You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Fixes a bug where vulnerabilities were not properly resolved if there was no linked http request.
Updates Spring AI Version
Removes unused Prompts
Adds Hints to returned vulnerabilities to guide the Agent on the correct fix.
Adds Library CVE data to the stacktrace. Which gives the agent a hint as to the fix if the vulnerability actually is occuring in a vulnerability within a 3rd party library. By giving the CVEs for that library.
@Tool(name = "get_vulnerability", description = "takes a vulnerability ID ( vulnID ) and Application ID ( appID ) and returns details about the specific security vulnerability")
73
+
@Tool(name = "get_vulnerability", description = "takes a vulnerability ID ( vulnID ) and Application ID ( appID ) and returns details about the specific security vulnerability. If based on the stacktrace, the vulnerability looks like it is in code that is not in the codebase, the vulnerability may be in a 3rd party library, review the CVE data attached to that stackframe you believe the vulnerability exists in and if possible upgrade that library to the next non vulnerable version based on the remediation guidance.")
for (LibraryObservationlob : llob.libraryObservation()) {
145
+
if (lob.getName() != null && lowerStackTrace.startsWith(lob.getName().toLowerCase())) {
146
+
returnOptional.of(llob);
147
+
}
148
+
}
149
+
}
150
+
returnOptional.empty();
151
+
}
104
152
105
-
@Tool(name = "get_vulnerability_by_app_name", description = "Takes a vulnerability ID (vulnID) and application name (appName) and returns details about the specific security vulnerability")
153
+
@Tool(name = "get_vulnerability_by_app_name", description = "Takes a vulnerability ID (vulnID) and application name (appName) and returns details about the specific security vulnerability. If based on the stacktrace, the vulnerability looks like it is in code that is not in the codebase, the vulnerability may be in a 3rd party library, review the CVE data attached to that stackframe you believe the vulnerability exists in and if possible upgrade that library to the next non vulnerable version based on the remediation guidance.")
@Tool(name = "list_vulnerabilities_with_app_name", description = "Takes an application name ( appName ) and returns a list of vulnerabilities, please remember to include the vulnID in the response.")
197
+
@Tool(name = "list_vulnerabilities_with_app_name", description = "Takes an application name ( appName ) and returns a list of vulnerabilities, please remember to include the vulnID in the response.")
0 commit comments