You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
fix: remove computed unique_id_from_tool from IriusRisk parser
Per PR review feedback, parsers must not compute unique_id_from_tool.
Removed SHA-256 hash generation and related tests. Deduplication now
relies on DefectDojo's default hashcode algorithm. Updated docs
to reflect the change.
Authored by T. Walker - DefectDojo
Copy file name to clipboardExpand all lines: docs/content/supported_tools/parsers/file/iriusrisk.md
+2-6Lines changed: 2 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,8 +25,6 @@ By default, DefectDojo identifies duplicate Findings using these [hashcode field
25
25
- file_path
26
26
- description
27
27
28
-
The parser also populates `unique_id_from_tool` with a SHA-256 hash of the Component, Threat, and Risk Response fields, providing an additional layer of deduplication across reimports.
29
-
30
28
### Sample Scan Data
31
29
32
30
Sample IriusRisk scans can be found in the [sample scan data folder](https://github.com/DefectDojo/django-DefectDojo/tree/master/unittests/scans/iriusrisk).
@@ -69,7 +67,6 @@ Sample IriusRisk scans can be found in the [sample scan data folder](https://git
69
67
| Risk Response | mitigation | 94 | Mitigation status percentages from IriusRisk |
70
68
| MITRE reference | cwe | 82-85 | When value matches CWE-NNN pattern, integer is extracted to cwe field |
71
69
| MITRE reference | references | 86-87 | When value does not match CWE pattern, stored as references |
72
-
| Component + Threat + Risk Response | unique_id_from_tool | 74-77 | SHA-256 hash used for deduplication across reimports |
73
70
74
71
</details>
75
72
@@ -83,7 +80,6 @@ Sample IriusRisk scans can be found in the [sample scan data folder](https://git
83
80
| static_finding | False | 97 | Threat model data is neither static nor dynamic analysis |
84
81
| dynamic_finding | False | 98 | Threat model data is neither static nor dynamic analysis |
85
82
| active | True (False when "Very low") | 96 | Set to False when Current Risk is "Very low" (fully mitigated) |
86
-
| unique_id_from_tool | SHA-256 hash | 99 | Hash of Component, Threat, and Risk Response |
87
83
88
84
</details>
89
85
@@ -142,8 +138,8 @@ Findings are set to active by default (line 96). When the "Current Risk" value i
142
138
143
139
### Deduplication
144
140
145
-
The parser generates a `unique_id_from_tool` by computing a SHA-256 hash of the Component, Threat, and Risk Response fields concatenated with pipe delimiters (lines 74-77). This ensures that each distinct combination of component, threat, and mitigation state produces a unique identifier. On reimport, findings with matching unique IDs are recognized as the same finding rather than being duplicated.
141
+
Deduplication relies on DefectDojo's default hashcode algorithm, which uses the title, cwe, line, file_path, and description fields to identify duplicate findings.
146
142
147
143
### Duplicate Rows in Source Data
148
144
149
-
IriusRisk CSV exports can contain multiple rows with the same Component and Threat but different Risk Response values. These represent distinct countermeasure paths for the same threat. Each row is imported as a separate finding, distinguished by its unique ID which incorporates the Risk Response field.
145
+
IriusRisk CSV exports can contain multiple rows with the same Component and Threat but different Risk Response values. These represent distinct countermeasure paths for the same threat. Each row is imported as a separate finding, distinguished by its description content which incorporates all CSV fields.
0 commit comments