diff --git a/Gemfile b/Gemfile index e57a96ee..93108f21 100644 --- a/Gemfile +++ b/Gemfile @@ -19,7 +19,7 @@ gem "aws-sdk-inspector2" gem "httparty" gem "ipaddress" gem "rest-client" -gem "rexml", ">= 3.2.7" +gem "rexml", ">= 3.3.3" gem "ruby-limiter" gem "sanitize" gem "strscan" diff --git a/Gemfile.lock b/Gemfile.lock index 1ec961bc..50356637 100644 --- a/Gemfile.lock +++ b/Gemfile.lock @@ -92,7 +92,7 @@ GEM netrc (~> 0.8) reverse_markdown (2.1.1) nokogiri - rexml (3.3.2) + rexml (3.3.5) strscan rspec (3.12.0) rspec-core (~> 3.12.0) @@ -186,7 +186,7 @@ DEPENDENCIES pry pry-byebug rest-client - rexml (>= 3.2.7) + rexml (>= 3.3.3) rspec rspec-github rubocop @@ -204,4 +204,4 @@ RUBY VERSION ruby 3.2.2p53 BUNDLED WITH - 2.4.10 + 2.5.15 diff --git a/log/vcr_debug.log b/log/vcr_debug.log new file mode 100644 index 00000000..b79cb54a --- /dev/null +++ b/log/vcr_debug.log @@ -0,0 +1,3353 @@ +[Cassette: 'aws_inspector_v2_findings'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'aws_inspector_v2_findings'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 28 interaction(s): { [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The _asn1_check_iden"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 allows"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Null source pointer "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In shadow before 4.5"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In elfutils 0.183, a"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"A use-after-free vuln"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" During key agreement"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" A heap buffer overfl"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" GNU Binutils before "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Use of Out-of-range "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The OpenSSL DSA sign"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Read i"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" less through 653 all"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The recv_files funct"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" NULL Pointer Derefer"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" If an application en"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"Microsoft ODBC Driver"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Heap-based Buffer Ov"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" libvterm through 0+b"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 has an"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In append_to_verify_"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Write "] } + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The _asn1_check_iden"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 allows"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Null source pointer "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In shadow before 4.5"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In elfutils 0.183, a"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"A use-after-free vuln"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" During key agreement"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" A heap buffer overfl"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" GNU Binutils before "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Use of Out-of-range "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The OpenSSL DSA sign"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Read i"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" less through 653 all"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The recv_files funct"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" NULL Pointer Derefer"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" If an application en"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"Microsoft ODBC Driver"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Heap-based Buffer Ov"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" libvterm through 0+b"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 has an"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In append_to_verify_"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Write "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[Cassette: 'aws_inspector_v2_findings'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'aws_inspector_v2_findings'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 28 interaction(s): { [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The _asn1_check_iden"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 allows"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Null source pointer "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In shadow before 4.5"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In elfutils 0.183, a"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"A use-after-free vuln"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" During key agreement"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" A heap buffer overfl"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" GNU Binutils before "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Use of Out-of-range "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The OpenSSL DSA sign"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Read i"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" less through 653 all"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The recv_files funct"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" NULL Pointer Derefer"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" If an application en"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"Microsoft ODBC Driver"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Heap-based Buffer Ov"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" libvterm through 0+b"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 has an"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In append_to_verify_"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Write "] } + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The _asn1_check_iden"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 allows"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Null source pointer "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In shadow before 4.5"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In elfutils 0.183, a"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"A use-after-free vuln"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" During key agreement"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" A heap buffer overfl"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" GNU Binutils before "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Use of Out-of-range "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The OpenSSL DSA sign"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Read i"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" less through 653 all"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The recv_files funct"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" NULL Pointer Derefer"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" If an application en"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"Microsoft ODBC Driver"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Heap-based Buffer Ov"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" libvterm through 0+b"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 has an"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In append_to_verify_"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Write "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[Cassette: 'aws_inspector_v2_findings'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'aws_inspector_v2_findings'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 28 interaction(s): { [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The _asn1_check_iden"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 allows"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Null source pointer "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In shadow before 4.5"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In elfutils 0.183, a"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"A use-after-free vuln"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" During key agreement"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" A heap buffer overfl"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" GNU Binutils before "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Use of Out-of-range "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The OpenSSL DSA sign"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Read i"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" less through 653 all"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The recv_files funct"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" NULL Pointer Derefer"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" If an application en"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"Microsoft ODBC Driver"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Heap-based Buffer Ov"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" libvterm through 0+b"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 has an"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In append_to_verify_"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Write "] } + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The _asn1_check_iden"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 allows"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Null source pointer "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In shadow before 4.5"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In elfutils 0.183, a"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"A use-after-free vuln"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" During key agreement"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" A heap buffer overfl"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" GNU Binutils before "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Use of Out-of-range "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The OpenSSL DSA sign"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Read i"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" less through 653 all"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The recv_files funct"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" NULL Pointer Derefer"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" If an application en"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"Microsoft ODBC Driver"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Heap-based Buffer Ov"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" libvterm through 0+b"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 has an"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In append_to_verify_"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Write "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[Cassette: 'aws_inspector_v2_findings'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'aws_inspector_v2_findings'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 28 interaction(s): { [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The _asn1_check_iden"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 allows"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Null source pointer "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In shadow before 4.5"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In elfutils 0.183, a"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"A use-after-free vuln"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" During key agreement"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" A heap buffer overfl"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" GNU Binutils before "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Use of Out-of-range "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The OpenSSL DSA sign"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Read i"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" less through 653 all"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The recv_files funct"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" NULL Pointer Derefer"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" If an application en"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"Microsoft ODBC Driver"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Heap-based Buffer Ov"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" libvterm through 0+b"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 has an"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In append_to_verify_"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Write "] } + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The _asn1_check_iden"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 allows"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Null source pointer "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In shadow before 4.5"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In elfutils 0.183, a"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"A use-after-free vuln"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" During key agreement"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" A heap buffer overfl"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" GNU Binutils before "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Use of Out-of-range "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The OpenSSL DSA sign"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Read i"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" less through 653 all"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The recv_files funct"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" NULL Pointer Derefer"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" If an application en"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"Microsoft ODBC Driver"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Heap-based Buffer Ov"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" libvterm through 0+b"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 has an"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In append_to_verify_"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Write "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[Cassette: 'aws_inspector_v2_findings'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'aws_inspector_v2_findings'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 28 interaction(s): { [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The _asn1_check_iden"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 allows"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Null source pointer "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In shadow before 4.5"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In elfutils 0.183, a"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"A use-after-free vuln"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" During key agreement"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" A heap buffer overfl"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" GNU Binutils before "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Use of Out-of-range "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The OpenSSL DSA sign"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Read i"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" less through 653 all"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The recv_files funct"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" NULL Pointer Derefer"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" If an application en"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"Microsoft ODBC Driver"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Heap-based Buffer Ov"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" libvterm through 0+b"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 has an"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In append_to_verify_"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Write "] } + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The _asn1_check_iden"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 allows"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Null source pointer "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In shadow before 4.5"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In elfutils 0.183, a"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"A use-after-free vuln"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" During key agreement"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" A heap buffer overfl"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" GNU Binutils before "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Use of Out-of-range "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The OpenSSL DSA sign"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Read i"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" less through 653 all"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The recv_files funct"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" NULL Pointer Derefer"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" If an application en"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"Microsoft ODBC Driver"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Heap-based Buffer Ov"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" libvterm through 0+b"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 has an"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In append_to_verify_"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Write "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[Cassette: 'aws_inspector_v2_findings'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'aws_inspector_v2_findings'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 28 interaction(s): { [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The _asn1_check_iden"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 allows"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Null source pointer "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In shadow before 4.5"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In elfutils 0.183, a"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"A use-after-free vuln"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" During key agreement"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" A heap buffer overfl"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" GNU Binutils before "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Use of Out-of-range "], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The OpenSSL DSA sign"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Read i"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" less through 653 all"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The recv_files funct"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" NULL Pointer Derefer"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" If an application en"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"Microsoft ODBC Driver"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Heap-based Buffer Ov"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" libvterm through 0+b"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 has an"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In append_to_verify_"], [post https://inspector2.us-east-1.amazonaws.com/findings/list] => [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Write "] } + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The _asn1_check_iden"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 allows"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Null source pointer "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In shadow before 4.5"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In elfutils 0.183, a"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"A use-after-free vuln"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" During key agreement"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In the Linux kernel,"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"\\n It was discovered "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" A heap buffer overfl"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" GNU Binutils before "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Use of Out-of-range "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The OpenSSL DSA sign"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" An issue was discove"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Read i"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" less through 653 all"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" The recv_files funct"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" NULL Pointer Derefer"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" If an application en"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\"Microsoft ODBC Driver"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Heap-based Buffer Ov"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" libvterm through 0+b"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" LibTIFF 4.0.7 has an"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" In append_to_verify_"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [post https://inspector2.us-east-1.amazonaws.com/findings/list] (disabled: false) + [Cassette: 'aws_inspector_v2_findings'] Checking if [post https://inspector2.us-east-1.amazonaws.com/findings/list] matches [post https://inspector2.us-east-1.amazonaws.com/findings/list] using [:method, :uri] + [Cassette: 'aws_inspector_v2_findings'] method (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] uri (matched): current request [post https://inspector2.us-east-1.amazonaws.com/findings/list] vs [post https://inspector2.us-east-1.amazonaws.com/findings/list] + [Cassette: 'aws_inspector_v2_findings'] Found matching interaction for [post https://inspector2.us-east-1.amazonaws.com/findings/list] at index 0: [200 "{\"findings\":[{\"awsAccountId\":\"612899039241\",\"description\":\" Out-of-bounds Write "] +[webmock] Identified request type (stubbed_by_vcr) for [post https://inspector2.us-east-1.amazonaws.com/findings/list] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [put http://169.254.169.254/latest/api/token] (disabled: false) +[webmock] Identified request type (unhandled) for [put http://169.254.169.254/latest/api/token] +[webmock] Handling request: [put http://169.254.169.254/latest/api/token] (disabled: false) +[webmock] Identified request type (unhandled) for [put http://169.254.169.254/latest/api/token] +[webmock] Handling request: [put http://169.254.169.254/latest/api/token] (disabled: false) +[webmock] Identified request type (unhandled) for [put http://169.254.169.254/latest/api/token] +[webmock] Handling request: [put http://169.254.169.254/latest/api/token] (disabled: false) +[webmock] Identified request type (unhandled) for [put http://169.254.169.254/latest/api/token] +[webmock] Handling request: [put http://169.254.169.254/latest/api/token] (disabled: false) +[webmock] Identified request type (unhandled) for [put http://169.254.169.254/latest/api/token] +[webmock] Handling request: [put http://169.254.169.254/latest/api/token] (disabled: false) +[webmock] Identified request type (unhandled) for [put http://169.254.169.254/latest/api/token] +[webmock] Handling request: [put http://169.254.169.254/latest/api/token] (disabled: false) +[webmock] Identified request type (unhandled) for [put http://169.254.169.254/latest/api/token] +[webmock] Handling request: [put http://169.254.169.254/latest/api/token] (disabled: false) +[webmock] Identified request type (unhandled) for [put http://169.254.169.254/latest/api/token] +[webmock] Handling request: [put http://169.254.169.254/latest/api/token] (disabled: false) +[webmock] Identified request type (unhandled) for [put http://169.254.169.254/latest/api/token] +[webmock] Handling request: [put http://169.254.169.254/latest/api/token] (disabled: false) +[webmock] Identified request type (unhandled) for [put http://169.254.169.254/latest/api/token] +[webmock] Handling request: [put http://169.254.169.254/latest/api/token] (disabled: false) +[webmock] Identified request type (unhandled) for [put http://169.254.169.254/latest/api/token] +[webmock] Handling request: [put http://169.254.169.254/latest/api/token] (disabled: false) +[webmock] Identified request type (unhandled) for [put http://169.254.169.254/latest/api/token] +[Cassette: 'aws_sts'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[Cassette: 'aws_sts'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [post https://sts.us-east-1.amazonaws.com/] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'aws_sts'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 1 interaction(s): { [post https://sts.us-east-1.amazonaws.com/] => [200 "\n \n :once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [post https://cylera.host/auth/login_user] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'cylera'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 4 interaction(s): { [post https://cylera.host/auth/login_user] => [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"], [get https://cylera.host/inventory/devices?page=0&page_size=100] => [200 "{ \"devices\": [ { \"aetitle\": \"NBXXCU\", \"class\": \"Infrastructure\", \"fda_class\": \"2"], [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] => [200 "{ \"vulnerabilities\": [ { \"ip_address\": \"192.168.1.40\", \"mac_address\": \"00:15:bd:"], [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] => [200 "{ \"description\": \"OS2/Warp 4.5 FTP server allows remote attackers to cause a den"] } + [Cassette: 'cylera'] Checking if [post https://cylera.host/auth/login_user] matches [post https://cylera.host/auth/login_user] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] uri (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] Found matching interaction for [post https://cylera.host/auth/login_user] at index 0: [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://cylera.host/auth/login_user] +[webmock] Handling request: [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] (disabled: false) + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] matches [get https://cylera.host/inventory/devices?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] uri (did not match): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] matches [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] + [Cassette: 'cylera'] uri (matched): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] + [Cassette: 'cylera'] Found matching interaction for [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] at index 1: [200 "{ \"vulnerabilities\": [ { \"ip_address\": \"192.168.1.40\", \"mac_address\": \"00:15:bd:"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] +[webmock] Handling request: [get https://cylera.host/inventory/devices?page=0&page_size=100] (disabled: false) + [Cassette: 'cylera'] Checking if [get https://cylera.host/inventory/devices?page=0&page_size=100] matches [get https://cylera.host/inventory/devices?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/inventory/devices?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] uri (matched): current request [get https://cylera.host/inventory/devices?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] Found matching interaction for [get https://cylera.host/inventory/devices?page=0&page_size=100] at index 0: [200 "{ \"devices\": [ { \"aetitle\": \"NBXXCU\", \"class\": \"Infrastructure\", \"fda_class\": \"2"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://cylera.host/inventory/devices?page=0&page_size=100] +[webmock] Handling request: [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] (disabled: false) + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] matches [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] vs [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] + [Cassette: 'cylera'] uri (matched): current request [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] vs [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] + [Cassette: 'cylera'] Found matching interaction for [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] at index 0: [200 "{ \"description\": \"OS2/Warp 4.5 FTP server allows remote attackers to cause a den"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[Cassette: 'cylera'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [post https://cylera.host/auth/login_user] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'cylera'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 4 interaction(s): { [post https://cylera.host/auth/login_user] => [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"], [get https://cylera.host/inventory/devices?page=0&page_size=100] => [200 "{ \"devices\": [ { \"aetitle\": \"NBXXCU\", \"class\": \"Infrastructure\", \"fda_class\": \"2"], [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] => [200 "{ \"vulnerabilities\": [ { \"ip_address\": \"192.168.1.40\", \"mac_address\": \"00:15:bd:"], [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] => [200 "{ \"description\": \"OS2/Warp 4.5 FTP server allows remote attackers to cause a den"] } + [Cassette: 'cylera'] Checking if [post https://cylera.host/auth/login_user] matches [post https://cylera.host/auth/login_user] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] uri (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] Found matching interaction for [post https://cylera.host/auth/login_user] at index 0: [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://cylera.host/auth/login_user] +[webmock] Handling request: [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] (disabled: false) + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] matches [get https://cylera.host/inventory/devices?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] uri (did not match): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] matches [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] + [Cassette: 'cylera'] uri (matched): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] + [Cassette: 'cylera'] Found matching interaction for [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] at index 1: [200 "{ \"vulnerabilities\": [ { \"ip_address\": \"192.168.1.40\", \"mac_address\": \"00:15:bd:"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] +[webmock] Handling request: [get https://cylera.host/inventory/devices?page=0&page_size=100] (disabled: false) + [Cassette: 'cylera'] Checking if [get https://cylera.host/inventory/devices?page=0&page_size=100] matches [get https://cylera.host/inventory/devices?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/inventory/devices?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] uri (matched): current request [get https://cylera.host/inventory/devices?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] Found matching interaction for [get https://cylera.host/inventory/devices?page=0&page_size=100] at index 0: [200 "{ \"devices\": [ { \"aetitle\": \"NBXXCU\", \"class\": \"Infrastructure\", \"fda_class\": \"2"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://cylera.host/inventory/devices?page=0&page_size=100] +[webmock] Handling request: [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] (disabled: false) + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] matches [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] vs [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] + [Cassette: 'cylera'] uri (matched): current request [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] vs [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] + [Cassette: 'cylera'] Found matching interaction for [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] at index 0: [200 "{ \"description\": \"OS2/Warp 4.5 FTP server allows remote attackers to cause a den"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] +[Cassette: 'cylera'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [post https://cylera.host/auth/login_user] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'cylera'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 4 interaction(s): { [post https://cylera.host/auth/login_user] => [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"], [get https://cylera.host/inventory/devices?page=0&page_size=100] => [200 "{ \"devices\": [ { \"aetitle\": \"NBXXCU\", \"class\": \"Infrastructure\", \"fda_class\": \"2"], [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] => [200 "{ \"vulnerabilities\": [ { \"ip_address\": \"192.168.1.40\", \"mac_address\": \"00:15:bd:"], [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] => [200 "{ \"description\": \"OS2/Warp 4.5 FTP server allows remote attackers to cause a den"] } + [Cassette: 'cylera'] Checking if [post https://cylera.host/auth/login_user] matches [post https://cylera.host/auth/login_user] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] uri (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] Found matching interaction for [post https://cylera.host/auth/login_user] at index 0: [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://cylera.host/auth/login_user] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[Cassette: 'cylera'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [post https://cylera.host/auth/login_user] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'cylera'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 4 interaction(s): { [post https://cylera.host/auth/login_user] => [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"], [get https://cylera.host/inventory/devices?page=0&page_size=100] => [200 "{ \"devices\": [ { \"aetitle\": \"NBXXCU\", \"class\": \"Infrastructure\", \"fda_class\": \"2"], [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] => [200 "{ \"vulnerabilities\": [ { \"ip_address\": \"192.168.1.40\", \"mac_address\": \"00:15:bd:"], [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] => [200 "{ \"description\": \"OS2/Warp 4.5 FTP server allows remote attackers to cause a den"] } + [Cassette: 'cylera'] Checking if [post https://cylera.host/auth/login_user] matches [post https://cylera.host/auth/login_user] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] uri (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] Found matching interaction for [post https://cylera.host/auth/login_user] at index 0: [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://cylera.host/auth/login_user] +[webmock] Handling request: [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] (disabled: false) + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] matches [get https://cylera.host/inventory/devices?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] uri (did not match): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] matches [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] + [Cassette: 'cylera'] uri (matched): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] + [Cassette: 'cylera'] Found matching interaction for [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] at index 1: [200 "{ \"vulnerabilities\": [ { \"ip_address\": \"192.168.1.40\", \"mac_address\": \"00:15:bd:"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] +[webmock] Handling request: [get https://cylera.host/inventory/devices?page=0&page_size=100] (disabled: false) + [Cassette: 'cylera'] Checking if [get https://cylera.host/inventory/devices?page=0&page_size=100] matches [get https://cylera.host/inventory/devices?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/inventory/devices?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] uri (matched): current request [get https://cylera.host/inventory/devices?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] Found matching interaction for [get https://cylera.host/inventory/devices?page=0&page_size=100] at index 0: [200 "{ \"devices\": [ { \"aetitle\": \"NBXXCU\", \"class\": \"Infrastructure\", \"fda_class\": \"2"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://cylera.host/inventory/devices?page=0&page_size=100] +[webmock] Handling request: [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] (disabled: false) + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] matches [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] vs [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] + [Cassette: 'cylera'] uri (matched): current request [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] vs [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] + [Cassette: 'cylera'] Found matching interaction for [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] at index 0: [200 "{ \"description\": \"OS2/Warp 4.5 FTP server allows remote attackers to cause a den"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] +[Cassette: 'cylera'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [post https://cylera.host/auth/login_user] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'cylera'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 4 interaction(s): { [post https://cylera.host/auth/login_user] => [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"], [get https://cylera.host/inventory/devices?page=0&page_size=100] => [200 "{ \"devices\": [ { \"aetitle\": \"NBXXCU\", \"class\": \"Infrastructure\", \"fda_class\": \"2"], [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] => [200 "{ \"vulnerabilities\": [ { \"ip_address\": \"192.168.1.40\", \"mac_address\": \"00:15:bd:"], [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] => [200 "{ \"description\": \"OS2/Warp 4.5 FTP server allows remote attackers to cause a den"] } + [Cassette: 'cylera'] Checking if [post https://cylera.host/auth/login_user] matches [post https://cylera.host/auth/login_user] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] uri (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] Found matching interaction for [post https://cylera.host/auth/login_user] at index 0: [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://cylera.host/auth/login_user] +[webmock] Handling request: [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] (disabled: false) + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] matches [get https://cylera.host/inventory/devices?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] uri (did not match): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] matches [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] + [Cassette: 'cylera'] uri (matched): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] + [Cassette: 'cylera'] Found matching interaction for [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] at index 1: [200 "{ \"vulnerabilities\": [ { \"ip_address\": \"192.168.1.40\", \"mac_address\": \"00:15:bd:"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] +[webmock] Handling request: [get https://cylera.host/inventory/devices?page=0&page_size=100] (disabled: false) + [Cassette: 'cylera'] Checking if [get https://cylera.host/inventory/devices?page=0&page_size=100] matches [get https://cylera.host/inventory/devices?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/inventory/devices?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] uri (matched): current request [get https://cylera.host/inventory/devices?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] Found matching interaction for [get https://cylera.host/inventory/devices?page=0&page_size=100] at index 0: [200 "{ \"devices\": [ { \"aetitle\": \"NBXXCU\", \"class\": \"Infrastructure\", \"fda_class\": \"2"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://cylera.host/inventory/devices?page=0&page_size=100] +[webmock] Handling request: [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] (disabled: false) + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] matches [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] vs [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] + [Cassette: 'cylera'] uri (matched): current request [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] vs [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] + [Cassette: 'cylera'] Found matching interaction for [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] at index 0: [200 "{ \"description\": \"OS2/Warp 4.5 FTP server allows remote attackers to cause a den"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] +[Cassette: 'cylera'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [post https://cylera.host/auth/login_user] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'cylera'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 4 interaction(s): { [post https://cylera.host/auth/login_user] => [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"], [get https://cylera.host/inventory/devices?page=0&page_size=100] => [200 "{ \"devices\": [ { \"aetitle\": \"NBXXCU\", \"class\": \"Infrastructure\", \"fda_class\": \"2"], [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] => [200 "{ \"vulnerabilities\": [ { \"ip_address\": \"192.168.1.40\", \"mac_address\": \"00:15:bd:"], [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] => [200 "{ \"description\": \"OS2/Warp 4.5 FTP server allows remote attackers to cause a den"] } + [Cassette: 'cylera'] Checking if [post https://cylera.host/auth/login_user] matches [post https://cylera.host/auth/login_user] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] uri (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] Found matching interaction for [post https://cylera.host/auth/login_user] at index 0: [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://cylera.host/auth/login_user] +[webmock] Handling request: [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] (disabled: false) + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] matches [get https://cylera.host/inventory/devices?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] uri (did not match): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] matches [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] + [Cassette: 'cylera'] uri (matched): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] + [Cassette: 'cylera'] Found matching interaction for [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] at index 1: [200 "{ \"vulnerabilities\": [ { \"ip_address\": \"192.168.1.40\", \"mac_address\": \"00:15:bd:"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] +[webmock] Handling request: [get https://cylera.host/inventory/devices?page=0&page_size=100] (disabled: false) + [Cassette: 'cylera'] Checking if [get https://cylera.host/inventory/devices?page=0&page_size=100] matches [get https://cylera.host/inventory/devices?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/inventory/devices?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] uri (matched): current request [get https://cylera.host/inventory/devices?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] Found matching interaction for [get https://cylera.host/inventory/devices?page=0&page_size=100] at index 0: [200 "{ \"devices\": [ { \"aetitle\": \"NBXXCU\", \"class\": \"Infrastructure\", \"fda_class\": \"2"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://cylera.host/inventory/devices?page=0&page_size=100] +[webmock] Handling request: [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] (disabled: false) + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] matches [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] vs [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] + [Cassette: 'cylera'] uri (matched): current request [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] vs [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] + [Cassette: 'cylera'] Found matching interaction for [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] at index 0: [200 "{ \"description\": \"OS2/Warp 4.5 FTP server allows remote attackers to cause a den"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] +[Cassette: 'cylera'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [post https://cylera.host/auth/login_user] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'cylera'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 4 interaction(s): { [post https://cylera.host/auth/login_user] => [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"], [get https://cylera.host/inventory/devices?page=0&page_size=100] => [200 "{ \"devices\": [ { \"aetitle\": \"NBXXCU\", \"class\": \"Infrastructure\", \"fda_class\": \"2"], [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] => [200 "{ \"vulnerabilities\": [ { \"ip_address\": \"192.168.1.40\", \"mac_address\": \"00:15:bd:"], [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] => [200 "{ \"description\": \"OS2/Warp 4.5 FTP server allows remote attackers to cause a den"] } + [Cassette: 'cylera'] Checking if [post https://cylera.host/auth/login_user] matches [post https://cylera.host/auth/login_user] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] uri (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] Found matching interaction for [post https://cylera.host/auth/login_user] at index 0: [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://cylera.host/auth/login_user] +[webmock] Handling request: [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] (disabled: false) + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] matches [get https://cylera.host/inventory/devices?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] uri (did not match): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] matches [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] + [Cassette: 'cylera'] uri (matched): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] + [Cassette: 'cylera'] Found matching interaction for [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] at index 1: [200 "{ \"vulnerabilities\": [ { \"ip_address\": \"192.168.1.40\", \"mac_address\": \"00:15:bd:"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] +[webmock] Handling request: [get https://cylera.host/inventory/devices?page=0&page_size=100] (disabled: false) + [Cassette: 'cylera'] Checking if [get https://cylera.host/inventory/devices?page=0&page_size=100] matches [get https://cylera.host/inventory/devices?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/inventory/devices?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] uri (matched): current request [get https://cylera.host/inventory/devices?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] Found matching interaction for [get https://cylera.host/inventory/devices?page=0&page_size=100] at index 0: [200 "{ \"devices\": [ { \"aetitle\": \"NBXXCU\", \"class\": \"Infrastructure\", \"fda_class\": \"2"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://cylera.host/inventory/devices?page=0&page_size=100] +[webmock] Handling request: [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] (disabled: false) + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] matches [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] vs [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] + [Cassette: 'cylera'] uri (matched): current request [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] vs [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] + [Cassette: 'cylera'] Found matching interaction for [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] at index 0: [200 "{ \"description\": \"OS2/Warp 4.5 FTP server allows remote attackers to cause a den"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] +[Cassette: 'cylera'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[Cassette: 'cylera'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [post https://cylera.host/auth/login_user] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'cylera'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 4 interaction(s): { [post https://cylera.host/auth/login_user] => [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"], [get https://cylera.host/inventory/devices?page=0&page_size=100] => [200 "{ \"devices\": [ { \"aetitle\": \"NBXXCU\", \"class\": \"Infrastructure\", \"fda_class\": \"2"], [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] => [200 "{ \"vulnerabilities\": [ { \"ip_address\": \"192.168.1.40\", \"mac_address\": \"00:15:bd:"], [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] => [200 "{ \"description\": \"OS2/Warp 4.5 FTP server allows remote attackers to cause a den"] } + [Cassette: 'cylera'] Checking if [post https://cylera.host/auth/login_user] matches [post https://cylera.host/auth/login_user] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] uri (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] Found matching interaction for [post https://cylera.host/auth/login_user] at index 0: [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://cylera.host/auth/login_user] +[webmock] Handling request: [get https://cylera.host/inventory/devices?page=0&page_size=100] (disabled: false) + [Cassette: 'cylera'] Checking if [get https://cylera.host/inventory/devices?page=0&page_size=100] matches [get https://cylera.host/inventory/devices?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/inventory/devices?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] uri (matched): current request [get https://cylera.host/inventory/devices?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] Found matching interaction for [get https://cylera.host/inventory/devices?page=0&page_size=100] at index 0: [200 "{ \"devices\": [ { \"aetitle\": \"NBXXCU\", \"class\": \"Infrastructure\", \"fda_class\": \"2"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://cylera.host/inventory/devices?page=0&page_size=100] +[Cassette: 'cylera'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [post https://cylera.host/auth/login_user] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'cylera'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 4 interaction(s): { [post https://cylera.host/auth/login_user] => [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"], [get https://cylera.host/inventory/devices?page=0&page_size=100] => [200 "{ \"devices\": [ { \"aetitle\": \"NBXXCU\", \"class\": \"Infrastructure\", \"fda_class\": \"2"], [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] => [200 "{ \"vulnerabilities\": [ { \"ip_address\": \"192.168.1.40\", \"mac_address\": \"00:15:bd:"], [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] => [200 "{ \"description\": \"OS2/Warp 4.5 FTP server allows remote attackers to cause a den"] } + [Cassette: 'cylera'] Checking if [post https://cylera.host/auth/login_user] matches [post https://cylera.host/auth/login_user] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] uri (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] Found matching interaction for [post https://cylera.host/auth/login_user] at index 0: [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://cylera.host/auth/login_user] +[Cassette: 'cylera'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [post https://cylera.host/auth/login_user] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'cylera'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 4 interaction(s): { [post https://cylera.host/auth/login_user] => [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"], [get https://cylera.host/inventory/devices?page=0&page_size=100] => [200 "{ \"devices\": [ { \"aetitle\": \"NBXXCU\", \"class\": \"Infrastructure\", \"fda_class\": \"2"], [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] => [200 "{ \"vulnerabilities\": [ { \"ip_address\": \"192.168.1.40\", \"mac_address\": \"00:15:bd:"], [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] => [200 "{ \"description\": \"OS2/Warp 4.5 FTP server allows remote attackers to cause a den"] } + [Cassette: 'cylera'] Checking if [post https://cylera.host/auth/login_user] matches [post https://cylera.host/auth/login_user] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] uri (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] Found matching interaction for [post https://cylera.host/auth/login_user] at index 0: [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://cylera.host/auth/login_user] +[webmock] Handling request: [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] (disabled: false) + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] matches [get https://cylera.host/inventory/devices?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] uri (did not match): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] matches [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] + [Cassette: 'cylera'] uri (matched): current request [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] vs [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] + [Cassette: 'cylera'] Found matching interaction for [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] at index 1: [200 "{ \"vulnerabilities\": [ { \"ip_address\": \"192.168.1.40\", \"mac_address\": \"00:15:bd:"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] +[Cassette: 'cylera'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [post https://cylera.host/auth/login_user] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'cylera'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 4 interaction(s): { [post https://cylera.host/auth/login_user] => [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"], [get https://cylera.host/inventory/devices?page=0&page_size=100] => [200 "{ \"devices\": [ { \"aetitle\": \"NBXXCU\", \"class\": \"Infrastructure\", \"fda_class\": \"2"], [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] => [200 "{ \"vulnerabilities\": [ { \"ip_address\": \"192.168.1.40\", \"mac_address\": \"00:15:bd:"], [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] => [200 "{ \"description\": \"OS2/Warp 4.5 FTP server allows remote attackers to cause a den"] } + [Cassette: 'cylera'] Checking if [post https://cylera.host/auth/login_user] matches [post https://cylera.host/auth/login_user] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] uri (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] Found matching interaction for [post https://cylera.host/auth/login_user] at index 0: [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://cylera.host/auth/login_user] +[Cassette: 'cylera'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [post https://cylera.host/auth/login_user] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'cylera'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 4 interaction(s): { [post https://cylera.host/auth/login_user] => [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"], [get https://cylera.host/inventory/devices?page=0&page_size=100] => [200 "{ \"devices\": [ { \"aetitle\": \"NBXXCU\", \"class\": \"Infrastructure\", \"fda_class\": \"2"], [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] => [200 "{ \"vulnerabilities\": [ { \"ip_address\": \"192.168.1.40\", \"mac_address\": \"00:15:bd:"], [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] => [200 "{ \"description\": \"OS2/Warp 4.5 FTP server allows remote attackers to cause a den"] } + [Cassette: 'cylera'] Checking if [post https://cylera.host/auth/login_user] matches [post https://cylera.host/auth/login_user] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] uri (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] Found matching interaction for [post https://cylera.host/auth/login_user] at index 0: [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://cylera.host/auth/login_user] +[webmock] Handling request: [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] (disabled: false) + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] matches [get https://cylera.host/inventory/devices?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] uri (did not match): current request [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] vs [get https://cylera.host/inventory/devices?page=0&page_size=100] + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] matches [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] vs [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] + [Cassette: 'cylera'] uri (did not match): current request [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] vs [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] + [Cassette: 'cylera'] Checking if [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] matches [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] vs [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] + [Cassette: 'cylera'] uri (matched): current request [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] vs [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] + [Cassette: 'cylera'] Found matching interaction for [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] at index 2: [200 "{ \"description\": \"OS2/Warp 4.5 FTP server allows remote attackers to cause a den"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] +[Cassette: 'cylera'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [post https://cylera.host/auth/login_user] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'cylera'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 4 interaction(s): { [post https://cylera.host/auth/login_user] => [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"], [get https://cylera.host/inventory/devices?page=0&page_size=100] => [200 "{ \"devices\": [ { \"aetitle\": \"NBXXCU\", \"class\": \"Infrastructure\", \"fda_class\": \"2"], [get https://cylera.host/risk/vulnerabilities?page=0&page_size=100] => [200 "{ \"vulnerabilities\": [ { \"ip_address\": \"192.168.1.40\", \"mac_address\": \"00:15:bd:"], [get https://cylera.host/risk/mitigations?vulnerability=CVE-2000-0761] => [200 "{ \"description\": \"OS2/Warp 4.5 FTP server allows remote attackers to cause a den"] } + [Cassette: 'cylera'] Checking if [post https://cylera.host/auth/login_user] matches [post https://cylera.host/auth/login_user] using [:method, :uri] + [Cassette: 'cylera'] method (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] uri (matched): current request [post https://cylera.host/auth/login_user] vs [post https://cylera.host/auth/login_user] + [Cassette: 'cylera'] Found matching interaction for [post https://cylera.host/auth/login_user] at index 0: [200 "{ \"token\": \"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzY29wZSI6InVzZXIiLCJpZCI6MTY"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://cylera.host/auth/login_user] +[Cassette: 'github_dependabot'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'github_dependabot'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 23 interaction(s): { [post https://api.github.com/graphql] => [200 "{\"data\":{\"repositoryOwner\":{\"repositories\":{\"nodes\":[{\"name\":\"sjh\"},{\"name\":\"scr"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/sjh\",\"vulnerabilityAlert"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/scripts\",\"vulnerabilityA"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/simple_services_monitor\""], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Encryptor\",\"vulnerabilit"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/event_manager\",\"vulnerab"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/csv_parser\",\"vulnerabili"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/reverbdemo\",\"vulnerabili"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Webdriver_Example\",\"vuln"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/javascript-quiz\",\"vulner"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/jquery-content-slider\",\""], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/todos\",\"vulnerabilityAle"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/pagerduty\",\"vulnerabilit"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/oratorlab\",\"vulnerabilit"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/sublime_settings\",\"vulne"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/DailyCodingProblems\",\"vu"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/tmux\",\"vulnerabilityAler"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/HTB-Notes-Private\",\"vuln"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Hack-The-Box-Walkthrough"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Pentesting-Scripts\",\"vul"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/ftp-user-enum\",\"vulnerab"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Rspec-Capybara-Automatio"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/advent_of_code_2020\",\"vu"] } + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repositoryOwner\":{\"repositories\":{\"nodes\":[{\"name\":\"sjh\"},{\"name\":\"scr"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/sjh\",\"vulnerabilityAlert"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/scripts\",\"vulnerabilityA"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/simple_services_monitor\""] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Encryptor\",\"vulnerabilit"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/event_manager\",\"vulnerab"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/csv_parser\",\"vulnerabili"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/reverbdemo\",\"vulnerabili"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Webdriver_Example\",\"vuln"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/javascript-quiz\",\"vulner"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/jquery-content-slider\",\""] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/todos\",\"vulnerabilityAle"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/pagerduty\",\"vulnerabilit"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/oratorlab\",\"vulnerabilit"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/sublime_settings\",\"vulne"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/DailyCodingProblems\",\"vu"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/tmux\",\"vulnerabilityAler"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/HTB-Notes-Private\",\"vuln"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Hack-The-Box-Walkthrough"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Pentesting-Scripts\",\"vul"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/ftp-user-enum\",\"vulnerab"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Rspec-Capybara-Automatio"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/advent_of_code_2020\",\"vu"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[Cassette: 'github_dependabot'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'github_dependabot'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 23 interaction(s): { [post https://api.github.com/graphql] => [200 "{\"data\":{\"repositoryOwner\":{\"repositories\":{\"nodes\":[{\"name\":\"sjh\"},{\"name\":\"scr"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/sjh\",\"vulnerabilityAlert"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/scripts\",\"vulnerabilityA"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/simple_services_monitor\""], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Encryptor\",\"vulnerabilit"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/event_manager\",\"vulnerab"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/csv_parser\",\"vulnerabili"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/reverbdemo\",\"vulnerabili"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Webdriver_Example\",\"vuln"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/javascript-quiz\",\"vulner"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/jquery-content-slider\",\""], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/todos\",\"vulnerabilityAle"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/pagerduty\",\"vulnerabilit"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/oratorlab\",\"vulnerabilit"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/sublime_settings\",\"vulne"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/DailyCodingProblems\",\"vu"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/tmux\",\"vulnerabilityAler"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/HTB-Notes-Private\",\"vuln"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Hack-The-Box-Walkthrough"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Pentesting-Scripts\",\"vul"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/ftp-user-enum\",\"vulnerab"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Rspec-Capybara-Automatio"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/advent_of_code_2020\",\"vu"] } + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repositoryOwner\":{\"repositories\":{\"nodes\":[{\"name\":\"sjh\"},{\"name\":\"scr"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/sjh\",\"vulnerabilityAlert"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/scripts\",\"vulnerabilityA"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/simple_services_monitor\""] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Encryptor\",\"vulnerabilit"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/event_manager\",\"vulnerab"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/csv_parser\",\"vulnerabili"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/reverbdemo\",\"vulnerabili"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Webdriver_Example\",\"vuln"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/javascript-quiz\",\"vulner"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/jquery-content-slider\",\""] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/todos\",\"vulnerabilityAle"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/pagerduty\",\"vulnerabilit"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/oratorlab\",\"vulnerabilit"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/sublime_settings\",\"vulne"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/DailyCodingProblems\",\"vu"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/tmux\",\"vulnerabilityAler"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/HTB-Notes-Private\",\"vuln"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Hack-The-Box-Walkthrough"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Pentesting-Scripts\",\"vul"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/ftp-user-enum\",\"vulnerab"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Rspec-Capybara-Automatio"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/advent_of_code_2020\",\"vu"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[Cassette: 'github_dependabot'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'github_dependabot'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 23 interaction(s): { [post https://api.github.com/graphql] => [200 "{\"data\":{\"repositoryOwner\":{\"repositories\":{\"nodes\":[{\"name\":\"sjh\"},{\"name\":\"scr"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/sjh\",\"vulnerabilityAlert"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/scripts\",\"vulnerabilityA"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/simple_services_monitor\""], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Encryptor\",\"vulnerabilit"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/event_manager\",\"vulnerab"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/csv_parser\",\"vulnerabili"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/reverbdemo\",\"vulnerabili"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Webdriver_Example\",\"vuln"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/javascript-quiz\",\"vulner"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/jquery-content-slider\",\""], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/todos\",\"vulnerabilityAle"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/pagerduty\",\"vulnerabilit"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/oratorlab\",\"vulnerabilit"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/sublime_settings\",\"vulne"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/DailyCodingProblems\",\"vu"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/tmux\",\"vulnerabilityAler"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/HTB-Notes-Private\",\"vuln"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Hack-The-Box-Walkthrough"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Pentesting-Scripts\",\"vul"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/ftp-user-enum\",\"vulnerab"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Rspec-Capybara-Automatio"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/advent_of_code_2020\",\"vu"] } + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repositoryOwner\":{\"repositories\":{\"nodes\":[{\"name\":\"sjh\"},{\"name\":\"scr"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/sjh\",\"vulnerabilityAlert"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/scripts\",\"vulnerabilityA"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/simple_services_monitor\""] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Encryptor\",\"vulnerabilit"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/event_manager\",\"vulnerab"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/csv_parser\",\"vulnerabili"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/reverbdemo\",\"vulnerabili"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Webdriver_Example\",\"vuln"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/javascript-quiz\",\"vulner"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/jquery-content-slider\",\""] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/todos\",\"vulnerabilityAle"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/pagerduty\",\"vulnerabilit"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/oratorlab\",\"vulnerabilit"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/sublime_settings\",\"vulne"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/DailyCodingProblems\",\"vu"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/tmux\",\"vulnerabilityAler"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/HTB-Notes-Private\",\"vuln"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Hack-The-Box-Walkthrough"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Pentesting-Scripts\",\"vul"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/ftp-user-enum\",\"vulnerab"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Rspec-Capybara-Automatio"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/advent_of_code_2020\",\"vu"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[Cassette: 'github_dependabot'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'github_dependabot'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 23 interaction(s): { [post https://api.github.com/graphql] => [200 "{\"data\":{\"repositoryOwner\":{\"repositories\":{\"nodes\":[{\"name\":\"sjh\"},{\"name\":\"scr"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/sjh\",\"vulnerabilityAlert"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/scripts\",\"vulnerabilityA"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/simple_services_monitor\""], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Encryptor\",\"vulnerabilit"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/event_manager\",\"vulnerab"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/csv_parser\",\"vulnerabili"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/reverbdemo\",\"vulnerabili"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Webdriver_Example\",\"vuln"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/javascript-quiz\",\"vulner"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/jquery-content-slider\",\""], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/todos\",\"vulnerabilityAle"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/pagerduty\",\"vulnerabilit"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/oratorlab\",\"vulnerabilit"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/sublime_settings\",\"vulne"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/DailyCodingProblems\",\"vu"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/tmux\",\"vulnerabilityAler"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/HTB-Notes-Private\",\"vuln"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Hack-The-Box-Walkthrough"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Pentesting-Scripts\",\"vul"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/ftp-user-enum\",\"vulnerab"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Rspec-Capybara-Automatio"], [post https://api.github.com/graphql] => [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/advent_of_code_2020\",\"vu"] } + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repositoryOwner\":{\"repositories\":{\"nodes\":[{\"name\":\"sjh\"},{\"name\":\"scr"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/sjh\",\"vulnerabilityAlert"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/scripts\",\"vulnerabilityA"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/simple_services_monitor\""] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Encryptor\",\"vulnerabilit"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/event_manager\",\"vulnerab"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/csv_parser\",\"vulnerabili"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/reverbdemo\",\"vulnerabili"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Webdriver_Example\",\"vuln"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/javascript-quiz\",\"vulner"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/jquery-content-slider\",\""] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/todos\",\"vulnerabilityAle"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/pagerduty\",\"vulnerabilit"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/oratorlab\",\"vulnerabilit"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/sublime_settings\",\"vulne"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/DailyCodingProblems\",\"vu"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/tmux\",\"vulnerabilityAler"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/HTB-Notes-Private\",\"vuln"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Hack-The-Box-Walkthrough"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Pentesting-Scripts\",\"vul"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/ftp-user-enum\",\"vulnerab"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/Rspec-Capybara-Automatio"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [post https://api.github.com/graphql] (disabled: false) + [Cassette: 'github_dependabot'] Checking if [post https://api.github.com/graphql] matches [post https://api.github.com/graphql] using [:method, :uri] + [Cassette: 'github_dependabot'] method (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] uri (matched): current request [post https://api.github.com/graphql] vs [post https://api.github.com/graphql] + [Cassette: 'github_dependabot'] Found matching interaction for [post https://api.github.com/graphql] at index 0: [200 "{\"data\":{\"repository\":{\"url\":\"https://github.com/shotop/advent_of_code_2020\",\"vu"] +[webmock] Identified request type (stubbed_by_vcr) for [post https://api.github.com/graphql] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[Cassette: 'snyk_v2_task_run'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get https://api.eu.snyk.io/rest/orgs?version=2024-04-29] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get https://api.eu.snyk.io/rest/orgs?version=2024-04-29] +[webmock] Handling request: [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'snyk_v2_task_run'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 2 interaction(s): { [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] => [200 "{\"jsonapi\":{\"version\":\"1.0\"},\"data\":[{\"type\":\"project\",\"id\":\"abcd5678-1234-efgh-"], [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-14T00:00:00Z&created_before=2024-08-13T00:00:00Z&limit=10&version=2024-04-29] => [200 "{\"jsonapi\":{\"version\":\"1.0\"},\"links\":{\"self\":\"/rest/orgs/abcd1234-5678-90ef-ghij"] } + [Cassette: 'snyk_v2_task_run'] Checking if [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] matches [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] using [:method, :uri] + [Cassette: 'snyk_v2_task_run'] method (matched): current request [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] vs [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] + [Cassette: 'snyk_v2_task_run'] uri (matched): current request [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] vs [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] + [Cassette: 'snyk_v2_task_run'] Found matching interaction for [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] at index 0: [200 "{\"jsonapi\":{\"version\":\"1.0\"},\"data\":[{\"type\":\"project\",\"id\":\"abcd5678-1234-efgh-"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] +[webmock] Handling request: [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-13T00:00:00Z&created_before=2024-08-12T00:00:00Z&limit=10&version=2024-04-29] (disabled: false) + [Cassette: 'snyk_v2_task_run'] Checking if [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-13T00:00:00Z&created_before=2024-08-12T00:00:00Z&limit=10&version=2024-04-29] matches [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-14T00:00:00Z&created_before=2024-08-13T00:00:00Z&limit=10&version=2024-04-29] using [:method, :uri] + [Cassette: 'snyk_v2_task_run'] method (matched): current request [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-13T00:00:00Z&created_before=2024-08-12T00:00:00Z&limit=10&version=2024-04-29] vs [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-14T00:00:00Z&created_before=2024-08-13T00:00:00Z&limit=10&version=2024-04-29] + [Cassette: 'snyk_v2_task_run'] uri (did not match): current request [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-13T00:00:00Z&created_before=2024-08-12T00:00:00Z&limit=10&version=2024-04-29] vs [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-14T00:00:00Z&created_before=2024-08-13T00:00:00Z&limit=10&version=2024-04-29] +[webmock] Identified request type (unhandled) for [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-13T00:00:00Z&created_before=2024-08-12T00:00:00Z&limit=10&version=2024-04-29] + [Cassette: 'snyk_v2_task_run'] Checking if [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-13T00:00:00Z&created_before=2024-08-12T00:00:00Z&limit=10&version=2024-04-29] matches [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] using [:method, :uri] + [Cassette: 'snyk_v2_task_run'] method (matched): current request [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-13T00:00:00Z&created_before=2024-08-12T00:00:00Z&limit=10&version=2024-04-29] vs [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] + [Cassette: 'snyk_v2_task_run'] uri (did not match): current request [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-13T00:00:00Z&created_before=2024-08-12T00:00:00Z&limit=10&version=2024-04-29] vs [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] +[Cassette: 'snyk_v2_task_run'] Initialized with options: {:record=>:once, :record_on_error=>true, :match_requests_on=>[:method, :uri], :allow_unused_http_interactions=>true, :serialize_with=>:yaml, :persist_with=>:file_system, :persister_options=>{}} +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get https://api.eu.snyk.io/rest/orgs?version=2024-04-29] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get https://api.eu.snyk.io/rest/orgs?version=2024-04-29] +[webmock] Handling request: [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] (disabled: false) +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" +[VCR::Configuration] before_playback: replacing nil with "" + [Cassette: 'snyk_v2_task_run'] Initialized HTTPInteractionList with request matchers [:method, :uri] and 2 interaction(s): { [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] => [200 "{\"jsonapi\":{\"version\":\"1.0\"},\"data\":[{\"type\":\"project\",\"id\":\"abcd5678-1234-efgh-"], [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-14T00:00:00Z&created_before=2024-08-13T00:00:00Z&limit=10&version=2024-04-29] => [200 "{\"jsonapi\":{\"version\":\"1.0\"},\"links\":{\"self\":\"/rest/orgs/abcd1234-5678-90ef-ghij"] } + [Cassette: 'snyk_v2_task_run'] Checking if [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] matches [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] using [:method, :uri] + [Cassette: 'snyk_v2_task_run'] method (matched): current request [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] vs [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] + [Cassette: 'snyk_v2_task_run'] uri (matched): current request [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] vs [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] + [Cassette: 'snyk_v2_task_run'] Found matching interaction for [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] at index 0: [200 "{\"jsonapi\":{\"version\":\"1.0\"},\"data\":[{\"type\":\"project\",\"id\":\"abcd5678-1234-efgh-"] +[webmock] Identified request type (stubbed_by_vcr) for [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] +[webmock] Handling request: [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-13T00:00:00Z&created_before=2024-08-12T00:00:00Z&limit=10&version=2024-04-29] (disabled: false) + [Cassette: 'snyk_v2_task_run'] Checking if [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-13T00:00:00Z&created_before=2024-08-12T00:00:00Z&limit=10&version=2024-04-29] matches [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-14T00:00:00Z&created_before=2024-08-13T00:00:00Z&limit=10&version=2024-04-29] using [:method, :uri] + [Cassette: 'snyk_v2_task_run'] method (matched): current request [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-13T00:00:00Z&created_before=2024-08-12T00:00:00Z&limit=10&version=2024-04-29] vs [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-14T00:00:00Z&created_before=2024-08-13T00:00:00Z&limit=10&version=2024-04-29] + [Cassette: 'snyk_v2_task_run'] uri (did not match): current request [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-13T00:00:00Z&created_before=2024-08-12T00:00:00Z&limit=10&version=2024-04-29] vs [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-14T00:00:00Z&created_before=2024-08-13T00:00:00Z&limit=10&version=2024-04-29] +[webmock] Identified request type (unhandled) for [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-13T00:00:00Z&created_before=2024-08-12T00:00:00Z&limit=10&version=2024-04-29] + [Cassette: 'snyk_v2_task_run'] Checking if [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-13T00:00:00Z&created_before=2024-08-12T00:00:00Z&limit=10&version=2024-04-29] matches [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] using [:method, :uri] + [Cassette: 'snyk_v2_task_run'] method (matched): current request [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-13T00:00:00Z&created_before=2024-08-12T00:00:00Z&limit=10&version=2024-04-29] vs [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] + [Cassette: 'snyk_v2_task_run'] uri (did not match): current request [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-13T00:00:00Z&created_before=2024-08-12T00:00:00Z&limit=10&version=2024-04-29] vs [get https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get https://api.veracode.com/appsec/v1/categories?size=100] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get https://api.veracode.com/appsec/v1/categories?size=100] +[webmock] Handling request: [get https://api.veracode.com/appsec/v1/applications?size=100] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get https://api.veracode.com/appsec/v1/applications?size=100] +[webmock] Handling request: [get https://api.veracode.com/appsec/v2/applications/TESTGUID/findings?size=100] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get https://api.veracode.com/appsec/v2/applications/TESTGUID/findings?size=100] +[webmock] Handling request: [get https://api.veracode.com/appsec/v2/applications/TESTGUID/findings?scan_type=SCA&size=100] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get https://api.veracode.com/appsec/v2/applications/TESTGUID/findings?scan_type=SCA&size=100] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [post http://api.example.com/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [post http://api.example.com/] +[webmock] Handling request: [post http://api.example.com/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [post http://api.example.com/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] +[webmock] Handling request: [get http://169.254.169.254/latest/metadata/] (disabled: false) +[webmock] Identified request type (externally_stubbed) for [get http://169.254.169.254/latest/metadata/] diff --git a/spec/fixtures/vcr_cassettes/snyk_v2_task_run.yml b/spec/fixtures/vcr_cassettes/snyk_v2_task_run.yml new file mode 100644 index 00000000..174f74f3 --- /dev/null +++ b/spec/fixtures/vcr_cassettes/snyk_v2_task_run.yml @@ -0,0 +1,120 @@ +--- +http_interactions: +- request: + method: get + uri: https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects?limit=100&version=2024-04-29 + body: + encoding: US-ASCII + string: '' + headers: + Accept: + - application/json + User-Agent: + - rest-client/2.1.0 (darwin23 arm64) ruby/3.2.2p53 + Content-Type: + - application/json + Authorization: + - Token 2dfbc991-a5e2-487b-a19c-eeb213bd0c7c + Accept-Encoding: + - gzip;q=1.0,deflate;q=0.6,identity;q=0.3 + Host: + - api.eu.snyk.io + response: + status: + code: 200 + message: OK + headers: + Content-Type: + - application/vnd.api+json; charset=utf-8 + Snyk-Request-Id: + - 22f628f3-07b6-42af-9138-5d6880f8a460 + Snyk-Version-Requested: + - '2024-04-29' + Snyk-Version-Served: + - '2023-08-28' + Snyk-Version-Lifecycle-Stage: + - ga + Vary: + - Accept-Encoding + Date: + - Fri, 02 Aug 2024 18:24:47 GMT + Transfer-Encoding: + - chunked + Connection: + - Transfer-Encoding + - keep-alive + Akamai-Cache-Status: + - Miss from child, Miss from parent + Akamai-Grn: + - 0.25acc117.1722623087.2c0fae9 + X-Frame-Options: + - SAMEORIGIN + X-Content-Type-Options: + - nosniff + Strict-Transport-Security: + - max-age=31536000; preload + body: + encoding: UTF-8 + string: '{"jsonapi":{"version":"1.0"},"data":[{"type":"project","id":"abcd5678-1234-efgh-ijkl-mnopqrstuvwx","meta":{"cli_monitored_at":"2024-06-10T11:19:36.263Z"},"attributes":{"name":"sim-management-ui","type":"npm","target_file":"","target_reference":"main","origin":"cli","created":"2024-06-10T11:19:36.268Z","status":"active","business_criticality":[],"environment":[],"lifecycle":[],"tags":[],"read_only":false,"settings":{"recurring_tests":{"frequency":"daily"},"pull_requests":{"fail_only_for_issues_with_fix":false}}},"relationships":{"organization":{"data":{"type":"org","id":"abcd1234-5678-90ef-ghij-klmnopqrstuv"},"links":{"related":"/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv"}},"target":{"data":{"type":"target","id":"ijkl9012-3456-mnop-qrst-uvwxyzabcd12"},"links":{"related":"/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/targets/ijkl9012-3456-mnop-qrst-uvwxyzabcd12"}},"importer":{"data":{"type":"user","id":"abcd3456-7890-efgh-ijkl-mnopqrstuvwx"},"links":{"related":"/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/users/abcd3456-7890-efgh-ijkl-mnopqrstuvwx"}}}},{"type":"project","id":"abcd5678-ijkl-90mn-opqr-stuvwxyzabcd","meta":{"cli_monitored_at":"2024-06-10T11:19:34.049Z"},"attributes":{"name":"com.sdi:VerisureSimManagement","type":"maven","target_file":"","target_reference":"main","origin":"cli","created":"2024-06-10T11:19:34.055Z","status":"active","business_criticality":[],"environment":[],"lifecycle":[],"tags":[],"read_only":false,"settings":{"recurring_tests":{"frequency":"daily"},"pull_requests":{"fail_only_for_issues_with_fix":false}}},"relationships":{"organization":{"data":{"type":"org","id":"abcd1234-5678-90ef-ghij-klmnopqrstuv"},"links":{"related":"/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv"}},"target":{"data":{"type":"target","id":"ijkl9012-3456-mnop-qrst-uvwxyzabcd12"},"links":{"related":"/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/targets/ijkl9012-3456-mnop-qrst-uvwxyzabcd12"}},"importer":{"data":{"type":"user","id":"abcd3456-7890-efgh-ijkl-mnopqrstuvwx"},"links":{"related":"/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/users/abcd3456-7890-efgh-ijkl-mnopqrstuvwx"}}}}],"links":{}}' + recorded_at: Fri, 02 Aug 2024 18:24:47 GMT +- request: + method: get + uri: https://api.eu.snyk.io/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-14T00:00:00Z&created_before=2024-08-13T00:00:00Z&limit=10&version=2024-04-29 + body: + encoding: US-ASCII + string: '' + headers: + Accept: + - application/json + User-Agent: + - rest-client/2.1.0 (darwin23 arm64) ruby/3.2.2p53 + Content-Type: + - application/json + Authorization: + - Token 2dfbc991-a5e2-487b-a19c-eeb213bd0c7c + Accept-Encoding: + - gzip;q=1.0,deflate;q=0.6,identity;q=0.3 + Host: + - api.eu.snyk.io + response: + status: + code: 200 + message: OK + headers: + Content-Type: + - application/vnd.api+json + Vary: + - Origin + X-Envoy-Upstream-Service-Time: + - '9' + Snyk-Request-Id: + - 3c347e60-5c1e-408b-96a4-95de92416432 + Snyk-Version-Requested: + - '2024-04-29' + Snyk-Version-Served: + - '2024-01-23' + Snyk-Version-Lifecycle-Stage: + - ga + Server: + - envoy + Content-Length: + - '15581' + Date: + - Fri, 02 Aug 2024 18:24:47 GMT + Connection: + - keep-alive + Akamai-Cache-Status: + - Miss from child, Miss from parent + Akamai-Grn: + - 0.25acc117.1722623087.2c102b0 + X-Frame-Options: + - SAMEORIGIN + X-Content-Type-Options: + - nosniff + Strict-Transport-Security: + - max-age=31536000; preload + body: + encoding: UTF-8 + string: '{"jsonapi":{"version":"1.0"},"links":{"self":"/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?version=2024-04-29&limit=10&created_after=2024-07-03T00:00:00Z&created_before=2024-08-02T00:00:00Z","first":"/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-03T00%3A00%3A00Z&created_before=2024-08-02T00%3A00%3A00Z&limit=10&version=2024-04-29","last":"/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-03T00%3A00%3A00Z&created_before=2024-08-02T00%3A00%3A00Z&ending_before=end&limit=10&version=2024-04-29","prev":"/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-03T00%3A00%3A00Z&created_before=2024-08-02T00%3A00%3A00Z&ending_before=eyJvcmdJZCI6ImUwMzE5ZDAxLTdhM2YtNDQyYS04ZTk0LTM2MTNiODFjNzA1YSIsInNldmVyaXR5IjozMCwiY3JlYXRlZEF0IjoiMjAyNC0wNy0wOFQxMDoxMzozNy41NDhaIiwiaWQiOiJlNjJjNTE2MS05YmI4LTQxYjMtOTg3Yi00ODdjODM4ODE4NDEiLCJ0b3RhbCI6eyJjYWxjdWxhdGVkQXQiOiIwMDAxLTAxLTAxVDAwOjAwOjAwWiJ9fQ%3D%3D&limit=10&version=2024-04-29","next":"/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-03T00%3A00%3A00Z&created_before=2024-08-02T00%3A00%3A00Z&limit=10&starting_after=eyJvcmdJZCI6ImUwMzE5ZDAxLTdhM2YtNDQyYS04ZTk0LTM2MTNiODFjNzA1YSIsInNldmVyaXR5IjozMCwiY3JlYXRlZEF0IjoiMjAyNC0wNy0xMVQwNjozMzozNS4yMDhaIiwiaWQiOiI2ZWFkOWFkZi03NjhiLTQyMWEtODQ0MC1iNWNmNjJlNDgxZTQiLCJ0b3RhbCI6eyJjYWxjdWxhdGVkQXQiOiIwMDAxLTAxLTAxVDAwOjAwOjAwWiJ9fQ%3D%3D&version=2024-04-29"},"data":[{"id":"d62c5f6a-ABCD-41b3-EFGH-487c83881841","type":"issue","attributes":{"classes":[{"id":"CWE-613","source":"CWE","type":"weakness"}],"coordinates":[{"is_fixable_manually":false,"is_fixable_snyk":true,"is_fixable_upstream":false,"is_patchable":false,"is_pinnable":false,"is_upgradeable":true,"reachability":"no-info","representations":[{"dependency":{"package_name":"org.apache.tomcat.embed:tomcat-embed-core","package_version":"9.0.12"}}]}],"created_at":"2024-07-08T10:13:37.548Z","effective_severity_level":"high","ignored":false,"key":"SNYK-JAVA-DUMMYORGAPACHETOMCATEMBEDXX-7430175","problems":[{"id":"SNYK-JAVA-DUMMYORGAPACHETOMCATEMBEDXX-7430175","source":"SNYK","type":"vulnerability","updated_at":"2024-07-08T10:13:38.759844Z"},{"id":"CVE-2024-34750","source":"NVD","type":"vulnerability","updated_at":"2024-07-08T10:13:38.759846Z","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-34750"}],"risk":{"factors":[],"score":{"model":"v1","value":124}},"status":"open","title":"Insufficient Session Expiration","type":"package_vulnerability","updated_at":"2024-07-08T10:13:37.548Z"},"relationships":{"organization":{"data":{"id":"abcd1234-5678-90ef-ghij-klmnopqrstuv","type":"organization"},"links":{"related":"/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv"}},"scan_item":{"data":{"id":"d1d1d1d1-ABCD-49b6-FFFF-8b0528afbe5b","type":"project"},"links":{"related":"/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects/d1d1d1d1-ABCD-49b6-FFFF-8b0528afbe5b"}}}},{"id":"7cfb92c9-WXYZ-55gc-IJKL-99f1fd01b412","type":"issue","attributes":{"classes":[{"id":"CWE-613","source":"CWE","type":"weakness"}],"coordinates":[{"is_fixable_manually":false,"is_fixable_snyk":true,"is_fixable_upstream":false,"is_patchable":false,"is_pinnable":false,"is_upgradeable":true,"reachability":"no-info","representations":[{"dependency":{"package_name":"org.apache.tomcat.embed:tomcat-embed-core","package_version":"8.5.11"}}]}],"created_at":"2024-07-09T00:40:58.934Z","effective_severity_level":"high","ignored":false,"key":"SNYK-JAVA-DUMMYORGAPACHETOMCATEMBEDXX-7430175","problems":[{"id":"SNYK-JAVA-DUMMYORGAPACHETOMCATEMBEDXX-7430175","source":"SNYK","type":"vulnerability","updated_at":"2024-07-09T00:41:00.779608Z"},{"id":"CVE-2024-34750","source":"NVD","type":"vulnerability","updated_at":"2024-07-09T00:41:00.77961Z","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-34750"}],"risk":{"factors":[],"score":{"model":"v1","value":124}},"status":"open","title":"Insufficient Session Expiration","type":"package_vulnerability","updated_at":"2024-07-09T00:40:58.934Z"},"relationships":{"organization":{"data":{"id":"abcd1234-5678-90ef-ghij-klmnopqrstuv","type":"organization"},"links":{"related":"/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv"}},"scan_item":{"data":{"id":"cecdbd27-0d35-467d-bac8-19c96d9e5c88","type":"project"},"links":{"related":"/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects/cecdbd27-0d35-467d-bac8-19c96d9e5c88"}}}}]}' + recorded_at: Fri, 02 Aug 2024 18:24:47 GMT +recorded_with: VCR 6.1.0 diff --git a/spec/rspec_helper.rb b/spec/rspec_helper.rb index dae98cfe..769f7271 100644 --- a/spec/rspec_helper.rb +++ b/spec/rspec_helper.rb @@ -30,9 +30,11 @@ AWS_ACCESS_KEY_ID AWS_SECRET_ACCESS_KEY GITHUB_TOKEN + SNYK_API_TOKEN ].each do |key| config.filter_sensitive_data("<#{key}>") { ENV[key] } end + config.debug_logger = File.open("log/vcr_debug.log", "w") end module Kenna diff --git a/spec/tasks/connectors/snyk_v2/fixtures/issues.json b/spec/tasks/connectors/snyk_v2/fixtures/issues.json index d4bdcda1..9dc19b2f 100644 --- a/spec/tasks/connectors/snyk_v2/fixtures/issues.json +++ b/spec/tasks/connectors/snyk_v2/fixtures/issues.json @@ -1,63 +1,178 @@ { - "results": [ + "jsonapi": { + "version": "1.0" + }, + "links": { + "self": "/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?version=2024-04-29&limit=10&created_after=2024-07-03T00:00:00Z&created_before=2024-08-02T00:00:00Z", + "first": "/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-03T00%3A00%3A00Z&created_before=2024-08-02T00%3A00%3A00Z&limit=10&version=2024-04-29", + "last": "/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-03T00%3A00%3A00Z&created_before=2024-08-02T00%3A00%3A00Z&ending_before=end&limit=10&version=2024-04-29", + "prev": "/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-03T00%3A00%3A00Z&created_before=2024-08-02T00%3A00%3A00Z&ending_before=eyJvcmdJZCI6ImUwMzE5ZDAxLTdhM2YtNDQyYS04ZTk0LTM2MTNiODFjNzA1YSIsInNldmVyaXR5IjozMCwiY3JlYXRlZEF0IjoiMjAyNC0wNy0wOFQxMDoxMzozNy41NDhaIiwiaWQiOiJlNjJjNTE2MS05YmI4LTQxYjMtOTg3Yi00ODdjODM4ODE4NDEiLCJ0b3RhbCI6eyJjYWxjdWxhdGVkQXQiOiIwMDAxLTAxLTAxVDAwOjAwOjAwWiJ9fQ%3D%3D&limit=10&version=2024-04-29", + "next": "/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-07-03T00%3A00%3A00Z&created_before=2024-08-02T00%3A00%3A00Z&limit=10&starting_after=eyJvcmdJZCI6ImUwMzE5ZDAxLTdhM2YtNDQyYS04ZTk0LTM2MTNiODFjNzA1YSIsInNldmVyaXR5IjozMCwiY3JlYXRlZEF0IjoiMjAyNC0wNy0xMVQwNjozMzozNS4yMDhaIiwiaWQiOiI2ZWFkOWFkZi03NjhiLTQyMWEtODQ0MC1iNWNmNjJlNDgxZTQiLCJ0b3RhbCI6eyJjYWxjdWxhdGVkQXQiOiIwMDAxLTAxLTAxVDAwOjAwOjAwWiJ9fQ%3D%3D&version=2024-04-29" + }, + "data": [ { - "issue": { - "url": "http://security.snyk.io/vuln/SNYK-JAVA-COMMONSCOLLECTIONS-30078", - "id": "SNYK-JAVA-COMMONSCOLLECTIONS-30078", - "title": "Deserialization of Untrusted Data", - "type": "vuln", - "package": "commons-collections:commons-collections", - "version": "3.1", - "severity": "critical", - "originalSeverity": null, - "uniqueSeveritiesList": [ - "critical" + "id": "d62c5f6a-ABCD-41b3-EFGH-487c83881841", + "type": "issue", + "attributes": { + "classes": [ + { + "id": "CWE-613", + "source": "CWE", + "type": "weakness" + } ], - "language": "java", - "packageManager": "maven", - "semver": { - "vulnerable": [ - "[3.0,3.2.2)" - ] + "coordinates": [ + { + "is_fixable_manually": false, + "is_fixable_snyk": true, + "is_fixable_upstream": false, + "is_patchable": false, + "is_pinnable": false, + "is_upgradeable": true, + "reachability": "no-info", + "representations": [ + { + "dependency": { + "package_name": "org.apache.tomcat.embed:tomcat-embed-core", + "package_version": "9.0.12" + } + } + ] + } + ], + "created_at": "2024-07-08T10:13:37.548Z", + "effective_severity_level": "high", + "ignored": false, + "key": "SNYK-JAVA-DUMMYORGAPACHETOMCATEMBEDXX-7430175", + "problems": [ + { + "id": "SNYK-JAVA-DUMMYORGAPACHETOMCATEMBEDXX-7430175", + "source": "SNYK", + "type": "vulnerability", + "updated_at": "2024-07-08T10:13:38.759844Z" + }, + { + "id": "CVE-2024-34750", + "source": "NVD", + "type": "vulnerability", + "updated_at": "2024-07-08T10:13:38.759846Z", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34750" + } + ], + "risk": { + "factors": [], + "score": { + "model": "v1", + "value": 124 + } }, - "isIgnored": false, - "publicationTime": "2015-11-06T16:51:56.000Z", - "disclosureTime": "2015-11-06T16:51:56.000Z", - "isUpgradable": false, - "isPatchable": false, - "isPinnable": false, - "identifiers": { - "CVE": [ - "CVE-2015-7501", - "CVE-2015-4852" - ], - "CWE": [ - "CWE-502" - ] + "status": "open", + "title": "Insufficient Session Expiration", + "type": "package_vulnerability", + "updated_at": "2024-07-08T10:13:37.548Z" + }, + "relationships": { + "organization": { + "data": { + "id": "abcd1234-5678-90ef-ghij-klmnopqrstuv", + "type": "organization" + }, + "links": { + "related": "/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv" + } }, - "credit": [ - "Unknown" + "scan_item": { + "data": { + "id": "d1d1d1d1-ABCD-49b6-FFFF-8b0528afbe5b", + "type": "project" + }, + "links": { + "related": "/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects/d1d1d1d1-ABCD-49b6-FFFF-8b0528afbe5b" + } + } + } + }, + { + "id": "7cfb92c9-WXYZ-55gc-IJKL-99f1fd01b412", + "type": "issue", + "attributes": { + "classes": [ + { + "id": "CWE-613", + "source": "CWE", + "type": "weakness" + } ], - "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O", - "cvssScore": "9.8", - "patches": [], - "isPatched": false, - "exploitMaturity": "mature", - "reachability": "", - "priorityScore": 790, - "jiraIssueUrl": null + "coordinates": [ + { + "is_fixable_manually": false, + "is_fixable_snyk": true, + "is_fixable_upstream": false, + "is_patchable": false, + "is_pinnable": false, + "is_upgradeable": true, + "reachability": "no-info", + "representations": [ + { + "dependency": { + "package_name": "org.apache.tomcat.embed:tomcat-embed-core", + "package_version": "8.5.11" + } + } + ] + } + ], + "created_at": "2024-07-09T00:40:58.934Z", + "effective_severity_level": "high", + "ignored": false, + "key": "SNYK-JAVA-DUMMYORGAPACHETOMCATEMBEDXX-7430175", + "problems": [ + { + "id": "SNYK-JAVA-DUMMYORGAPACHETOMCATEMBEDXX-7430175", + "source": "SNYK", + "type": "vulnerability", + "updated_at": "2024-07-09T00:41:00.779608Z" + }, + { + "id": "CVE-2024-34750", + "source": "NVD", + "type": "vulnerability", + "updated_at": "2024-07-09T00:41:00.77961Z", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34750" + } + ], + "risk": { + "factors": [], + "score": { + "model": "v1", + "value": 124 + } + }, + "status": "open", + "title": "Insufficient Session Expiration", + "type": "package_vulnerability", + "updated_at": "2024-07-09T00:40:58.934Z" }, - "isFixed": false, - "introducedDate": "2023-04-26", - "project": { - "url": "https://snyk.io/org/kenna-security-nfr-shared/project/9a134a37-7420-4418-9b85-b675ed9ac3dc", - "id": "9a134a37-7420-4418-9b85-b675ed9ac3dc", - "name": "JoyChou93/java-sec-code:pom.xml", - "source": "github", - "packageManager": "maven", - "targetFile": "pom.xml" + "relationships": { + "organization": { + "data": { + "id": "abcd1234-5678-90ef-ghij-klmnopqrstuv", + "type": "organization" + }, + "links": { + "related": "/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv" + } + }, + "scan_item": { + "data": { + "id": "cecdbd27-0d35-467d-bac8-19c96d9e5c88", + "type": "project" + }, + "links": { + "related": "/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/projects/cecdbd27-0d35-467d-bac8-19c96d9e5c88" + } + } } } - ], - "total": 1 -} \ No newline at end of file + ] +} diff --git a/spec/tasks/connectors/snyk_v2/fixtures/issues_empty.json b/spec/tasks/connectors/snyk_v2/fixtures/issues_empty.json index 550710f9..8d1c8a3d 100644 --- a/spec/tasks/connectors/snyk_v2/fixtures/issues_empty.json +++ b/spec/tasks/connectors/snyk_v2/fixtures/issues_empty.json @@ -1,4 +1,12 @@ { - "results": [], - "total": 0 -} \ No newline at end of file + "jsonapi": { + "version": "1.0" + }, + "links": { + "self": "/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?version=2024-04-29&limit=10&created_after=2024-05-06T00:00:00Z&created_before=2024-06-05T00:00:00Z", + "first": "/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-05-06T00%3A00%3A00Z&created_before=2024-06-05T00%3A00%3A00Z&limit=10&version=2024-04-29", + "last": "/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-05-06T00%3A00%3A00Z&created_before=2024-06-05T00%3A00%3A00Z&ending_before=end&limit=10&version=2024-04-29", + "prev": "/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/issues?created_after=2024-05-06T00%3A00%3A00Z&created_before=2024-06-05T00%3A00%3A00Z&ending_before=eyJvcmdJZCI6ImUwMzE5ZDAxLTdhM2YtNDQyYS04ZTk0LTM2MTNiODFjNzA1YSIsInNldmVyaXR5Ijo0MCwiY3JlYXRlZEF0IjoiMjAyNC0wNS0wN1QwODo0ODoxMi40MjJaIiwiaWQiOiIwY2EwMzQ1My0zOTkxLTQ1OTYtYjYzOS1iYmE4NDM5ZWZhZjAiLCJ0b3RhbCI6eyJjYWxjdWxhdGVkQXQiOiIwMDAxLTAxLTAxVDAwOjAwOjAwWiJ9fQ%3D%3D&limit=10&version=2024-04-29" + }, + "data": [] +} diff --git a/spec/tasks/connectors/snyk_v2/fixtures/orgs.json b/spec/tasks/connectors/snyk_v2/fixtures/orgs.json index 3743743b..54b79dae 100644 --- a/spec/tasks/connectors/snyk_v2/fixtures/orgs.json +++ b/spec/tasks/connectors/snyk_v2/fixtures/orgs.json @@ -1,14 +1,29 @@ { - "orgs": [ + "data": [ { - "id": "f0495cb5-f188-4745-86f7-289672d3a137", - "name": "Kenna Security NFR - Shared", - "slug": "kenna-security-nfr-shared", - "url": "https://app.snyk.io/org/kenna-security-nfr-shared", - "group": { - "name": "Kenna Security - Partner NFR", - "id": "a3728e08-d40a-454f-bf19-1ba18a7a2ce9" + "id": "abcd1234-5678-90ef-ghij-klmnopqrstuv", + "type": "org", + "attributes": { + "group_id": "48e855c0-d1c6-4065-90c6-a648cd5dfc83", + "is_personal": false, + "name": "xN.PU", + "slug": "xn.pu" + }, + "relationships": { + "member_role": { + "data": { + "id": "ffb95696-f8a0-4e7e-87a7-50b5bf032402", + "type": "org_role" + } + } } } - ] -} \ No newline at end of file + ], + "jsonapi": { + "version": "1.0" + }, + "links": { + "self": "/rest/orgs?limit=10&version=2024-04-29", + "first": "/rest/orgs?limit=10&version=2024-04-29" + } +} diff --git a/spec/tasks/connectors/snyk_v2/fixtures/projects.json b/spec/tasks/connectors/snyk_v2/fixtures/projects.json index b05c861e..5b36aaa0 100644 --- a/spec/tasks/connectors/snyk_v2/fixtures/projects.json +++ b/spec/tasks/connectors/snyk_v2/fixtures/projects.json @@ -1,68 +1,124 @@ { - "org": { - "name": "Kenna Security NFR - Shared", - "id": "f0495cb5-f188-4745-86f7-289672d3a137" + "jsonapi": { + "version": "1.0" }, - "projects": [ + "data": [ { - "id": "9a134a37-7420-4418-9b85-b675ed9ac3dc", - "name": "JoyChou93/java-sec-code:pom.xml", - "created": "2023-04-26T15:33:04.803Z", - "origin": "github", - "type": "maven", - "readOnly": false, - "testFrequency": "daily", - "isMonitored": true, - "totalDependencies": 199, - "issueCountsBySeverity": { - "low": 14, - "high": 128, - "medium": 92, - "critical": 10 + "type": "project", + "id": "abcd5678-1234-efgh-ijkl-mnopqrstuvwx", + "meta": { + "cli_monitored_at": "2024-06-10T11:19:36.263Z" }, - "remoteRepoUrl": "https://github.com/JoyChou93/java-sec-code", - "imageTag": "1.0.0", - "lastTestedDate": "2023-04-26T15:33:30.181Z", - "browseUrl": "https://app.snyk.io/org/kenna-security-nfr-shared/project/9a134a37-7420-4418-9b85-b675ed9ac3dc", - "owner": null, - "tags": [], "attributes": { - "criticality": [], + "name": "sim-management-ui", + "type": "npm", + "target_file": "", + "target_reference": "main", + "origin": "cli", + "created": "2024-06-10T11:19:36.268Z", + "status": "active", + "business_criticality": [], + "environment": [], "lifecycle": [], - "environment": [] + "tags": [], + "read_only": false, + "settings": { + "recurring_tests": { + "frequency": "daily" + }, + "pull_requests": { + "fail_only_for_issues_with_fix": false + } + } }, - "branch": "master", - "targetReference": "master" + "relationships": { + "organization": { + "data": { + "type": "org", + "id": "abcd1234-5678-90ef-ghij-klmnopqrstuv" + }, + "links": { + "related": "/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv" + } + }, + "target": { + "data": { + "type": "target", + "id": "ijkl9012-3456-mnop-qrst-uvwxyzabcd12" + }, + "links": { + "related": "/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/targets/ijkl9012-3456-mnop-qrst-uvwxyzabcd12" + } + }, + "importer": { + "data": { + "type": "user", + "id": "abcd3456-7890-efgh-ijkl-mnopqrstuvwx" + }, + "links": { + "related": "/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/users/abcd3456-7890-efgh-ijkl-mnopqrstuvwx" + } + } + } }, { - "id": "3e297402-893c-4a69-86dc-c642dce18fe6", - "name": "JoyChou93/java-sec-code", - "created": "2023-04-26T15:33:05.588Z", - "origin": "github", - "type": "sast", - "readOnly": false, - "testFrequency": "weekly", - "isMonitored": true, - "totalDependencies": null, - "issueCountsBySeverity": { - "low": 4, - "high": 86, - "medium": 27, - "critical": 0 + "type": "project", + "id": "abcd5678-ijkl-90mn-opqr-stuvwxyzabcd", + "meta": { + "cli_monitored_at": "2024-06-10T11:19:34.049Z" }, - "remoteRepoUrl": "https://github.com/JoyChou93/java-sec-code", - "imageTag": "", - "lastTestedDate": "2023-04-26T15:33:06.012Z", - "browseUrl": "https://app.snyk.io/org/kenna-security-nfr-shared/project/3e297402-893c-4a69-86dc-c642dce18fe6", - "owner": null, - "tags": [], "attributes": { - "criticality": [], + "name": "com.sdi:VerisureSimManagement", + "type": "maven", + "target_file": "", + "target_reference": "main", + "origin": "cli", + "created": "2024-06-10T11:19:34.055Z", + "status": "active", + "business_criticality": [], + "environment": [], "lifecycle": [], - "environment": [] + "tags": [], + "read_only": false, + "settings": { + "recurring_tests": { + "frequency": "daily" + }, + "pull_requests": { + "fail_only_for_issues_with_fix": false + } + } }, - "branch": "master", - "targetReference": "master" + "relationships": { + "organization": { + "data": { + "type": "org", + "id": "abcd1234-5678-90ef-ghij-klmnopqrstuv" + }, + "links": { + "related": "/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv" + } + }, + "target": { + "data": { + "type": "target", + "id": "ijkl9012-3456-mnop-qrst-uvwxyzabcd12" + }, + "links": { + "related": "/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/targets/ijkl9012-3456-mnop-qrst-uvwxyzabcd12" + } + }, + "importer": { + "data": { + "type": "user", + "id": "abcd3456-7890-efgh-ijkl-mnopqrstuvwx" + }, + "links": { + "related": "/rest/orgs/abcd1234-5678-90ef-ghij-klmnopqrstuv/users/abcd3456-7890-efgh-ijkl-mnopqrstuvwx" + } + } + } } - ] -} \ No newline at end of file + ], + "links": {} +} diff --git a/spec/tasks/connectors/snyk_v2/snyk_v2_stubs.rb b/spec/tasks/connectors/snyk_v2/snyk_v2_stubs.rb index 5d3b2525..f3801df0 100644 --- a/spec/tasks/connectors/snyk_v2/snyk_v2_stubs.rb +++ b/spec/tasks/connectors/snyk_v2/snyk_v2_stubs.rb @@ -6,20 +6,16 @@ def read_fixture_file(filename) end def stub_orgs_request - stub_request(:get, "https://snyk.io/api/v1/orgs").to_return_json(body: read_fixture_file("orgs.json")) + stub_request(:get, "https://api.eu.snyk.io/rest/orgs?version=2024-04-29").to_return_json(body: read_fixture_file("orgs.json")) end def stub_projects_request - stub_request(:get, Addressable::Template.new("https://snyk.io/api/v1/org/{orgId}/projects")) + stub_request(:get, Addressable::Template.new("https://api.eu.snyk.io/rest/orgs/{orgId}/projects?version=2024-04-29&limit=100")) .to_return_json(body: read_fixture_file("projects.json")) end def stub_issues_request - stub_request(:post, "https://snyk.io/api/v1/reporting/issues") - .with(query: hash_including({ "page" => "1" })) + stub_request(:get, Addressable::Template.new("https://api.eu.snyk.io/rest/orgs/{orgId}/issues?created_after=2024-07-14T00:00:00Z&created_before=2024-08-13T00:00:00Z&limit=10&version=2024-04-29")) .to_return_json(body: read_fixture_file("issues.json")) - stub_request(:post, "https://snyk.io/api/v1/reporting/issues") - .with(query: hash_including({ "page" => "2" })) - .to_return_json(body: read_fixture_file("issues_empty.json")) end end diff --git a/spec/tasks/connectors/snyk_v2/snyk_v2_task_spec.rb b/spec/tasks/connectors/snyk_v2/snyk_v2_task_spec.rb index 552c0a99..8af04414 100644 --- a/spec/tasks/connectors/snyk_v2/snyk_v2_task_spec.rb +++ b/spec/tasks/connectors/snyk_v2/snyk_v2_task_spec.rb @@ -10,7 +10,7 @@ describe "#run" do let(:connector_run_success) { true } let(:kenna_client) { instance_double(Kenna::Api::Client, upload_to_connector: { "data_file" => 12 }, run_files_on_connector: { "success" => connector_run_success }) } - let(:options) { { snyk_api_token: '0xdeadbeef', import_type: } } + let(:options) { { snyk_api_token: '2dfbc991-a5e2-487b-a19c-eeb213bd0c7c', import_type: } } before do stub_orgs_request @@ -18,104 +18,78 @@ stub_issues_request allow(Kenna::Api::Client).to receive(:new) { kenna_client } spy_on_accumulators - task.run(options) end context "vulnerability" do let(:import_type) { "vulns" } it "creates normalized (non-duplicative) vuln_defs" do + VCR.use_cassette('snyk_v2_task_run') do + task.run(options) # Ejecución de la tarea dentro del bloque VCR + end + expect(task.vuln_defs).to include( { - "cve_identifiers" => "CVE-2015-7501,CVE-2015-4852", - "description" => "Deserialization of Untrusted Data", - "name" => "CVE-2015-7501", - "scanner_identifier" => "SNYK-JAVA-COMMONSCOLLECTIONS-30078", - "scanner_type" => "Snyk" + "name" => "SNYK-JAVA-DUMMYORGAPACHETOMCATEMBEDXX-7430175", + "scanner_type" => "Snyk", + "cve_identifiers" => "CVE-2024-34750", + "cwe_identifiers" => "CWE-613", + "description" => "CVE-2024-34750: Insufficient Session Expiration_package_vulnerability", + "solution" => "For more information, go to this link: https://nvd.nist.gov/vuln/detail/CVE-2024-34750" } ) end it "creates normalized (non-duplicative) vulns on assets" do + VCR.use_cassette('snyk_v2_task_run') do + task.run(options) + end + expect(task.assets).to include( { - "file" => "pom.xml", - "application" => "JoyChou93/java-sec-code:pom.xml", - "tags" => ["github", "maven", "Org:Kenna Security NFR - Shared"], + "file" => "Snyk_DUMMYORGAPACHETOMCATEMBEDXX_d62c5f6a-ABCD-41b3-EFGH-487c83881841", + "tags" => ["Org:abcd1234-5678-90ef-ghij-klmnopqrstuv"], + "os" => "JAVA", + "priority" => 10, + "findings" => [ + { + "additional_fields" => { + "dependency" => { + "package_name" => "org.apache.tomcat.embed:tomcat-embed-core", + "package_version" => "9.0.12" + }, + "is_fixable_manually" => false, + "is_fixable_snyk" => true, + "is_fixable_upstream" => false, + "is_patchable" => false, + "is_upgradeable" => true, + "reachability" => "no-info" + }, + "created_at" => "2024-07-08T10:13:37.548Z", + "last_seen_at" => "2024-07-08T10:13:37.548Z", + "scanner_identifier" => "d62c5f6a-ABCD-41b3-EFGH-487c83881841", + "scanner_type" => "Snyk", + "severity" => 6, + "triage_state" => "new", + "vuln_def_name" => "SNYK-JAVA-DUMMYORGAPACHETOMCATEMBEDXX-7430175" + } + ], "vulns" => [ - { "created_at" => "2023-04-26", - "details" => be_kind_of(String), - "last_seen_at" => be_kind_of(String), - "scanner_identifier" => "SNYK-JAVA-COMMONSCOLLECTIONS-30078", - "scanner_score" => 9, + { + "created_at" => "2024-07-08T10:13:37.548Z", + "details" => "CVE-2024-34750 : Insufficient Session Expiration_package_vulnerability", + "last_seen_at" => "2024-07-08T10:13:37.548Z", + "scanner_identifier" => "d62c5f6a-ABCD-41b3-EFGH-487c83881841", + "scanner_score" => 6, "scanner_type" => "Snyk", "status" => "open", - "vuln_def_name" => "CVE-2015-7501" } + "vuln_def_name" => "SNYK-JAVA-DUMMYORGAPACHETOMCATEMBEDXX-7430175" + } ] } ) end end - - context "finding that has multiple CVEs" do - let(:import_type) { "findings" } - - it "creates duplicate vuln_defs" do - expect(task.vuln_defs).to include( - { - "cve_identifiers" => "CVE-2015-7501", - "description" => "Deserialization of Untrusted Data", - "name" => "SNYK-JAVA-COMMONSCOLLECTIONS-30078-CVE-2015-7501", - "scanner_identifier" => "SNYK-JAVA-COMMONSCOLLECTIONS-30078-CVE-2015-7501", - "scanner_type" => "Snyk" - }, - { - "cve_identifiers" => "CVE-2015-4852", - "description" => "Deserialization of Untrusted Data", - "name" => "SNYK-JAVA-COMMONSCOLLECTIONS-30078-CVE-2015-4852", - "scanner_identifier" => "SNYK-JAVA-COMMONSCOLLECTIONS-30078-CVE-2015-4852", - "scanner_type" => "Snyk" - } - ) - end - - it "creates assets with duplicate findings" do - expect(task.assets).to include( - hash_including("file" => "pom.xml", - "application" => "JoyChou93/java-sec-code:pom.xml", - "tags" => ["github", "maven", "Org:Kenna Security NFR - Shared"], - "findings" => [ - asset_finding_for_cve("CVE-2015-7501"), asset_finding_for_cve("CVE-2015-4852") - ]) - ) - end - - def asset_finding_for_cve(cve) - { "scanner_identifier" => "SNYK-JAVA-COMMONSCOLLECTIONS-30078-#{cve}", - "scanner_type" => "Snyk", - "vuln_def_name" => "SNYK-JAVA-COMMONSCOLLECTIONS-30078-#{cve}", - "severity" => 9, - "last_seen_at" => "2023-04-26", - "additional_fields" => - { "url" => "http://security.snyk.io/vuln/SNYK-JAVA-COMMONSCOLLECTIONS-30078", - "id" => "SNYK-JAVA-COMMONSCOLLECTIONS-30078", - "title" => "Deserialization of Untrusted Data", - "file" => "pom.xml", - "application" => "JoyChou93/java-sec-code:pom.xml", - "introducedDate" => "2023-04-26", - "isPatchable" => "false", - "isUpgradable" => "false", - "language" => "java", - "semver" => "{\n \"vulnerable\": [\n \"[3.0,3.2.2)\"\n ]\n}", - "cvssScore" => "9.8", - "severity" => "critical", - "package" => "commons-collections:commons-collections", - "version" => "3.1", - "identifiers" => { "CVE" => ["CVE-2015-7501", "CVE-2015-4852"], "CWE" => ["CWE-502"] }, - "publicationTime" => "2015-11-06T16:51:56.000Z" }, - "triage_state" => "new" } - end - end end def spy_on_accumulators diff --git a/tasks/connectors/snyk_v2/lib/snyk_v2_client.rb b/tasks/connectors/snyk_v2/lib/snyk_v2_client.rb index 76b8ee95..c4b21c06 100644 --- a/tasks/connectors/snyk_v2/lib/snyk_v2_client.rb +++ b/tasks/connectors/snyk_v2/lib/snyk_v2_client.rb @@ -6,44 +6,58 @@ module SnykV2 class SnykV2Client class ApiError < StandardError; end - HOST = "https://snyk.io" - - def initialize(token) + def initialize(token, snyk_api_base) @token = token + @api_base_url = "https://#{snyk_api_base}/rest" @headers = { - "content-type" => "application/json", - "accept" => "application/json", - "Authorization" => "token #{token}" + "Content-Type" => "application/json", + "Accept" => "application/json", + "Authorization" => "Token #{@token}" } end def snyk_get_orgs print "Getting list of orgs" - response = http_get("#{HOST}/api/v1/orgs", @headers) - raise ApiError, "Unable to retrieve submissions, please check credentials." unless response + response = http_get("#{@api_base_url}/orgs?version=2024-04-29", @headers) + raise ApiError, "Unable to retrieve organizations, please check credentials." unless response - JSON.parse(response)["orgs"] + JSON.parse(response)["data"] end def snyk_get_projects(org) print "Getting list of projects" - response = http_get("#{HOST}/api/v1/org/#{org}/projects", @headers) - raise ApiError, "Unable to retrieve submissions, please check credentials." unless response + response = http_get("#{@api_base_url}/orgs/#{org}/projects?version=2024-04-29&limit=100", @headers) + raise ApiError, "Unable to retrieve projects, please check credentials." unless response - JSON.parse(response)["projects"] + JSON.parse(response)["data"] end - def snyk_get_issues(per_page, search_json, page_num, from_date, to_date) - print "Getting issues" - snyk_query_api = "https://snyk.io/api/v1/reporting/issues?perPage=#{per_page}&page=#{page_num}&from=#{from_date}&to=#{to_date}" - print_debug("Get issues query: #{snyk_query_api}") + def snyk_get_issues(per_page, page_num, from_date, to_date, org) + print "Getting list of issues" + pages = page_num + + all_issues = [] + next_url = "#{@api_base_url}/orgs/#{org}/issues?version=2024-04-29&limit=#{per_page}&created_after=#{from_date}&created_before=#{to_date}" + + pages.times do + print_debug("Fetching data from URL: #{next_url}") + + response = http_get(next_url, @headers) + raise ApiError, "Unable to retrieve issues, please check credentials." unless response + + data = JSON.parse(response) + page_issues = data["data"] + all_issues << page_issues + + next_url = data.dig("links", "next") + break unless next_url - response = http_post(snyk_query_api, @headers, search_json) - raise ApiError, "Unable to retrieve submissions, please check credentials." unless response + next_url = URI.join(@api_base_url, next_url).to_s + end - JSON.parse(response)["results"] + all_issues end end end diff --git a/tasks/connectors/snyk_v2/readme.md b/tasks/connectors/snyk_v2/readme.md index 02319ada..4d4e398c 100644 --- a/tasks/connectors/snyk_v2/readme.md +++ b/tasks/connectors/snyk_v2/readme.md @@ -1,39 +1,37 @@ ## Running the Snyk V2 task -This toolkit brings in data from Snyk V2 +This toolkit brings in data from Snyk V2. -To run this task you need the following information from Snyk V2: +To run this task, you need the following information from Snyk V2: 1. Snyk API Token +2. Snyk environment API base URL without prefix e.g. api.eu.snyk.io, api.snyk.io or api.au.snyk.io ## Command Line -See the main Toolkit for instructions on running tasks. For this task, if you leave off the Kenna API Key and Kenna Connector ID, the task will create a json file in the default or specified output directory. You can review the file before attempting to upload to the Kenna directly. +See the main Toolkit for instructions on running tasks. For this task, if you leave off the Kenna API Key and Kenna Connector ID, the task will create a JSON file in the default or specified output directory. You can review the file before attempting to upload to Kenna directly. Recommended Steps: -1. Run with Snyk V2 Keys only to ensure you are able to get data properly from the scanner -1. Review output for expected data -1. Create Kenna Data Importer connector in Kenna (example name: Snyk V2 KDI) -1. Manually run the connector with the json from step 1 -1. Click on the name of the connector to get the connector id -1. Run the task with Snyk V2 Keys and Kenna Key/connector id +1. Run with Snyk V2 Keys only to ensure you are able to get data properly from the scanner. +2. Review output for expected data. +3. Create Kenna Data Importer connector in Kenna (example name: Snyk V2 KDI). +4. Manually run the connector with the JSON from step 1. +5. Click on the name of the connector to get the connector ID. +6. Run the task with Snyk V2 Keys and Kenna Key/connector ID. Complete list of Options: -| Option | Required | Description | default | +| Option | Required | Description | Default | | --- | --- | --- | --- | | snyk_api_token | true | Snyk API Token | n/a | -| import_type | false | what to import "vulns" or "findings". By default "vulns" | vulns | -| retrieve_from | false | default will be 90 days before today | 90 | -| include_license | false | retrieve license issues. | n/a | -| projectName_strip_colon | false | strip colon and following data from Project Name - used as application identifier | n/a | -| packageManager_strip_colon | false | strip colon and following data from packageManager - used in asset file locator | n/a | -| package_strip_colon | false | strip colon and following data from package - used in asset file locator | n/a | -| application_locator_mapping | false | indicates which field should be used in application locator. Valid options are application and organization. Default is application. | application | -| page_size | false | The number of objects per page (currently limited from 1 to 1000). | 1000 | -| batch_size | false | The maximum number of issues to submit to Kenna in each batch. | 500 | +| retrieve_from | false | default will be 30 days before today format: YYYY-MM-DD | 30 | +| include_license | false | retrieve license issues | false | +| page_size | false | The number of objects per page (Min 10┃Max 100┃multiple of 10) | 10 | +| batch_size | false | The maximum number of issues to submit to Kenna in each batch | 10 | +| page_num | false | Max pagination number | 1 | | kenna_connector_id | false | If set, we'll try to upload to this connector | n/a | | kenna_api_key | false | Kenna API Key | n/a | | kenna_api_host | false | Kenna API Hostname | api.kennasecurity.com | +| snyk_api_base | true | Snyk environment API base URL without prefix e.g. api.eu.snyk.io, api.snyk.io or api.au.snyk.io | api.eu.snyk.io | | output_directory | false | If set, will write a file upon completion. Path is relative to toolkit root directory | output/snyk | diff --git a/tasks/connectors/snyk_v2/snyk_v2_task.rb b/tasks/connectors/snyk_v2/snyk_v2_task.rb index 3be76723..470ab544 100644 --- a/tasks/connectors/snyk_v2/snyk_v2_task.rb +++ b/tasks/connectors/snyk_v2/snyk_v2_task.rb @@ -6,7 +6,7 @@ module Kenna module Toolkit class SnykV2Task < Kenna::Toolkit::BaseTask SCANNER_TYPE = "Snyk" - ISSUE_SEVERITY_MAPPING = { "high" => 6, "medium" => 4, "low" => 1 }.freeze + ISSUE_SEVERITY_MAPPING = { "critical" => 10, "high" => 6, "medium" => 4, "low" => 1, "info" => 0 }.freeze def self.metadata { @@ -19,51 +19,31 @@ def self.metadata required: true, default: nil, description: "Snyk API Token" }, - { name: "import_type", - type: "string", - required: false, - default: "vulns", - description: "what to import \"vulns\" or \"findings\". By default \"vulns\"" }, { name: "retrieve_from", type: "date", required: false, - default: 90, - description: "default will be 90 days before today" }, + default: 30, + description: "default will be 30 days before today format: YYYY-MM-DD" }, { name: "include_license", type: "boolean", required: false, default: false, description: "retrieve license issues." }, - { name: "projectName_strip_colon", - type: "boolean", - required: false, - default: false, - description: "strip colon and following data from Project Name - used as application identifier" }, - { name: "packageManager_strip_colon", - type: "boolean", - required: false, - default: false, - description: "strip colon and following data from packageManager - used in asset file locator" }, - { name: "package_strip_colon", - type: "boolean", - required: false, - default: false, - description: "strip colon and following data from package - used in asset file locator" }, - { name: "application_locator_mapping", - type: "string", - required: false, - default: "application", - description: "indicates which field should be used in application locator. Valid options are application and organization. Default is application." }, { name: "page_size", type: "integer", required: false, - default: 1000, - description: "The number of objects per page (currently limited from 1 to 1000)." }, + default: 10, + description: "The number of objects per page (Min 10 |Max 100| multiple of 10)." }, { name: "batch_size", type: "integer", required: false, - default: 500, + default: 10, description: "The maximum number of issues to submit to Kenna in each batch." }, + { name: "page_num", + type: "integer", + required: false, + default: 1, + description: "Max pagination number" }, { name: "kenna_connector_id", type: "integer", required: false, @@ -83,8 +63,12 @@ def self.metadata type: "filename", required: false, default: "output/snyk", - description: "If set, will write a file upon completion. Path is relative to #{$basedir}" } - + description: "If set, will write a file upon completion. Path is relative to #{$basedir}" }, + { name: "snyk_api_base", + type: "string", + required: false, + default: "api.eu.snyk.io", + description: "Snyk environment API base URL without prefix e.g. api.eu.snyk.io, api.snyk.io or api.au.snyk.io" } ] } end @@ -95,131 +79,97 @@ def run(opts) initialize_options initialize_client - cves = nil - cwes = nil - page_num = 0 - more_pages = true - suffix = @import_findings ? "findings" : "vulns" + suffix = "findings_vulns" kdi_batch_upload(@batch_size, "#{$basedir}/#{@options[:output_directory]}", "snyk_kdi_#{suffix}.json", @kenna_connector_id, @kenna_api_host, @kenna_api_key, @skip_autoclose, @retries, @kdi_version) do |batch| - org_json = client.snyk_get_orgs - org_ids = fetch_orgs_ids(org_json) - projects = fetch_projects(org_json) + org_json = client.snyk_get_orgs + org_ids = fetch_orgs_ids(org_json) + projects = fetch_projects(org_json) types = ["vuln"] types << "license" if @include_license - while more_pages - issue_json = [] - - projects.keys.each_slice(500) do |sliced_ids| - issue_filter_json = "{ - \"filters\": { - \"orgs\": #{org_ids}, - \"projects\": #{sliced_ids}, - \"isFixed\": false, - \"types\": #{types} - } - }" - print_debug "issue filter json = #{issue_filter_json}" - - page_num += 1 - issues_page_data = client.snyk_get_issues(@page_size, issue_filter_json, page_num, @from_date, @to_date) - issue_json << issues_page_data unless issues_page_data.empty? - - print_debug "issue json = #{issue_json}" - issue_json.flatten! + issue_json = [] + projects.keys.each_slice(500) do + org_ids.each do |org_id| + issues_page_data = client.snyk_get_issues(@page_size, @page_num, @from_date, @to_date, org_id) + issue_json.concat(issues_page_data) unless issues_page_data.empty? end - if issue_json.nil? || issue_json.empty? || issue_json.length.zero? - more_pages = false - break - end - - issue_json.each do |issue_obj| - issue = issue_obj["issue"] - project = issue_obj["project"] - identifiers = issue["identifiers"] - application = project.fetch("name") - application = application.slice(0..(application.rindex(":") - 1)) if @project_name_strip_colon && !application.rindex(":").nil? - package_manager = issue["packageManager"] - package = issue.fetch("package") + print_debug "issue json = #{issue_json}" + end - target_file = target_file(project, package) + issue_json.each do |issue_arr| + issue_arr.each do |issue_obj| + issue = issue_obj["attributes"] + org_id = issue_obj["relationships"]["organization"]["data"]["id"] + issue_identifier = issue["key"] - org_name = projects[project.fetch("id")]["org"]["name"] - tags = [] - tags << project.fetch("source") if project.key?("source") - tags << package_manager if !package_manager.nil? && !package_manager.empty? - tags << "Org:#{org_name}" + tags = ["Org:#{org_id}"] asset = { - "file" => target_file, - "application" => @options[:application_locator_mapping] == "organization" ? org_name : application, - "tags" => tags + "file" => "Snyk_#{issue_identifier.split('-')[2]}_#{issue_obj['id']}", + "tags" => tags, + "os" => (match = issue_identifier.match(/SNYK-([A-Z0-9]+)-/)) ? match[1] : nil, + "priority" => 10 } - scanner_score = if issue.key?("cvssScore") - issue.fetch("cvssScore").to_i - else - ISSUE_SEVERITY_MAPPING.fetch(issue.fetch("severity")) - end - - additional_fields = extract_additional_fields(issue, issue_obj, project, target_file) - - unless identifiers.nil? - cve_array = identifiers["CVE"] unless identifiers["CVE"].nil? || identifiers["CVE"].length.zero? - cwe_array = identifiers["CWE"] unless identifiers["CWE"].nil? || identifiers["CWE"].length.zero? - cve_array.delete_if { |x| x.start_with?("RHBA", "RHSA") } unless cve_array.nil? || cve_array.length.zero? - cves = cve_array.join(",") if cve_array.present? - cwes = cwe_array.join(",") if cwe_array.present? - end - - vuln_names = vuln_def_names(cve_array, cwe_array, issue) - vuln_names = @import_findings ? vuln_names : [vuln_names.first] + issue_severity = issue["effective_severity_level"] + scanner_score = ISSUE_SEVERITY_MAPPING[issue_severity] + + issue["problems"].each do |problem| + next unless problem["source"] == "NVD" + + scanner_identifier = issue_obj['id'].to_s + vuln_def_name = issue_identifier + scanner_type = "Snyk" + created_at = format_date(issue["created_at"]) + + additional_fields = { + "is_fixable_manually" => issue["coordinates"][0]["is_fixable_manually"], + "is_fixable_snyk" => issue["coordinates"][0]["is_fixable_snyk"], + "is_fixable_upstream" => issue["coordinates"][0]["is_fixable_upstream"], + "is_patchable" => issue["coordinates"][0]["is_patchable"], + "is_upgradeable" => issue["coordinates"][0]["is_upgradeable"], + "reachability" => issue["coordinates"][0]["reachability"], + "dependency" => issue["coordinates"][0]["representations"][0]["dependency"] + }.compact + + finding = { + "scanner_identifier" => scanner_identifier, + "vuln_def_name" => vuln_def_name, + "scanner_type" => scanner_type, + "created_at" => created_at, + "last_seen_at" => format_date(issue["updated_at"]), + "severity" => scanner_score, + "additional_fields" => additional_fields + } - vuln_names.each do |vuln_name| - unique_vuln_identifier = scanner_identifier(issue, vuln_name) kdi_issue = { - "scanner_identifier" => unique_vuln_identifier, - "scanner_type" => SCANNER_TYPE, - "vuln_def_name" => @import_findings ? unique_vuln_identifier : vuln_name + "scanner_identifier" => scanner_identifier, + "vuln_def_name" => vuln_def_name, + "scanner_type" => scanner_type, + "created_at" => created_at, + "last_seen_at" => format_date(issue["updated_at"]), + "status" => issue["status"] == "resolved" ? "closed" : issue["status"], + "details" => issue["title"] == "details" ? nil : "#{problem['id']} : #{issue['title']}_#{issue['type']}", + "scanner_score" => scanner_score } - kdi_issue_data = if @import_findings - { "severity" => scanner_score, - "last_seen_at" => issue_obj.fetch("introducedDate"), - "additional_fields" => additional_fields } - else - { "scanner_score" => scanner_score, - "created_at" => issue_obj.fetch("introducedDate"), - "details" => JSON.pretty_generate(additional_fields) } - end - kdi_issue.merge!(kdi_issue_data) - kdi_issue.compact! - - vuln_def = extract_vuln_def(vuln_name, issue) - if @import_findings - if vuln_name.starts_with?('CVE') - vuln_def["cve_identifiers"] = vuln_name - elsif vuln_name.starts_with?('CWE') - vuln_def["cwe_identifiers"] = vuln_name - end - elsif cves.present? - vuln_def["cve_identifiers"] = cves - elsif cwes.present? - vuln_def["cwe_identifiers"] = cwes - end - batch.append do - # Create the KDI entries - if @import_findings - create_kdi_asset_finding(asset, kdi_issue) - else - create_kdi_asset_vuln(asset, kdi_issue) - end + vuln_def = { + "name" => vuln_def_name, + "scanner_type" => scanner_type, + "cve_identifiers" => problem["id"], + "cwe_identifiers" => issue["classes"] && issue["classes"][0] ? issue["classes"][0]["id"] : nil, + "description" => issue["title"] == "details" ? nil : "#{problem['id']}: #{issue['title']}_#{issue['type']}", + "solution" => problem["url"] ? "For more information, go to this link: #{problem['url']}" : nil + }.compact + batch.append do + create_kdi_asset_finding(asset, finding) + create_kdi_asset_vuln(asset, kdi_issue) create_kdi_vuln_def(vuln_def) end end @@ -234,25 +184,22 @@ def run(opts) attr_reader :client def initialize_client - @client = Kenna::Toolkit::SnykV2::SnykV2Client.new(@snyk_api_token) + @client = Kenna::Toolkit::SnykV2::SnykV2Client.new(@snyk_api_token, @snyk_api_base) end def initialize_options @snyk_api_token = @options[:snyk_api_token] - @import_findings = @options[:import_type] == "findings" + @snyk_api_base = @options[:snyk_api_base] @output_directory = @options[:output_directory] @include_license = @options[:include_license] - @project_name_strip_colon = @options[:projectName_strip_colon] - @package_manager_strip_colon = @options[:packageManager_strip_colon] - @package_strip_colon = @options[:package_strip_colon] - @retrieve_from = @options[:retrieve_from] - @from_date = (Date.today - @retrieve_from.to_i).strftime("%Y-%m-%d") - @to_date = Date.today.strftime("%Y-%m-%d") + @from_date = "#{(Date.today - @retrieve_from.to_i).strftime('%Y-%m-%d')}T00:00:00Z" + @to_date = "#{Date.today.strftime('%Y-%m-%d')}T00:00:00Z" @page_size = @options[:page_size].to_i @batch_size = @options[:batch_size].to_i + @page_num = @options[:page_num].to_i @kenna_api_host = @options[:kenna_api_host] @kenna_api_key = @options[:kenna_api_key] @@ -274,7 +221,7 @@ def fetch_projects(org_json) end def fetch_orgs_ids(org_json) - org_ids = org_json.map { |org| org.fetch("id") } + org_ids = Array.wrap(org_json).map { |org| org.fetch("id") } print_debug org_json print_debug "orgs = #{org_ids}" @@ -282,66 +229,8 @@ def fetch_orgs_ids(org_json) org_ids end - def extract_additional_fields(issue, issue_obj, project, target_file) - fields = {} - fields["url"] = issue.fetch("url") if issue.key?("url") - fields["id"] = issue.fetch('id') - fields["title"] = issue.fetch("title") if issue.key?("title") - fields["file"] = target_file - fields["application"] = project.fetch("name") - fields["introducedDate"] = issue_obj.fetch("introducedDate") - fields["source"] = project.fetch("source") if issue.key?("source") - fields["fixedIn"] = issue.fetch("fixedIn") if issue.key?("fixedIn") - fields["from"] = issue.fetch("from") if issue.key?("from") - fields["functions"] = issue.fetch("functions") if issue.key?("functions") - fields["isPatchable"] = issue.fetch("isPatchable").to_s if issue.key?("isPatchable") - fields["isUpgradable"] = issue.fetch("isUpgradable").to_s if issue.key?("isUpgradable") - fields["language"] = issue.fetch("language") if issue.key?("language") - fields["references"] = issue.fetch("references") if issue.key?("references") - fields["semver"] = JSON.pretty_generate(issue.fetch("semver")) if issue.key?("semver") - fields["cvssScore"] = issue.fetch("cvssScore") if issue.key?("cvssScore") - fields["severity"] = issue.fetch("severity") if issue.key?("severity") - fields["package"] = issue.fetch("package") - fields["version"] = issue.fetch("version") if issue.key?("version") - fields["identifiers"] = issue.fetch("identifiers") - fields["publicationTime"] = issue.fetch("publicationTime") if issue.key?("publicationTime") - fields.compact - end - - def extract_vuln_def(vuln_name, issue) - vuln_identifier = scanner_identifier(issue, vuln_name) - vuln_def = { "name" => @import_findings ? vuln_identifier : vuln_name, - "scanner_type" => SCANNER_TYPE, - "scanner_identifier" => vuln_identifier } - vuln_def["description"] = issue["description"] || issue.fetch("title") if issue.key?("title") - vuln_def["solution"] = issue["patches"].first.to_s unless issue["patches"].nil? || issue["patches"].empty? - vuln_def.compact - end - - def target_file(project, package) - if project.key?("targetFile") - project.fetch("targetFile") - else - print_debug "using strip colon params if set" - package_manager = package_manager.slice(0..(package_manager.rindex(":") - 1)) if !package_manager.nil? && !package_manager.empty? && @package_manager_strip_colon && !package_manager.rindex(":").nil? - package = package.slice(0..(package.rindex(":") - 1)) if !package.nil? && !package.empty? && @package_strip_colon && !package.rindex(":").nil? - target_file = package_manager.to_s - target_file = "#{target_file}/" if !package_manager.nil? && !package.nil? - "#{target_file}#{package}" - end - end - - def vuln_def_names(cves, cwes, issue) - title = issue.fetch("title") if issue.key?("title") - cves || cwes || [title] - end - - def scanner_identifier(issue, vuln_name) - if @import_findings - "#{issue.fetch('id')}-#{vuln_name}" - else - issue.fetch('id') - end + def format_date(date_string) + date_string.include?('T') ? date_string : "#{date_string}T00:00:00Z" end end end