generate_security_report
Generate a security findings report by aggregating taint analysis results and mapping them to a compliance framework such as OWASP, CWE, PCI DSS, or STIG.
Instructions
Generate a security findings report mapped to a compliance framework.
This is the Orihime equivalent of SonarQube Enterprise's OWASP / CWE /
PCI DSS / STIG security reports. It aggregates findings from the taint
analysis and maps each to the requested framework's taxonomy.
Args:
repo_name: Repository to analyse.
framework: One of ``owasp``, ``cwe``, ``pci``, ``stig`` (default: ``owasp``).
Returns:
List of dicts, each a finding with framework-specific keys.
OWASP: ``category``, ``caller_fqn``, ``sink_method``, ``file_path``, ``line_start``.
CWE: ``cwe_id``, ``caller_fqn``, ``sink_method``, ``file_path``, ``line_start``.
PCI: ``requirement``, ``caller_fqn``, ``sink_method``, ``file_path``.
STIG: ``vuln_id``, ``caller_fqn``, ``sink_method``, ``file_path``.Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| repo_name | Yes | ||
| framework | No | owasp |
Output Schema
| Name | Required | Description | Default |
|---|---|---|---|
| result | Yes |