197", // "Immuniweb Scan": "151", // "IntSights Report": "91", // "Invicti Scan": "93", // "JFrog Xray API Summary Artifact Scan": "174", // "JFrog Xray On Demand Binary Scan": "23", // "JFrog Xray Scan": "99", // "JFrog Xray Unified Scan": "170", // "KICS Scan": "11", // "Kiuwan SCA Scan": "37", // "Kiuwan Scan": "38", // "KrakenD Audit Scan": "176", // "kube-bench Scan": "131", // "Kubeaudit Scan": "52", // "KubeHunter Scan": "102", // "Kubescape JSON Importer": "61", // "Legitify Scan": "50", // "Manual Code Review": "7", // "Mend Scan": "98", // "Meterian Scan": "117", // "Microfocus Webinspect Scan": "120", // "MobSF Scan": "59", // "MobSF Scorecard Scan": "205", // "Mobsfscan Scan": "76", // "Mozilla Observatory Scan": "116", // "MSDefender Parser": "114", // "Nancy Scan": "159", // "Netsparker Scan": "166", // "NeuVector (compliance)": "156", // "NeuVector (REST)": "8", // "Nexpose Scan": "108", // "Nikto Scan": "183", // "Nmap Scan": "16", // "Node Security Platform Scan": "177", // "Nosey Parker Scan": "162", // "NPM Audit Scan": "198", // "NPM Audit v7+ Scan": "60", // "Nuclei Scan": "31", // "Openscap Vulnerability Scan": "35", // "OpenVAS Parser": "101", // "ORT evaluated model Importer": "48", // "OssIndex Devaudit SCA Scan Importer": "49", // "OSV Scan": "181", // "Outpost24 Scan": "161", // "Pen Test": "3", // "PHP Security Audit v2": "77", // "PHP Symfony Security Check": "135", // "pip-audit Scan": "104", // "PMD Scan": "73", // "Popeye Scan": "109", // "Progpilot Scan": "127", // "PTART Report": "203", // "PWN SAST": "184", // "Qualys Hacker Guardian Scan": "119", // "Qualys Infrastructure Scan (WebGUI XML)": "65", // "Qualys Scan": "45", // "Qualys Webapp Scan": "167", // "Rapplex Scan": "160", // "Red Hat Satellite": "80", // "Retire.js Scan": "39", // "Risk Recon API Importer": "185", // "Rubocop Scan": "92", // "Rusty Hog Scan": "137", // "SARIF": "154", // "Scantist Scan": "15", // "Scout Suite Scan": "138", // "Security Research": "5", // "Semgrep JSON Report": "14", // "SKF Scan": "142", // "Snyk Code Scan": "107", // "Snyk Scan": "191", // "Solar Appscreener Scan": "25", // "SonarQube API Import": "147", // "SonarQube Scan detailed": "67", // "SonarQube Scan": "66", // "Sonatype Application Scan": "188", // "SpotBugs Scan": "53", // "SSH Audit Importer": "173", // "SSL Labs Scan": "186", // "Sslscan": "72", // "SSLyze Scan (JSON)": "94", // "Sslyze Scan": "95", // "StackHawk HawkScan": "36", // "Static Check": "2", // "Sysdig Vulnerability Report": "130", // "Talisman Scan": "43", // "Tenable Scan": "54", // "Terrascan Scan": "199", // "Testssl Scan": "141", // "TFSec Scan": "143", // "Threagile risks report": "63", // "Threat Modeling": "6", // "ThreatComposer Scan": "46", // "Trivy Operator Scan": "145", // "Trivy Scan": "169", // "Trufflehog Scan": "200", // "Trufflehog3 Scan": "12", // "Trustwave Fusion API Scan": "83", // "Trustwave Scan (CSV)": "193", // "Twistlock Image Scan": "28", // "VCG Scan": "70", // "Veracode Scan": "81", // "Veracode SourceClear Scan": "152", // "Vulners": "42", // "Wapiti Scan": "122", // "Wazuh": "75", // "Web Application Test": "4", // "WFuzz JSON report": "136", // "Whispers Scan": "100", // "WhiteHat Sentinel": "88", // "Wiz Scan": "110", // "Wizcli Dir Scan": "74", // "Wizcli IaC Scan": "163", // "Wizcli Img Scan": "103", // "Wpscan": "118", // "Xanitizer Scan": "123", // "Yarn Audit Scan": "148", // "ZAP Scan": "140", // }
The text was updated successfully, but these errors were encountered:
No branches or pull requests
DD supports a ton of tools, the way they support them is via tool IDs, we need to match our vendorNames to tool ids
The text was updated successfully, but these errors were encountered: