-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Duplicate fields #1
Comments
@akuleshov7 please review |
|
We have But looks like it doesn't fit case when we create a new vulnerability which related to some CWE, but it's not alias to some existed CVE. So please disregard point 7 |
Having a field which can be calculated from another leads to additional validation on our side: Also, the JSON file is for communication between program (I don't think that human will read it), we can add additional calculated fields on UI only |
Will move then extra fields from |
Agree, taking into account that we want to move |
Some fields can be calculated or taken as is from OSV schema:
severity[].level
can be calculated fromseverity[].score
-- https://www.balbix.com/insights/understanding-cvss-scores/#CVSS-Qualitative-Ratings-6severity[].score_num
can be calculated fromseverity[].score
-- https://nvd.nist.gov/vuln-metrics/cvss/v3-calculatorcontributors[].name
can be taken fromcredits[].name
contributors[].email
can be taken fromcredits[].contact[]
patches_detail[].patch_url
can be taken fromreferences[]
withtype = FIX
patches_detail[].issue_url
can be taken fromreferences[]
withtype = REPORT
cwe and cve are different: https://www.automox.com/blog/vulnerabilities-software-weaknesses-acronym-breakdown, but there is a mapping from CVE to CWE: https://nvd.nist.gov/vuln/detail/CVE-2023-29407 (for example)cwe_ids[]
can be calculated fromaliases[]
with prefixCWE-
The text was updated successfully, but these errors were encountered: