regscale-cli 6.27.0.0__py3-none-any.whl → 6.27.1.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of regscale-cli might be problematic. Click here for more details.

regscale/_version.py CHANGED
@@ -33,7 +33,7 @@ def get_version_from_pyproject() -> str:
33
33
  return match.group(1)
34
34
  except Exception:
35
35
  pass
36
- return "6.27.0.0" # fallback version
36
+ return "6.27.1.0" # fallback version
37
37
 
38
38
 
39
39
  __version__ = get_version_from_pyproject()
@@ -489,7 +489,6 @@ show_mapping(veracode, "veracode")
489
489
  "inventory": "regscale.integrations.commercial.wizv2.click.inventory",
490
490
  "issues": "regscale.integrations.commercial.wizv2.click.issues",
491
491
  "attach_sbom": "regscale.integrations.commercial.wizv2.click.attach_sbom",
492
- "threats": "regscale.integrations.commercial.wizv2.click.threats",
493
492
  "vulnerabilities": "regscale.integrations.commercial.wizv2.click.vulnerabilities",
494
493
  "add_report_evidence": "regscale.integrations.commercial.wizv2.click.add_report_evidence",
495
494
  "sync_compliance": "regscale.integrations.commercial.wizv2.click.sync_compliance",
@@ -1,9 +1,97 @@
1
1
  {
2
2
  "title": "CISA Catalog of Known Exploited Vulnerabilities",
3
- "catalogVersion": "2025.10.09",
4
- "dateReleased": "2025-10-09T16:52:28.6547Z",
5
- "count": 1436,
3
+ "catalogVersion": "2025.10.15",
4
+ "dateReleased": "2025-10-15T18:34:38.9479Z",
5
+ "count": 1442,
6
6
  "vulnerabilities": [
7
+ {
8
+ "cveID": "CVE-2025-54253",
9
+ "vendorProject": "Adobe",
10
+ "product": "Experience Manager (AEM) Forms",
11
+ "vulnerabilityName": "Adobe Experience Manager Forms Code Execution Vulnerability",
12
+ "dateAdded": "2025-10-15",
13
+ "shortDescription": "Adobe Experience Manager Forms in JEE contains an unspecified vulnerability that allows for arbitrary code execution.",
14
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
15
+ "dueDate": "2025-11-05",
16
+ "knownRansomwareCampaignUse": "Unknown",
17
+ "notes": "https:\/\/helpx.adobe.com\/security\/products\/aem-forms\/apsb25-82.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-54253",
18
+ "cwes": []
19
+ },
20
+ {
21
+ "cveID": "CVE-2025-47827",
22
+ "vendorProject": "IGEL",
23
+ "product": "IGEL OS",
24
+ "vulnerabilityName": "IGEL OS Use of a Key Past its Expiration Date Vulnerability",
25
+ "dateAdded": "2025-10-14",
26
+ "shortDescription": "IGEL OS contains a use of a key past its expiration date vulnerability that allows for Secure Boot bypass. The igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image.",
27
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
28
+ "dueDate": "2025-11-04",
29
+ "knownRansomwareCampaignUse": "Unknown",
30
+ "notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-47827 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-47827",
31
+ "cwes": [
32
+ "CWE-324"
33
+ ]
34
+ },
35
+ {
36
+ "cveID": "CVE-2025-24990",
37
+ "vendorProject": "Microsoft",
38
+ "product": "Windows",
39
+ "vulnerabilityName": "Microsoft Windows Untrusted Pointer Dereference Vulnerability",
40
+ "dateAdded": "2025-10-14",
41
+ "shortDescription": "Microsoft Windows Agere Modem Driver contains an untrusted pointer dereference vulnerability that allows for privilege escalation. An attacker who successfully exploited this vulnerability could gain administrator privileges.",
42
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
43
+ "dueDate": "2025-11-04",
44
+ "knownRansomwareCampaignUse": "Unknown",
45
+ "notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-24990 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24990",
46
+ "cwes": [
47
+ "CWE-822"
48
+ ]
49
+ },
50
+ {
51
+ "cveID": "CVE-2025-59230",
52
+ "vendorProject": "Microsoft",
53
+ "product": "Windows",
54
+ "vulnerabilityName": "Microsoft Windows Improper Access Control Vulnerability",
55
+ "dateAdded": "2025-10-14",
56
+ "shortDescription": "Microsoft Windows contains an improper access control vulnerability in Windows Remote Access Connection Manager which could allow an authorized attacker to elevate privileges locally.",
57
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
58
+ "dueDate": "2025-11-04",
59
+ "knownRansomwareCampaignUse": "Unknown",
60
+ "notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-59230 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-59230",
61
+ "cwes": [
62
+ "CWE-284"
63
+ ]
64
+ },
65
+ {
66
+ "cveID": "CVE-2025-6264",
67
+ "vendorProject": "Rapid7",
68
+ "product": "Velociraptor",
69
+ "vulnerabilityName": "Rapid7 Velociraptor Incorrect Default Permissions Vulnerability",
70
+ "dateAdded": "2025-10-14",
71
+ "shortDescription": "Rapid7 Velociraptor contains an incorrect default permissions vulnerability that can lead to arbitrary command execution and endpoint takeover. To successfully exploit this vulnerability the user must already have access to collect artifacts from the endpoint.",
72
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
73
+ "dueDate": "2025-11-04",
74
+ "knownRansomwareCampaignUse": "Known",
75
+ "notes": "https:\/\/docs.velociraptor.app\/announcements\/advisories\/cve-2025-6264\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-6264",
76
+ "cwes": [
77
+ "CWE-276"
78
+ ]
79
+ },
80
+ {
81
+ "cveID": "CVE-2016-7836",
82
+ "vendorProject": "SKYSEA",
83
+ "product": "Client View",
84
+ "vulnerabilityName": "SKYSEA Client View Improper Authentication Vulnerability",
85
+ "dateAdded": "2025-10-14",
86
+ "shortDescription": "SKYSEA Client View contains an improper authentication vulnerability that allows remote code execution via a flaw in processing authentication on the TCP connection with the management console program.",
87
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
88
+ "dueDate": "2025-11-04",
89
+ "knownRansomwareCampaignUse": "Unknown",
90
+ "notes": "https:\/\/www.skyseaclientview.net\/news\/161221\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-7836",
91
+ "cwes": [
92
+ "CWE-287"
93
+ ]
94
+ },
7
95
  {
8
96
  "cveID": "CVE-2021-43798",
9
97
  "vendorProject": "Grafana Labs",
@@ -122,16 +122,6 @@ class Vulnerabilities(SynqlyModel):
122
122
  if asset_filter:
123
123
  self.logger.debug(f"Asset filter: {asset_filter}")
124
124
 
125
- self.logger.info(f"Fetching vulnerability data from {self.integration_name}...")
126
- findings = (
127
- self.fetch_integration_data(
128
- func=self.tenant.engine_client.vulnerabilities.query_findings,
129
- filter=vuln_filter, # Only severity/date filters for findings
130
- **kwargs,
131
- )
132
- if self.can_fetch_vulns
133
- else []
134
- )
135
125
  self.logger.info(f"Fetching asset data from {self.integration_name}...")
136
126
  assets = (
137
127
  self.fetch_integration_data(
@@ -143,6 +133,17 @@ class Vulnerabilities(SynqlyModel):
143
133
  else []
144
134
  )
145
135
 
136
+ self.logger.info(f"Fetching vulnerability data from {self.integration_name}...")
137
+ findings = (
138
+ self.fetch_integration_data(
139
+ func=self.tenant.engine_client.vulnerabilities.query_findings,
140
+ filter=vuln_filter, # Only severity/date filters for findings
141
+ **kwargs,
142
+ )
143
+ if self.can_fetch_vulns
144
+ else []
145
+ )
146
+
146
147
  self.scanner_integration = VulnerabilitiesIntegration(plan_id=regscale_ssp_id)
147
148
  self.logger.info(f"Mapping {self.provider} asset(s) data to RegScale asset(s)...")
148
149
  if assets:
@@ -5,7 +5,11 @@ from typing import Any, Union, TYPE_CHECKING, Optional
5
5
 
6
6
  if TYPE_CHECKING:
7
7
  from regscale.models.integration_models.synqly_models.connectors import Edr, Ticketing, Vulnerabilities
8
- from synqly.engine.resources.ocsf.resources.v_1_3_0.resources.securityfinding import ResourceDetails, Vulnerability
8
+ from synqly.engine.resources.ocsf.resources.v_1_3_0.resources.securityfinding import (
9
+ Finding,
10
+ ResourceDetails,
11
+ Vulnerability,
12
+ )
9
13
 
10
14
  from synqly import engine
11
15
  from synqly.engine import CreateTicketRequest
@@ -152,7 +156,39 @@ class Mapper:
152
156
  )
153
157
 
154
158
  @staticmethod
155
- def _parse_finding_data(finding: "SecurityFinding", vuln: Optional["Vulnerability"] = None) -> dict:
159
+ def _determine_date(
160
+ attribute: str, finding: Optional["Finding"] = None, vuln: Optional["Vulnerability"] = None
161
+ ) -> datetime:
162
+ """
163
+ Determine the date based on the provided vulnerability or finding
164
+
165
+ :param str attribute: The attribute to determine the date for
166
+ :param Optional[SecurityFinding] finding: The finding to determine the date for
167
+ :param Optional[Vulnerability] vuln: The vulnerability to determine the date for
168
+ :return: The date
169
+ :rtype: datetime
170
+ """
171
+ from regscale.core.utils.date import normalize_timestamp
172
+
173
+ vuln_date = getattr(vuln, attribute) if vuln else None
174
+ fallback_vuln_date = getattr(vuln, attribute.replace("_dt", ""), None) if vuln else None
175
+ finding_date = getattr(finding, attribute) if finding else None
176
+ fallback_finding_date = getattr(finding, attribute.replace("_dt", ""), None) if finding else None
177
+ if vuln_date:
178
+ return vuln_date
179
+ elif finding_date:
180
+ return finding_date
181
+ # No datetime objects, lets try the epoch integers
182
+ if fallback_vuln_date:
183
+ fallback_vuln_date = normalize_timestamp(fallback_vuln_date)
184
+ return datetime.fromtimestamp(fallback_vuln_date)
185
+ elif fallback_finding_date:
186
+ fallback_finding_date = normalize_timestamp(fallback_finding_date)
187
+ return datetime.fromtimestamp(fallback_finding_date)
188
+ else:
189
+ return datetime.now()
190
+
191
+ def _parse_finding_data(self, finding: "SecurityFinding", vuln: Optional["Vulnerability"] = None) -> dict:
156
192
  """
157
193
  Parse the data from the SecurityFinding object
158
194
 
@@ -164,16 +200,20 @@ class Mapper:
164
200
 
165
201
  finding_data = {
166
202
  "cve": None,
167
- "first_seen": vuln.first_seen_time_dt if vuln else finding.finding.first_seen_time_dt,
168
- "last_seen": vuln.last_seen_time_dt if vuln else finding.finding.last_seen_time_dt,
203
+ "first_seen": self._determine_date("first_seen_time_dt", getattr(finding, "finding", None), vuln),
204
+ "last_seen": self._determine_date("last_seen_time_dt", getattr(finding, "finding", None), vuln),
169
205
  "plugin_id": vuln.cve.uid if vuln else finding.finding.product_uid,
170
- "severity": int(vuln.severity) if vuln else finding.severity_id,
206
+ "severity": vuln.severity if vuln and getattr(vuln, "severity") else finding.severity_id,
171
207
  "remediation": getattr(vuln, "remediation") if vuln else finding.finding.remediation.desc,
172
208
  }
173
209
  if vuln:
174
210
  finding_data["cve"] = vuln.cve.uid
175
211
  else:
176
212
  finding_data["cve"] = finding.finding.title if "cve" in finding.finding.title.lower() else None
213
+ try:
214
+ finding_data["severity"] = int(finding_data["severity"])
215
+ except ValueError:
216
+ finding_data["severity"] = 0
177
217
  if isinstance(finding_data["remediation"], Remediation):
178
218
  finding_data["remediation"] = finding_data["remediation"].desc
179
219
  elif isinstance(finding_data["remediation"], dict):
@@ -227,9 +267,9 @@ class Mapper:
227
267
  """
228
268
  base = vuln if vuln else finding.finding
229
269
  finding_data = self._parse_finding_data(finding, vuln)
230
- if resource.data:
231
- dns = resource.data.get("hostname")
232
- ip_address = resource.data.get("ipv4")
270
+ if resource_data := getattr(resource, "data"):
271
+ dns = resource_data.get("hostname")
272
+ ip_address = resource_data.get("ipv4")
233
273
  else:
234
274
  dns = resource.uid if vuln else None
235
275
  ip_address = None
@@ -700,10 +700,7 @@ class SynqlyModel(BaseModel, ABC):
700
700
  if query_filter:
701
701
  query_filter = self.validate_filters(query_filter)
702
702
  integration_data: list = []
703
- fetch_res = func(
704
- filter=query_filter,
705
- limit=limit,
706
- )
703
+ fetch_res = self._fetch_data_with_retries(func=func, limit=limit, filter=query_filter)
707
704
  self.logger.info(f"Received {len(fetch_res.result)} record(s) from {self.integration_name}.")
708
705
  integration_data.extend(fetch_res.result)
709
706
  # check and handle pagination
@@ -711,24 +708,49 @@ class SynqlyModel(BaseModel, ABC):
711
708
  try:
712
709
  # fetch.cursor can be an int as a string, or a continuation token
713
710
  while int(fetch_res.cursor) == len(integration_data):
714
- fetch_res = func(
715
- filter=query_filter,
716
- limit=limit,
717
- cursor=fetch_res.cursor,
711
+ fetch_res = self._fetch_data_with_retries(
712
+ func=func, limit=limit, cursor=fetch_res.cursor, filter=query_filter
718
713
  )
719
714
  integration_data.extend(fetch_res.result)
720
715
  except ValueError:
721
716
  while fetch_res.cursor:
722
- fetch_res = func(
723
- filter=query_filter,
724
- limit=limit,
725
- cursor=fetch_res.cursor,
717
+ fetch_res = self._fetch_data_with_retries(
718
+ func=func, limit=limit, cursor=fetch_res.cursor, filter=query_filter
726
719
  )
727
720
  integration_data.extend(fetch_res.result)
728
721
  self.logger.info(f"Received {len(integration_data)} record(s) from {self.integration_name}...")
729
722
  self.logger.info(f"Fetched {len(integration_data)} total record(s) from {self.integration_name}...")
730
723
  return integration_data
731
724
 
725
+ def _fetch_data_with_retries(
726
+ self, func: Callable, limit: int, cursor: Union[str, int, None] = None, filter: Optional[str] = None
727
+ ) -> Any:
728
+ """
729
+ Fetches data from the integration using the provided function and handles pagination
730
+
731
+ :param Callable func: The function to fetch data from the integration
732
+ :param int limit: The limit of records to fetch
733
+ :param Optional[str] filter: The filter to apply to the data
734
+ :return: The data from the integration
735
+ :rtype: Any
736
+ """
737
+ import time
738
+
739
+ retries = 0
740
+ sleep_timers = [10, 20, 40]
741
+ while retries < 3:
742
+ try:
743
+ if cursor:
744
+ return func(limit=limit, filter=filter, cursor=cursor)
745
+ else:
746
+ return func(limit=limit, filter=filter)
747
+ except Exception as e:
748
+ self.logger.error(f"Error fetching data with retries: {e}")
749
+ self.logger.error(f"Retrying in {sleep_timers[retries]} seconds...")
750
+ time.sleep(sleep_timers[retries])
751
+ retries += 1
752
+ error_and_exit("Failed to fetch data after 3 retries")
753
+
732
754
  def run_integration_sync(self, *args, **kwargs) -> None:
733
755
  """
734
756
  Runs the sync process for the integration
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: regscale-cli
3
- Version: 6.27.0.0
3
+ Version: 6.27.1.0
4
4
  Summary: Command Line Interface (CLI) for bulk processing/loading data into RegScale
5
5
  Home-page: https://github.com/RegScale/regscale-cli
6
6
  Author: Travis Howerton
@@ -1,5 +1,5 @@
1
1
  regscale/__init__.py,sha256=ZygAIkX6Nbjag1czWdQa-yP-GM1mBE_9ss21Xh__JFc,34
2
- regscale/_version.py,sha256=7vrJUSy6yUulxohFtU6V1-t_j4E6-52RFtUIgs7MP64,1198
2
+ regscale/_version.py,sha256=6rK1XbR7CtjKj4sB_xHT4DIZPLpY7LjaGjXRl6NJSqE,1198
3
3
  regscale/regscale.py,sha256=4LzcbkBxPh23cCLANVEEr6uNoZ0sebHec0N-VJm5_vA,31480
4
4
  regscale/airflow/__init__.py,sha256=yMwN0Bz4JbM0nl5qY_hPegxo_O2ilhTOL9PY5Njhn-s,270
5
5
  regscale/airflow/click_dags.py,sha256=H3SUR5jkvInNMv1gu-VG-Ja_H-kH145CpQYNalWNAbE,4520
@@ -119,7 +119,7 @@ regscale/integrations/jsonl_scanner_integration.py,sha256=l8nq_T3rE1XX-6HxrNHm3x
119
119
  regscale/integrations/milestone_manager.py,sha256=td5m-2LIUkHY7S3rtGwj-SLLuSGN4aiJOPAiKRcE4A4,10779
120
120
  regscale/integrations/scanner_integration.py,sha256=VcHldJCmSIy0oGL0G5tF6ivnrLAUuhGgWisC_F24G3g,194028
121
121
  regscale/integrations/variables.py,sha256=MfQ34WuYVN5437A9sZ2ssHRkA3gFhMHfk1DVasceGmY,2336
122
- regscale/integrations/commercial/__init__.py,sha256=U2RIsRe4lKufADRwMJY0RhSbL6TX4jLxpCtbcnzvI3k,14607
122
+ regscale/integrations/commercial/__init__.py,sha256=9IWhVfJec2O67JJnFs5T0cM-nSxadgOdl7jcIGXnJDE,14532
123
123
  regscale/integrations/commercial/ad.py,sha256=YXSmK8vRf6yi2GnREGa5GrE6GelhFrLj44SY8AO1pK0,15509
124
124
  regscale/integrations/commercial/burp.py,sha256=3BLNKLfwL1x7jfhd8MJD6hdHEpj58pOEtrtCkn2hcWA,3344
125
125
  regscale/integrations/commercial/cpe.py,sha256=vUHKGdq0UlR38pZWqqHLLTdDfooLtE9zIiFHdoFcUr0,5735
@@ -341,7 +341,7 @@ regscale/models/integration_models/azure_alerts.py,sha256=2etrpvcxa7jVQrc98bJlVG
341
341
  regscale/models/integration_models/base64.py,sha256=sxV6O5qY1_TstJENX5jBPsSdQwmA83-NNhgJFunXiZE,570
342
342
  regscale/models/integration_models/burp.py,sha256=FBEBkH3U0Q8vq71FFoWnvgLRF5Hkr9GYmQFmNNHFrVk,16932
343
343
  regscale/models/integration_models/burp_models.py,sha256=UytDTAcCaxyu-knFkm_mEUH6UmWK3OTXKSC9Sc6OjVs,3669
344
- regscale/models/integration_models/cisa_kev_data.json,sha256=NQpI-0sN-kJdasvfcqjmjlWJZpNJbgYVs-l_MlOuTD8,1295585
344
+ regscale/models/integration_models/cisa_kev_data.json,sha256=dlHfNHkBxZgSc9w6JR8tTFcqEQ33RVRMnwsDLqXcTZA,1301677
345
345
  regscale/models/integration_models/defender_data.py,sha256=jsAcjKxiGmumGerj7xSWkFd6r__YpuKDnYX5o7xHDiE,2844
346
346
  regscale/models/integration_models/defenderimport.py,sha256=Ze4kgwns-IYPyO7sBjEzW8PXWlxwU-DAo2fIyRcTC3k,6242
347
347
  regscale/models/integration_models/drf.py,sha256=Aq7AdLa_CH97NrnR-CxaFI22JjVN9uCxVN7Z-BBUaNU,18896
@@ -375,15 +375,15 @@ regscale/models/integration_models/synqly_models/__init__.py,sha256=47DEQpj8HBSa
375
375
  regscale/models/integration_models/synqly_models/capabilities.json,sha256=MqbVQ3qdu4cDHkAXF50zanx4CnFiIhIwW1Iw8CS-4j0,442882
376
376
  regscale/models/integration_models/synqly_models/connector_types.py,sha256=8nxptkTexpskySnmL0obNAff_iu_fx6tJ7i1-4hJvao,461
377
377
  regscale/models/integration_models/synqly_models/filter_parser.py,sha256=8rdnHH7gW1A_uWRTexZXzCH-HzRVy5nlvFgtc7ztcsQ,12160
378
- regscale/models/integration_models/synqly_models/ocsf_mapper.py,sha256=ftObPhGg9CamnwRZ5z6qi8pW2Gu4JYy8apEo33o7q00,16960
378
+ regscale/models/integration_models/synqly_models/ocsf_mapper.py,sha256=3M1O8yz0jBRav30lK8BU1xUL5STixetRSpIp5bWhRzg,18746
379
379
  regscale/models/integration_models/synqly_models/param.py,sha256=Xt5Zm6lC_VkLj7LF2qXo72TJZHysqttsp5ai0NCf1po,2643
380
- regscale/models/integration_models/synqly_models/synqly_model.py,sha256=3nNELO4TcbvzS8u0eZqGVUUFycS5BR0NA8oWAbw3R_k,36801
380
+ regscale/models/integration_models/synqly_models/synqly_model.py,sha256=RPxieh3r9dVdkt7IliiNEqEqvhbXv3UFuEEZ4-MNqGc,37965
381
381
  regscale/models/integration_models/synqly_models/tenants.py,sha256=kewIZw-iv18bNXJGG3ghwuFJ4CK5iXQhn_x2-xvV0iM,1078
382
382
  regscale/models/integration_models/synqly_models/connectors/__init__.py,sha256=J3YS7KXLnTPRzeM3lUQpy6HKH7CxPPsWCB-sPXSWcYA,189
383
383
  regscale/models/integration_models/synqly_models/connectors/assets.py,sha256=HHNIAVh5pRuJe8sStqhFEc6VnX2wT0FcY5178nbQgkQ,3705
384
384
  regscale/models/integration_models/synqly_models/connectors/edr.py,sha256=kio3uoEYubCHretpDOJqxdwmzid1IzbVYz0BF64zeL0,5547
385
385
  regscale/models/integration_models/synqly_models/connectors/ticketing.py,sha256=yRBuCkRAVfa_C91r3WqJ9gxrQsoD0qV9cY48YXpJl70,25358
386
- regscale/models/integration_models/synqly_models/connectors/vulnerabilities.py,sha256=nGS3XqRGTITz2XLSSr766DAfbngOT_D9DUFhaG--Plc,8239
386
+ regscale/models/integration_models/synqly_models/connectors/vulnerabilities.py,sha256=7fsPHtWSrHxlqAXGURvQ4VWunmAs-acz7O8ABHshdBw,8240
387
387
  regscale/models/integration_models/tenable_models/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
388
388
  regscale/models/integration_models/tenable_models/integration.py,sha256=lplL8zmjTFuhLreW-4y7G1fiCOBgzNAaATq800jgTQc,10271
389
389
  regscale/models/integration_models/tenable_models/models.py,sha256=dmG7btkN4YkDWwnfW5Ldc3tWEAGjPiaRgJjrqMOkPEU,15846
@@ -635,9 +635,9 @@ tests/regscale/models/test_regscale_model.py,sha256=ZsrEZkC4EtdIsoQuayn1xv2gEGcV
635
635
  tests/regscale/models/test_report.py,sha256=IqUq7C__a1_q_mLaz0PE9Lq6fHggBsB14-AzEYNBxLw,4666
636
636
  tests/regscale/models/test_tenable_integrations.py,sha256=y1qaW77H094VSGHjZdlvF66UCt-nPEib9Mv3cdwbM94,32435
637
637
  tests/regscale/models/test_user_model.py,sha256=e9olv28qBApgnvK6hFHOgXjUC-pkaV8aGDirEIWASL4,4427
638
- regscale_cli-6.27.0.0.dist-info/LICENSE,sha256=ytNhYQ9Rmhj_m-EX2pPq9Ld6tH5wrqqDYg-fCf46WDU,1076
639
- regscale_cli-6.27.0.0.dist-info/METADATA,sha256=jBcjE10GoVhVysBlr4ICwEcVGPRCCrkBmXVSW0TOBH8,34231
640
- regscale_cli-6.27.0.0.dist-info/WHEEL,sha256=oiQVh_5PnQM0E3gPdiz09WCNmwiHDMaGer_elqB3coM,92
641
- regscale_cli-6.27.0.0.dist-info/entry_points.txt,sha256=cLOaIP1eRv1yZ2u7BvpE3aB4x3kDrDwkpeisKOu33z8,269
642
- regscale_cli-6.27.0.0.dist-info/top_level.txt,sha256=Uv8VUCAdxRm70bgrD4YNEJUmDhBThad_1aaEFGwRByc,15
643
- regscale_cli-6.27.0.0.dist-info/RECORD,,
638
+ regscale_cli-6.27.1.0.dist-info/LICENSE,sha256=ytNhYQ9Rmhj_m-EX2pPq9Ld6tH5wrqqDYg-fCf46WDU,1076
639
+ regscale_cli-6.27.1.0.dist-info/METADATA,sha256=ItM8t2M1p7hlbdNJ7vikZMDxLA0SmP1fxG_tqdQoUsw,34231
640
+ regscale_cli-6.27.1.0.dist-info/WHEEL,sha256=oiQVh_5PnQM0E3gPdiz09WCNmwiHDMaGer_elqB3coM,92
641
+ regscale_cli-6.27.1.0.dist-info/entry_points.txt,sha256=cLOaIP1eRv1yZ2u7BvpE3aB4x3kDrDwkpeisKOu33z8,269
642
+ regscale_cli-6.27.1.0.dist-info/top_level.txt,sha256=Uv8VUCAdxRm70bgrD4YNEJUmDhBThad_1aaEFGwRByc,15
643
+ regscale_cli-6.27.1.0.dist-info/RECORD,,