Skip to content

Conversation

@bjk7119
Copy link
Contributor

@bjk7119 bjk7119 commented Jul 11, 2025

Description

  • Copy OSS info if checksum matches
  • Remove duplicated comment when exceeds 255 characters

Type of change

  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Documentation update
  • Refactoring, Maintenance
  • Breaking change (fix or feature that would cause existing functionality to not work as expected)

@bjk7119 bjk7119 requested review from dd-jy and soimkim July 11, 2025 17:08
@bjk7119 bjk7119 self-assigned this Jul 11, 2025
@bjk7119 bjk7119 added the chore [PR/Issue] Refactoring, maintenance the code label Jul 11, 2025
if nvd_url and len(nvd_url) > MAX_EXCEL_URL_LENGTH:
oss.comment = f"Exceeded the maximum vulnerability URL length of {MAX_EXCEL_URL_LENGTH} characters."
if EXCEEDED_VUL_URL_LENGTH_COMMENT not in oss.comment:
oss.comment = EXCEEDED_VUL_URL_LENGTH_COMMENT
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@bjk7119 , 이 방법보다 중복으로 찍히는 로직을 확인하는 것을 제안드립니다.
재현이 불가하셔서 로직 내 중복 원인이 확인되지 않는 상태인가요?

dup_bin = None
for bin in bins:
if bin.oss_items and len(bin.oss_items) > 0:
dup_bin = bin
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

이렇게 세팅하면 Binary DB을 load한 binary인지, OWASP에서 값을 읽어온 binary인지 구분이 되나요?
그리고 OWASP에서 값을 읽어온 binary의 값을 copy시, Comment 도 "OWASP result"로 바뀌는 것인지 문의드립니다. (코드 상으로는 안 바뀔 것 같아서요)

@bjk7119 bjk7119 closed this Jul 15, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

chore [PR/Issue] Refactoring, maintenance the code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants