Skip to content

Commit

Permalink
Fix Rapidfire parser's ruff lint errors 4th time
Browse files Browse the repository at this point in the history
  • Loading branch information
skywalke34 committed Feb 27, 2025
1 parent 2fdad40 commit e395078
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions dojo/tools/rapidfire/parser.py
Original file line number Diff line number Diff line change
@@ -1,20 +1,20 @@
# dojo/tools/rapidfire/parser.py
# Standard library imports
import csv
import io
import logging
import re
import sys
from urllib.parse import urlparse

# Third party imports
from dateutil import parser as date_parser
from django.utils import timezone

# Local imports
from dojo.models import Endpoint, Finding


logger = logging.getLogger(__name__)


class RapidFireParser:

Check failure on line 18 in dojo/tools/rapidfire/parser.py

View workflow job for this annotation

GitHub Actions / ruff-linting

Ruff (E302)

dojo/tools/rapidfire/parser.py:18:1: E302 Expected 2 blank lines, found 1

"""RapidFire vulnerability scanner CSV report parser"""
Expand Down Expand Up @@ -231,7 +231,7 @@ def get_findings(self, filename, test):
description.append(f"**Known Exploited Vulnerability**: {row['Known Exploited Vulnerability']}")
if row.get("MAC Address"):
description.append(f"**MAC Address**: {row['MAC Address']}")

ransomware_warning = "⚠️ **Warning**: This vulnerability is known to be used in ransomware campaigns"
if row.get("Known To Be Used In Ransomware Campaigns", "").lower() == "true":
description.append(ransomware_warning)
Expand Down

0 comments on commit e395078

Please sign in to comment.