Skip to content

Commit de6ebfe

Browse files
committed
Updating samples code to actual usage
1 parent 11750e6 commit de6ebfe

File tree

4 files changed

+7
-6
lines changed

4 files changed

+7
-6
lines changed

samples/asyncio_example.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
from concurrent.futures import ThreadPoolExecutor, ProcessPoolExecutor
88

99

10-
vulners_api = vulners.Vulners()
10+
vulners_api = vulners.Vulners(api_key="YOUR_API_KEY_HERE")
1111

1212
loop = asyncio.get_event_loop()
1313
# pool = ProcessPoolExecutor(max_workers=multiprocessing.cpu_count())

samples/multi_test.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
import concurrent.futures
99
import vulners
1010

11-
vulners_api = vulners.Vulners()
11+
vulners_api = vulners.Vulners(api_key="YOUR_API_KEY_HERE")
1212

1313
collection_names = vulners_api.collections()[:20]
1414

@@ -27,4 +27,4 @@
2727
search_results_pool = [executor.submit(vulners_api.search, query, 10) for query in query_pool]
2828
for future in concurrent.futures.as_completed(search_results_pool):
2929
print("Collected %s results with Multiprocess Pool" % len(future.result()))
30-
merged_results.append(future.result())
30+
merged_results.append(future.result())

samples/search.py

+2-1
Original file line numberDiff line numberDiff line change
@@ -8,5 +8,6 @@
88

99
vulners_api = vulners.Vulners(api_key="YOUR_API_KEY_HERE")
1010
possible_autocomplete = vulners_api.autocomplete("heartbleed")
11-
heartbleed_related, total_heartbleed = vulners_api.search("heartbleed", limit=10)
11+
heartbleed_related = vulners_api.search("heartbleed", limit=10)
12+
total_heartbleed = heartbleed_related.total # Notice you can do this because of Vulners' own AttributeList type
1213
CVE_2017_14174 = vulners_api.document("CVE-2017-14174")

samples/software_scanner.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66

77
import vulners
88

9-
vulners_api = vulners.Vulners()
9+
vulners_api = vulners.Vulners(api_key="YOUR_API_KEY_HERE")
1010

1111
# Download web application vulnerability detection regex collection
1212
rules = vulners_api.rules()
@@ -21,4 +21,4 @@
2121
cpe_results = vulners_api.cpeVulnerabilities("cpe:/a:cybozu:garoon:4.2.1")
2222
cpe_exploit_list = cpe_results.get('exploit')
2323
cpe_vulnerabilities_list = [cpe_results.get(key) for key in cpe_results if key not in ['info', 'blog', 'bugbounty']]
24-
print(cpe_results.keys())
24+
print(cpe_results.keys())

0 commit comments

Comments
 (0)