diff --git a/dojo/settings/settings.dist.py b/dojo/settings/settings.dist.py index 4bf0fbc651e..2c62e4a6403 100644 --- a/dojo/settings/settings.dist.py +++ b/dojo/settings/settings.dist.py @@ -1426,6 +1426,7 @@ def saml2_attrib_map_format(din): "SpotBugs Scan": ["cwe", "severity", "file_path", "line"], "JFrog Xray Unified Scan": ["vulnerability_ids", "file_path", "component_name", "component_version"], "JFrog Xray On Demand Binary Scan": ["title", "component_name", "component_version"], + "JFrog Xray API Summary Artifact Scan": ["title", "description", "component_name", "component_version"], "Scout Suite Scan": ["file_path", "vuln_id_from_tool"], # for now we use file_path as there is no attribute for "service" "Meterian Scan": ["cwe", "component_name", "component_version", "description", "severity"], "Github SAST Scan": ["vuln_id_from_tool", "severity", "file_path", "line"], @@ -1675,6 +1676,7 @@ def saml2_attrib_map_format(din): "SpotBugs Scan": DEDUPE_ALGO_HASH_CODE, "JFrog Xray Unified Scan": DEDUPE_ALGO_HASH_CODE, "JFrog Xray On Demand Binary Scan": DEDUPE_ALGO_HASH_CODE, + "JFrog Xray API Summary Artifact Scan": DEDUPE_ALGO_HASH_CODE, "Scout Suite Scan": DEDUPE_ALGO_HASH_CODE, "AWS Security Hub Scan": DEDUPE_ALGO_UNIQUE_ID_FROM_TOOL, "Meterian Scan": DEDUPE_ALGO_HASH_CODE,