Skip to content

Add Rapidfire vulnerability scanner parser #9622

Add Rapidfire vulnerability scanner parser

Add Rapidfire vulnerability scanner parser #9622

Triggered via pull request February 27, 2025 15:54
Status Failure
Total duration 18s
Artifacts

ruff.yml

on: pull_request
ruff-linting
10s
ruff-linting
Fit to window
Zoom out
Zoom in

Annotations

10 errors
Ruff (I001): dojo/tools/rapidfire/parser.py#L1
dojo/tools/rapidfire/parser.py:1:1: I001 Import block is un-sorted or un-formatted
Ruff (D203): dojo/tools/rapidfire/parser.py#L16
dojo/tools/rapidfire/parser.py:16:5: D203 1 blank line required before class docstring
Ruff (RUF010): dojo/tools/rapidfire/parser.py#L153
dojo/tools/rapidfire/parser.py:153:79: RUF010 Use explicit conversion flag
Ruff (FURB113): dojo/tools/rapidfire/parser.py#L176
dojo/tools/rapidfire/parser.py:176:21: FURB113 Use `parts.extend(...)` instead of repeatedly calling `parts.append()`
Ruff (FURB113): dojo/tools/rapidfire/parser.py#L179
dojo/tools/rapidfire/parser.py:179:17: FURB113 Use `parts.extend(("### Description", vuln_insight))` instead of repeatedly calling `parts.append()`
Ruff (FURB113): dojo/tools/rapidfire/parser.py#L186
dojo/tools/rapidfire/parser.py:186:13: FURB113 Use `parts.extend(...)` instead of repeatedly calling `parts.append()`
Ruff (FURB110): dojo/tools/rapidfire/parser.py#L260
dojo/tools/rapidfire/parser.py:260:30: FURB110 Replace ternary `if` expression with `or` operator
Ruff (RUF010): dojo/tools/rapidfire/parser.py#L284
dojo/tools/rapidfire/parser.py:284:48: RUF010 Use explicit conversion flag
Ruff (RUF010): dojo/tools/rapidfire/parser.py#L287
dojo/tools/rapidfire/parser.py:287:53: RUF010 Use explicit conversion flag
Ruff (I001): unittests/tools/test_rapidfire_parser.py#L1
unittests/tools/test_rapidfire_parser.py:1:1: I001 Import block is un-sorted or un-formatted