@@ -31,8 +31,7 @@ public VulnerabilitiesParser(final ScanData scanData, final VulnerabilityHandler
3131 }
3232
3333 /**
34- * Main method to commence parsing the SARIF document provided by the
35- * configured {@link ScanData}.
34+ * Main method to commence parsing the input provided by the configured {@link ScanData}.
3635 * @throws ScanParsingException
3736 * @throws IOException
3837 */
@@ -52,9 +51,7 @@ private final void handleDependency(Dependency dependency) {
5251 }
5352
5453 private final void buildVulnerability (Dependency dependency , Vulnerability vulnerability ) {
55- String fileName = dependency .getFilePathOrName ();
56- String uniqueId = DigestUtils .sha256Hex (dependency .getSha256 ()+vulnerability .getName ());
57- StaticVulnerabilityBuilder vb = vulnerabilityHandler .startStaticVulnerability (uniqueId );
54+ StaticVulnerabilityBuilder vb = vulnerabilityHandler .startStaticVulnerability (getInstanceId (dependency , vulnerability ));
5855 vb .setEngineType (ENGINE_TYPE );
5956 vb .setKingdom (FortifyKingdom .ENVIRONMENT .getKingdomName ());
6057 vb .setAnalyzer (FortifyAnalyser .CONFIGURATION .getAnalyserName ());
@@ -71,7 +68,7 @@ private final void buildVulnerability(Dependency dependency, Vulnerability vulne
7168 vb .setConfidence (2.5f );
7269 vb .setLikelihood (2.5f );
7370
74- vb .setFileName (fileName );
71+ vb .setFileName (dependency . getFilePathOrName () );
7572 vb .setVulnerabilityAbstract (vulnerability .getDescription ());
7673
7774 try {
@@ -117,4 +114,8 @@ private final void buildVulnerability(Dependency dependency, Vulnerability vulne
117114
118115 vb .completeVulnerability ();
119116 }
117+
118+ private final String getInstanceId (Dependency dependency , Vulnerability vulnerability ) {
119+ return DigestUtils .sha256Hex (dependency .getSha256 ()+vulnerability .getName ());
120+ }
120121}
0 commit comments