diff --git a/dojo/tools/codechecker/parser.py b/dojo/tools/codechecker/parser.py index 0d9aa02436e..16eff099c76 100644 --- a/dojo/tools/codechecker/parser.py +++ b/dojo/tools/codechecker/parser.py @@ -128,4 +128,4 @@ def get_mapped_severity(severity): "STYLE": "Info", "UNSPECIFIED": "Info", } - return switcher.get(severity.upper(), None) + return switcher.get(severity.upper()) diff --git a/dojo/tools/ms_defender/parser.py b/dojo/tools/ms_defender/parser.py index 17ca740973d..4dac598b770 100644 --- a/dojo/tools/ms_defender/parser.py +++ b/dojo/tools/ms_defender/parser.py @@ -95,7 +95,7 @@ def get_findings(self, file, test): continue for vulnerability in vulnerabilities: try: - machine = machines.get(vulnerability["machineId"], None) + machine = machines.get(vulnerability["machineId"]) if machine is not None: findings.append(self.process_json_with_machine_info(vulnerability, machine)) else: diff --git a/dojo/tools/threagile/parser.py b/dojo/tools/threagile/parser.py index 0a8908ec5a6..de890185514 100644 --- a/dojo/tools/threagile/parser.py +++ b/dojo/tools/threagile/parser.py @@ -86,7 +86,7 @@ def get_items(self, tree, test): severity = severity if severity != "Elevated" else "High" finding = Finding( title=item.get("category"), - cwe=RISK_TO_CWE_MAP.get(item.get("category"), None), + cwe=RISK_TO_CWE_MAP.get(item.get("category")), description=item.get("title"), impact=item.get("exploitation_impact"), severity=severity, diff --git a/requirements-lint.txt b/requirements-lint.txt index 3766da038dc..454ebe7e8e0 100644 --- a/requirements-lint.txt +++ b/requirements-lint.txt @@ -1 +1 @@ -ruff==0.13.0 \ No newline at end of file +ruff==0.13.1 \ No newline at end of file