pwn 0.4.512 → 0.4.513

Sign up to get free protection for your applications and to get access to all the features.
Files changed (81) hide show
  1. checksums.yaml +4 -4
  2. data/Gemfile +4 -4
  3. data/README.md +2 -2
  4. data/lib/pwn/reports/sast.rb +4 -4
  5. data/lib/pwn/sast/amqp_connect_as_guest.rb +7 -5
  6. data/lib/pwn/sast/apache_file_system_util_api.rb +7 -5
  7. data/lib/pwn/sast/aws.rb +7 -5
  8. data/lib/pwn/sast/banned_function_calls_c.rb +7 -5
  9. data/lib/pwn/sast/base64.rb +7 -5
  10. data/lib/pwn/sast/beef_hook.rb +7 -5
  11. data/lib/pwn/sast/cmd_execution_java.rb +7 -5
  12. data/lib/pwn/sast/cmd_execution_python.rb +7 -5
  13. data/lib/pwn/sast/cmd_execution_ruby.rb +7 -5
  14. data/lib/pwn/sast/cmd_execution_scala.rb +7 -5
  15. data/lib/pwn/sast/csrf.rb +7 -5
  16. data/lib/pwn/sast/deserial_java.rb +7 -5
  17. data/lib/pwn/sast/emoticon.rb +7 -5
  18. data/lib/pwn/sast/eval.rb +7 -5
  19. data/lib/pwn/sast/factory.rb +7 -5
  20. data/lib/pwn/sast/http_authorization_header.rb +7 -5
  21. data/lib/pwn/sast/inner_html.rb +7 -5
  22. data/lib/pwn/sast/keystore.rb +7 -5
  23. data/lib/pwn/sast/location_hash.rb +7 -5
  24. data/lib/pwn/sast/log4j.rb +7 -5
  25. data/lib/pwn/sast/logger.rb +7 -5
  26. data/lib/pwn/sast/outer_html.rb +7 -5
  27. data/lib/pwn/sast/password.rb +7 -5
  28. data/lib/pwn/sast/pom_version.rb +12 -8
  29. data/lib/pwn/sast/port.rb +7 -5
  30. data/lib/pwn/sast/private_key.rb +7 -5
  31. data/lib/pwn/sast/redirect.rb +7 -5
  32. data/lib/pwn/sast/redos.rb +7 -5
  33. data/lib/pwn/sast/shell.rb +7 -5
  34. data/lib/pwn/sast/signature.rb +7 -5
  35. data/lib/pwn/sast/sql.rb +7 -5
  36. data/lib/pwn/sast/ssl.rb +7 -5
  37. data/lib/pwn/sast/sudo.rb +7 -5
  38. data/lib/pwn/sast/task_tag.rb +7 -5
  39. data/lib/pwn/sast/throw_errors.rb +7 -5
  40. data/lib/pwn/sast/token.rb +7 -5
  41. data/lib/pwn/sast/version.rb +7 -5
  42. data/lib/pwn/sast/window_location_hash.rb +7 -5
  43. data/lib/pwn/version.rb +1 -1
  44. data/spec/lib/pwn/sast/amqp_connect_as_guest_spec.rb +3 -3
  45. data/spec/lib/pwn/sast/apache_file_system_util_api_spec.rb +3 -3
  46. data/spec/lib/pwn/sast/aws_spec.rb +3 -3
  47. data/spec/lib/pwn/sast/banned_function_calls_c_spec.rb +3 -3
  48. data/spec/lib/pwn/sast/base64_spec.rb +3 -3
  49. data/spec/lib/pwn/sast/beef_hook_spec.rb +3 -3
  50. data/spec/lib/pwn/sast/cmd_execution_java_spec.rb +3 -3
  51. data/spec/lib/pwn/sast/cmd_execution_python_spec.rb +3 -3
  52. data/spec/lib/pwn/sast/cmd_execution_ruby_spec.rb +3 -3
  53. data/spec/lib/pwn/sast/cmd_execution_scala_spec.rb +3 -3
  54. data/spec/lib/pwn/sast/csrf_spec.rb +3 -3
  55. data/spec/lib/pwn/sast/deserial_java_spec.rb +3 -3
  56. data/spec/lib/pwn/sast/emoticon_spec.rb +3 -3
  57. data/spec/lib/pwn/sast/eval_spec.rb +3 -3
  58. data/spec/lib/pwn/sast/factory_spec.rb +3 -3
  59. data/spec/lib/pwn/sast/http_authorization_header_spec.rb +3 -3
  60. data/spec/lib/pwn/sast/inner_html_spec.rb +3 -3
  61. data/spec/lib/pwn/sast/keystore_spec.rb +3 -3
  62. data/spec/lib/pwn/sast/location_hash_spec.rb +3 -3
  63. data/spec/lib/pwn/sast/log4j_spec.rb +3 -3
  64. data/spec/lib/pwn/sast/logger_spec.rb +3 -3
  65. data/spec/lib/pwn/sast/password_spec.rb +3 -3
  66. data/spec/lib/pwn/sast/pom_version_spec.rb +3 -3
  67. data/spec/lib/pwn/sast/port_spec.rb +3 -3
  68. data/spec/lib/pwn/sast/private_key_spec.rb +3 -3
  69. data/spec/lib/pwn/sast/redirect_spec.rb +3 -3
  70. data/spec/lib/pwn/sast/redos_spec.rb +3 -3
  71. data/spec/lib/pwn/sast/shell_spec.rb +3 -3
  72. data/spec/lib/pwn/sast/signature_spec.rb +3 -3
  73. data/spec/lib/pwn/sast/sql_spec.rb +3 -3
  74. data/spec/lib/pwn/sast/ssl_spec.rb +3 -3
  75. data/spec/lib/pwn/sast/sudo_spec.rb +3 -3
  76. data/spec/lib/pwn/sast/task_tag_spec.rb +3 -3
  77. data/spec/lib/pwn/sast/throw_errors_spec.rb +3 -3
  78. data/spec/lib/pwn/sast/token_spec.rb +3 -3
  79. data/spec/lib/pwn/sast/version_spec.rb +3 -3
  80. data/spec/lib/pwn/sast/window_location_hash_spec.rb +3 -3
  81. metadata +10 -10
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 6a6c008349f134e681e62079a0e6912bc9c7e0f350302b6e8a196a94fd98b918
4
- data.tar.gz: a038d3b2003e38c91e3e95581353607fe7cf57e79f5ef98409b5f7c1a284ef50
3
+ metadata.gz: 1169e57fa12d1e0274c2c67d2970cbeb4fadcbab56cf06ddc3cd52bf3871b952
4
+ data.tar.gz: 33721901ad464045c79c006fd54843d459ed7ebbf41a9ee5c4795fc354cf7d59
5
5
  SHA512:
6
- metadata.gz: 1fedd468a222549acdc66448e86fd0a70ecf6f72cc19deeed2b1b08625c477cf3cd94dec52eff4ac2775788a2efa849352828e204bdf4915b6f1efc48c3e1cba
7
- data.tar.gz: 961ff64b129ff83c6557a1f6cb385b2078689e1cb507b6f7b16f4f508f05e5c9c6d67f3291b064120a5ff3ea66f6a730401637d84056124f57c318fbd99b8ee7
6
+ metadata.gz: a15f3517c53b04b1ea2b5e07a548d2f1591eef2ebd02707e7ec727d859662695f95edaf4764cfc719b9e70a750ed3ae60694c95bfdf81ed1ecd16dac0bd5a0ce
7
+ data.tar.gz: d49d46cf9e7b86e611b56445dca9b08823abe846f5cd13100a332d200ade4f304c170c55bc5ebacd30a45c7d8e296bf418d412999467200b68abbc360f74e31b
data/Gemfile CHANGED
@@ -11,14 +11,14 @@ gemspec
11
11
  # In some circumstances custom flags are passed to gems in order
12
12
  # to build appropriately. Defer to ./reinstall_pwn_gemset.sh
13
13
  # to review these custom flags (e.g. pg, serialport, etc).
14
- gem 'activesupport', '7.0.3'
14
+ gem 'activesupport', '7.0.3.1'
15
15
  gem 'anemone', '0.7.2'
16
16
  gem 'authy', '3.0.1'
17
17
  gem 'aws-sdk', '3.1.0'
18
18
  gem 'bettercap', '1.6.2'
19
19
  gem 'brakeman', '5.2.3'
20
20
  gem 'bson', '4.15.0'
21
- gem 'bundler', '>=2.3.17'
21
+ gem 'bundler', '>=2.3.18'
22
22
  gem 'bundler-audit', '0.9.1'
23
23
  gem 'bunny', '2.19.0'
24
24
  gem 'colorize', '0.8.1'
@@ -42,7 +42,7 @@ gem 'net-ldap', '0.17.1'
42
42
  gem 'net-openvpn', '0.8.7'
43
43
  gem 'net-smtp', '0.3.1'
44
44
  gem 'nexpose', '7.3.0'
45
- gem 'nokogiri', '1.13.6'
45
+ gem 'nokogiri', '1.13.7'
46
46
  gem 'oily_png', '1.2.1'
47
47
  gem 'os', '1.1.4'
48
48
  gem 'packetfu', '1.1.13'
@@ -67,7 +67,7 @@ gem 'ruby-nmap', '0.10.0'
67
67
  gem 'ruby-saml', '1.14.0'
68
68
  gem 'rvm', '1.11.3.9'
69
69
  gem 'savon', '2.12.1'
70
- gem 'selenium-devtools', '0.103.0'
70
+ gem 'selenium-devtools', '0.103.1'
71
71
  gem 'serialport', '1.3.2'
72
72
  gem 'sinatra', '2.2.0'
73
73
  gem 'slack-ruby-client', '1.1.0'
data/README.md CHANGED
@@ -37,7 +37,7 @@ $ rvm use ruby-3.1.2@pwn
37
37
  $ rvm list gemsets
38
38
  $ gem install --verbose pwn
39
39
  $ pwn
40
- pwn[v0.4.512]:001 >>> PWN.help
40
+ pwn[v0.4.513]:001 >>> PWN.help
41
41
  ```
42
42
 
43
43
  [![Installing the pwn Security Automation Framework](https://raw.githubusercontent.com/0dayInc/pwn/master/documentation/pwn_install.png)](https://youtu.be/G7iLUY4FzsI)
@@ -52,7 +52,7 @@ $ rvm use ruby-3.1.2@pwn
52
52
  $ gem uninstall --all --executables pwn
53
53
  $ gem install --verbose pwn
54
54
  $ pwn
55
- pwn[v0.4.512]:001 >>> PWN.help
55
+ pwn[v0.4.513]:001 >>> PWN.help
56
56
  ```
57
57
 
58
58
 
@@ -101,7 +101,7 @@ module PWN
101
101
  <div>
102
102
  <b>Toggle Column(s):</b>&nbsp;
103
103
  <a class="toggle-vis" data-column="1" href="#">Timestamp</a>&nbsp;|&nbsp;
104
- <a class="toggle-vis" data-column="2" href="#">Test Case / Security Requirements</a>&nbsp;|&nbsp;
104
+ <a class="toggle-vis" data-column="2" href="#">Test Case / Security References</a>&nbsp;|&nbsp;
105
105
  <a class="toggle-vis" data-column="3" href="#">Path</a>&nbsp;|&nbsp;
106
106
  <a class="toggle-vis" data-column="4" href="#">Line#, Formatted Content, &amp; Last Committed By</a>&nbsp;|&nbsp;
107
107
  <a class="toggle-vis" data-column="5" href="#">Raw Content</a>&nbsp;|&nbsp;
@@ -115,7 +115,7 @@ module PWN
115
115
  <tr>
116
116
  <th>#</th>
117
117
  <th>Timestamp</th>
118
- <th>Test Case / Security Requirements</th>
118
+ <th>Test Case / Security References</th>
119
119
  <th>Path</th>
120
120
  <th>Line#, Formatted Content, &amp; Last Committed By</th>
121
121
  <th>Raw Content</th>
@@ -170,7 +170,7 @@ module PWN
170
170
  "render": $.fn.dataTable.render.text()
171
171
  },
172
172
  {
173
- "data": "security_requirements",
173
+ "data": "security_references",
174
174
  "render": function (data, type, row, meta) {
175
175
  var sast_dirname = data['sast_module'].split('::')[0].toLowerCase() + '/' + data['sast_module'].split('::')[1].toLowerCase();
176
176
  var sast_module = data['sast_module'].split('::')[2];
@@ -203,7 +203,7 @@ module PWN
203
203
 
204
204
  var bug_comment = 'Timestamp: ' + row.timestamp + '\n' +
205
205
  'Test Case: http://' + window.location.hostname + ':8808/doc_root/pwn-0.1.0/' +
206
- row.security_requirements['sast_module'].replace(/::/g, "/") + '\n' +
206
+ row.security_references['sast_module'].replace(/::/g, "/") + '\n' +
207
207
  'Source Code Impacted: ' + $("<div/>").html(filename_link).text() + '\n\n' +
208
208
  'Test Case Request:\n' +
209
209
  $("<div/>").html(row.test_case_filter.replace(/\s{2,}/g, " ")).text() + '\n\n' +
@@ -49,7 +49,7 @@ module PWN
49
49
 
50
50
  hash_line = {
51
51
  timestamp: Time.now.strftime('%Y-%m-%d %H:%M:%S.%9N %z').to_s,
52
- security_requirements: security_requirements,
52
+ security_references: security_references,
53
53
  filename: { git_repo_root_uri: git_repo_root_uri, entry: entry },
54
54
  line_no_and_contents: '',
55
55
  raw_content: str,
@@ -78,9 +78,11 @@ module PWN
78
78
  else
79
79
  author = 'N/A'
80
80
  end
81
- hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(line_no: line_no,
82
- contents: contents,
83
- author: author)
81
+ hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(
82
+ line_no: line_no,
83
+ contents: contents,
84
+ author: author
85
+ )
84
86
  current_count += 2
85
87
  end
86
88
  result_arr.push(hash_line)
@@ -104,7 +106,7 @@ module PWN
104
106
  # to PWN Exploit & Static Code Anti-Pattern Matching Modules to
105
107
  # Determine the level of Testing Coverage w/ PWN.
106
108
 
107
- public_class_method def self.security_requirements
109
+ public_class_method def self.security_references
108
110
  {
109
111
  sast_module: self,
110
112
  section: 'ACCOUNT MANAGEMENT',
@@ -48,7 +48,7 @@ module PWN
48
48
 
49
49
  hash_line = {
50
50
  timestamp: Time.now.strftime('%Y-%m-%d %H:%M:%S.%9N %z').to_s,
51
- security_requirements: security_requirements,
51
+ security_references: security_references,
52
52
  filename: { git_repo_root_uri: git_repo_root_uri, entry: entry },
53
53
  line_no_and_contents: '',
54
54
  raw_content: str,
@@ -78,9 +78,11 @@ module PWN
78
78
  else
79
79
  author = 'N/A'
80
80
  end
81
- hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(line_no: line_no,
82
- contents: contents,
83
- author: author)
81
+ hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(
82
+ line_no: line_no,
83
+ contents: contents,
84
+ author: author
85
+ )
84
86
 
85
87
  current_count += 2
86
88
  end
@@ -105,7 +107,7 @@ module PWN
105
107
  # to PWN Exploit & Static Code Anti-Pattern Matching Modules to
106
108
  # Determine the level of Testing Coverage w/ PWN.
107
109
 
108
- public_class_method def self.security_requirements
110
+ public_class_method def self.security_references
109
111
  {
110
112
  sast_module: self,
111
113
  section: 'INFORMATION INPUT VALIDATION',
data/lib/pwn/sast/aws.rb CHANGED
@@ -49,7 +49,7 @@ module PWN
49
49
 
50
50
  hash_line = {
51
51
  timestamp: Time.now.strftime('%Y-%m-%d %H:%M:%S.%9N %z').to_s,
52
- security_requirements: security_requirements,
52
+ security_references: security_references,
53
53
  filename: { git_repo_root_uri: git_repo_root_uri, entry: entry },
54
54
  line_no_and_contents: '',
55
55
  raw_content: str,
@@ -79,9 +79,11 @@ module PWN
79
79
  else
80
80
  author = 'N/A'
81
81
  end
82
- hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(line_no: line_no,
83
- contents: contents,
84
- author: author)
82
+ hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(
83
+ line_no: line_no,
84
+ contents: contents,
85
+ author: author
86
+ )
85
87
 
86
88
  current_count += 2
87
89
  end
@@ -106,7 +108,7 @@ module PWN
106
108
  # to PWN Exploit & Static Code Anti-Pattern Matching Modules to
107
109
  # Determine the level of Testing Coverage w/ PWN.
108
110
 
109
- public_class_method def self.security_requirements
111
+ public_class_method def self.security_references
110
112
  {
111
113
  sast_module: self,
112
114
  section: 'TRANSMISSION CONFIDENTIALITY AND INTEGRITY',
@@ -176,7 +176,7 @@ module PWN
176
176
 
177
177
  hash_line = {
178
178
  timestamp: Time.now.strftime('%Y-%m-%d %H:%M:%S.%9N %z').to_s,
179
- security_requirements: security_requirements,
179
+ security_references: security_references,
180
180
  filename: { git_repo_root_uri: git_repo_root_uri, entry: entry },
181
181
  line_no_and_contents: '',
182
182
  raw_content: str,
@@ -206,9 +206,11 @@ module PWN
206
206
  else
207
207
  author = 'N/A'
208
208
  end
209
- hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(line_no: line_no,
210
- contents: contents,
211
- author: author)
209
+ hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(
210
+ line_no: line_no,
211
+ contents: contents,
212
+ author: author
213
+ )
212
214
 
213
215
  current_count += 2
214
216
  end
@@ -233,7 +235,7 @@ module PWN
233
235
  # to PWN Exploit & Static Code Anti-Pattern Matching Modules to
234
236
  # Determine the level of Testing Coverage w/ PWN.
235
237
 
236
- public_class_method def self.security_requirements
238
+ public_class_method def self.security_references
237
239
  {
238
240
  sast_module: self,
239
241
  section: 'INFORMATION INPUT VALIDATION',
@@ -50,7 +50,7 @@ module PWN
50
50
 
51
51
  hash_line = {
52
52
  timestamp: Time.now.strftime('%Y-%m-%d %H:%M:%S.%9N %z').to_s,
53
- security_requirements: security_requirements,
53
+ security_references: security_references,
54
54
  filename: { git_repo_root_uri: git_repo_root_uri, entry: entry },
55
55
  line_no_and_contents: '',
56
56
  raw_content: str,
@@ -80,9 +80,11 @@ module PWN
80
80
  else
81
81
  author = 'N/A'
82
82
  end
83
- hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(line_no: line_no,
84
- contents: contents,
85
- author: author)
83
+ hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(
84
+ line_no: line_no,
85
+ contents: contents,
86
+ author: author
87
+ )
86
88
 
87
89
  current_count += 2
88
90
  end
@@ -104,7 +106,7 @@ module PWN
104
106
 
105
107
  # Used to dictate Security Control Requirements for a Given SAST module.
106
108
 
107
- public_class_method def self.security_requirements
109
+ public_class_method def self.security_references
108
110
  {
109
111
  sast_module: self,
110
112
  section: 'PROTECTION OF INFORMATION AT REST',
@@ -44,7 +44,7 @@ module PWN
44
44
 
45
45
  hash_line = {
46
46
  timestamp: Time.now.strftime('%Y-%m-%d %H:%M:%S.%9N %z').to_s,
47
- security_requirements: security_requirements,
47
+ security_references: security_references,
48
48
  filename: { git_repo_root_uri: git_repo_root_uri, entry: entry },
49
49
  line_no_and_contents: '',
50
50
  raw_content: str,
@@ -74,9 +74,11 @@ module PWN
74
74
  else
75
75
  author = 'N/A'
76
76
  end
77
- hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(line_no: line_no,
78
- contents: contents,
79
- author: author)
77
+ hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(
78
+ line_no: line_no,
79
+ contents: contents,
80
+ author: author
81
+ )
80
82
 
81
83
  current_count += 2
82
84
  end
@@ -101,7 +103,7 @@ module PWN
101
103
  # to PWN Exploit & Static Code Anti-Pattern Matching Modules to
102
104
  # Determine the level of Testing Coverage w/ PWN.
103
105
 
104
- public_class_method def self.security_requirements
106
+ public_class_method def self.security_references
105
107
  {
106
108
  sast_module: self,
107
109
  section: 'MALICIOUS CODE PROTECTION',
@@ -49,7 +49,7 @@ module PWN
49
49
 
50
50
  hash_line = {
51
51
  timestamp: Time.now.strftime('%Y-%m-%d %H:%M:%S.%9N %z').to_s,
52
- security_requirements: security_requirements,
52
+ security_references: security_references,
53
53
  filename: { git_repo_root_uri: git_repo_root_uri, entry: entry },
54
54
  line_no_and_contents: '',
55
55
  raw_content: str,
@@ -79,9 +79,11 @@ module PWN
79
79
  else
80
80
  author = 'N/A'
81
81
  end
82
- hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(line_no: line_no,
83
- contents: contents,
84
- author: author)
82
+ hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(
83
+ line_no: line_no,
84
+ contents: contents,
85
+ author: author
86
+ )
85
87
 
86
88
  current_count += 2
87
89
  end
@@ -106,7 +108,7 @@ module PWN
106
108
  # to PWN Exploit & Static Code Anti-Pattern Matching Modules to
107
109
  # Determine the level of Testing Coverage w/ PWN.
108
110
 
109
- public_class_method def self.security_requirements
111
+ public_class_method def self.security_references
110
112
  {
111
113
  sast_module: self,
112
114
  section: 'INFORMATION INPUT VALIDATION',
@@ -51,7 +51,7 @@ module PWN
51
51
 
52
52
  hash_line = {
53
53
  timestamp: Time.now.strftime('%Y-%m-%d %H:%M:%S.%9N %z').to_s,
54
- security_requirements: security_requirements,
54
+ security_references: security_references,
55
55
  filename: { git_repo_root_uri: git_repo_root_uri, entry: entry },
56
56
  line_no_and_contents: '',
57
57
  raw_content: str,
@@ -81,9 +81,11 @@ module PWN
81
81
  else
82
82
  author = 'N/A'
83
83
  end
84
- hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(line_no: line_no,
85
- contents: contents,
86
- author: author)
84
+ hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(
85
+ line_no: line_no,
86
+ contents: contents,
87
+ author: author
88
+ )
87
89
 
88
90
  current_count += 2
89
91
  end
@@ -108,7 +110,7 @@ module PWN
108
110
  # to PWN Exploit & Static Code Anti-Pattern Matching Modules to
109
111
  # Determine the level of Testing Coverage w/ PWN.
110
112
 
111
- public_class_method def self.security_requirements
113
+ public_class_method def self.security_references
112
114
  {
113
115
  sast_module: self,
114
116
  section: 'INFORMATION INPUT VALIDATION',
@@ -59,7 +59,7 @@ module PWN
59
59
 
60
60
  hash_line = {
61
61
  timestamp: Time.now.strftime('%Y-%m-%d %H:%M:%S.%9N %z').to_s,
62
- security_requirements: security_requirements,
62
+ security_references: security_references,
63
63
  filename: { git_repo_root_uri: git_repo_root_uri, entry: entry },
64
64
  line_no_and_contents: '',
65
65
  raw_content: str,
@@ -89,9 +89,11 @@ module PWN
89
89
  else
90
90
  author = 'N/A'
91
91
  end
92
- hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(line_no: line_no,
93
- contents: contents,
94
- author: author)
92
+ hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(
93
+ line_no: line_no,
94
+ contents: contents,
95
+ author: author
96
+ )
95
97
 
96
98
  current_count += 2
97
99
  end
@@ -116,7 +118,7 @@ module PWN
116
118
  # to PWN Exploit & Static Code Anti-Pattern Matching Modules to
117
119
  # Determine the level of Testing Coverage w/ PWN.
118
120
 
119
- public_class_method def self.security_requirements
121
+ public_class_method def self.security_references
120
122
  {
121
123
  sast_module: self,
122
124
  section: 'INFORMATION INPUT VALIDATION',
@@ -49,7 +49,7 @@ module PWN
49
49
 
50
50
  hash_line = {
51
51
  timestamp: Time.now.strftime('%Y-%m-%d %H:%M:%S.%9N %z').to_s,
52
- security_requirements: security_requirements,
52
+ security_references: security_references,
53
53
  filename: { git_repo_root_uri: git_repo_root_uri, entry: entry },
54
54
  line_no_and_contents: '',
55
55
  raw_content: str,
@@ -79,9 +79,11 @@ module PWN
79
79
  else
80
80
  author = 'N/A'
81
81
  end
82
- hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(line_no: line_no,
83
- contents: contents,
84
- author: author)
82
+ hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(
83
+ line_no: line_no,
84
+ contents: contents,
85
+ author: author
86
+ )
85
87
 
86
88
  current_count += 2
87
89
  end
@@ -106,7 +108,7 @@ module PWN
106
108
  # to PWN Exploit & Static Code Anti-Pattern Matching Modules to
107
109
  # Determine the level of Testing Coverage w/ PWN.
108
110
 
109
- public_class_method def self.security_requirements
111
+ public_class_method def self.security_references
110
112
  {
111
113
  sast_module: self,
112
114
  section: 'INFORMATION INPUT VALIDATION',
data/lib/pwn/sast/csrf.rb CHANGED
@@ -47,7 +47,7 @@ module PWN
47
47
 
48
48
  hash_line = {
49
49
  timestamp: Time.now.strftime('%Y-%m-%d %H:%M:%S.%9N %z').to_s,
50
- security_requirements: security_requirements,
50
+ security_references: security_references,
51
51
  filename: { git_repo_root_uri: git_repo_root_uri, entry: entry },
52
52
  line_no_and_contents: '',
53
53
  raw_content: str,
@@ -77,9 +77,11 @@ module PWN
77
77
  else
78
78
  author = 'N/A'
79
79
  end
80
- hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(line_no: line_no,
81
- contents: contents,
82
- author: author)
80
+ hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(
81
+ line_no: line_no,
82
+ contents: contents,
83
+ author: author
84
+ )
83
85
 
84
86
  current_count += 2
85
87
  end
@@ -102,7 +104,7 @@ module PWN
102
104
  # to PWN Exploit & Static Code Anti-Pattern Matching Modules to
103
105
  # Determine the level of Testing Coverage w/ PWN.
104
106
 
105
- public_class_method def self.security_requirements
107
+ public_class_method def self.security_references
106
108
  {
107
109
  sast_module: self,
108
110
  section: 'MALICIOUS CODE PROTECTION',
@@ -46,7 +46,7 @@ module PWN
46
46
 
47
47
  hash_line = {
48
48
  timestamp: Time.now.strftime('%Y-%m-%d %H:%M:%S.%9N %z').to_s,
49
- security_requirements: security_requirements,
49
+ security_references: security_references,
50
50
  filename: { git_repo_root_uri: git_repo_root_uri, entry: entry },
51
51
  line_no_and_contents: '',
52
52
  raw_content: str,
@@ -76,9 +76,11 @@ module PWN
76
76
  else
77
77
  author = 'N/A'
78
78
  end
79
- hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(line_no: line_no,
80
- contents: contents,
81
- author: author)
79
+ hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(
80
+ line_no: line_no,
81
+ contents: contents,
82
+ author: author
83
+ )
82
84
 
83
85
  current_count += 2
84
86
  end
@@ -101,7 +103,7 @@ module PWN
101
103
  # to PWN Exploit & Static Code Anti-Pattern Matching Modules to
102
104
  # Determine the level of Testing Coverage w/ PWN.
103
105
 
104
- public_class_method def self.security_requirements
106
+ public_class_method def self.security_references
105
107
  {
106
108
  sast_module: self,
107
109
  section: 'INFORMATION INPUT VALIDATION',
@@ -51,7 +51,7 @@ module PWN
51
51
 
52
52
  hash_line = {
53
53
  timestamp: Time.now.strftime('%Y-%m-%d %H:%M:%S.%9N %z').to_s,
54
- security_requirements: security_requirements,
54
+ security_references: security_references,
55
55
  filename: { git_repo_root_uri: git_repo_root_uri, entry: entry },
56
56
  line_no_and_contents: '',
57
57
  raw_content: str,
@@ -81,9 +81,11 @@ module PWN
81
81
  else
82
82
  author = 'N/A'
83
83
  end
84
- hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(line_no: line_no,
85
- contents: contents,
86
- author: author)
84
+ hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(
85
+ line_no: line_no,
86
+ contents: contents,
87
+ author: author
88
+ )
87
89
 
88
90
  current_count += 2
89
91
  end
@@ -109,7 +111,7 @@ module PWN
109
111
  # to PWN Exploit & Static Code Anti-Pattern Matching Modules to
110
112
  # Determine the level of Testing Coverage w/ PWN.
111
113
 
112
- public_class_method def self.security_requirements
114
+ public_class_method def self.security_references
113
115
  {
114
116
  sast_module: self,
115
117
  section: 'LEAST PRIVILEGE',
data/lib/pwn/sast/eval.rb CHANGED
@@ -47,7 +47,7 @@ module PWN
47
47
 
48
48
  hash_line = {
49
49
  timestamp: Time.now.strftime('%Y-%m-%d %H:%M:%S.%9N %z').to_s,
50
- security_requirements: security_requirements,
50
+ security_references: security_references,
51
51
  filename: { git_repo_root_uri: git_repo_root_uri, entry: entry },
52
52
  line_no_and_contents: '',
53
53
  raw_content: str,
@@ -77,9 +77,11 @@ module PWN
77
77
  else
78
78
  author = 'N/A'
79
79
  end
80
- hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(line_no: line_no,
81
- contents: contents,
82
- author: author)
80
+ hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(
81
+ line_no: line_no,
82
+ contents: contents,
83
+ author: author
84
+ )
83
85
 
84
86
  current_count += 2
85
87
  end
@@ -104,7 +106,7 @@ module PWN
104
106
  # to PWN Exploit & Static Code Anti-Pattern Matching Modules to
105
107
  # Determine the level of Testing Coverage w/ PWN.
106
108
 
107
- public_class_method def self.security_requirements
109
+ public_class_method def self.security_references
108
110
  {
109
111
  sast_module: self,
110
112
  section: 'MALICIOUS CODE PROTECTION',
@@ -46,7 +46,7 @@ module PWN
46
46
 
47
47
  hash_line = {
48
48
  timestamp: Time.now.strftime('%Y-%m-%d %H:%M:%S.%9N %z').to_s,
49
- security_requirements: security_requirements,
49
+ security_references: security_references,
50
50
  filename: { git_repo_root_uri: git_repo_root_uri, entry: entry },
51
51
  line_no_and_contents: '',
52
52
  raw_content: str,
@@ -76,9 +76,11 @@ module PWN
76
76
  else
77
77
  author = 'N/A'
78
78
  end
79
- hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(line_no: line_no,
80
- contents: contents,
81
- author: author)
79
+ hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(
80
+ line_no: line_no,
81
+ contents: contents,
82
+ author: author
83
+ )
82
84
 
83
85
  current_count += 2
84
86
  end
@@ -101,7 +103,7 @@ module PWN
101
103
  # to PWN Exploit & Static Code Anti-Pattern Matching Modules to
102
104
  # Determine the level of Testing Coverage w/ PWN.
103
105
 
104
- public_class_method def self.security_requirements
106
+ public_class_method def self.security_references
105
107
  {
106
108
  sast_module: self,
107
109
  section: 'DEVELOPER CONFIGURATION MANAGEMENT',
@@ -56,7 +56,7 @@ module PWN
56
56
 
57
57
  hash_line = {
58
58
  timestamp: Time.now.strftime('%Y-%m-%d %H:%M:%S.%9N %z').to_s,
59
- security_requirements: security_requirements,
59
+ security_references: security_references,
60
60
  filename: { git_repo_root_uri: git_repo_root_uri, entry: entry },
61
61
  line_no_and_contents: '',
62
62
  raw_content: str,
@@ -86,9 +86,11 @@ module PWN
86
86
  else
87
87
  author = 'N/A'
88
88
  end
89
- hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(line_no: line_no,
90
- contents: contents,
91
- author: author)
89
+ hash_line[:line_no_and_contents] = line_no_and_contents_arr.push(
90
+ line_no: line_no,
91
+ contents: contents,
92
+ author: author
93
+ )
92
94
 
93
95
  current_count += 2
94
96
  end
@@ -111,7 +113,7 @@ module PWN
111
113
  # to PWN Exploit & Static Code Anti-Pattern Matching Modules to
112
114
  # Determine the level of Testing Coverage w/ PWN.
113
115
 
114
- public_class_method def self.security_requirements
116
+ public_class_method def self.security_references
115
117
  {
116
118
  sast_module: self,
117
119
  section: 'PROTECTION OF INFORMATION AT REST',