Files
git.stella-ops.org/bench/golden-corpus/corpus-manifest.json
StellaOps Bot efe9bd8cfe Add integration tests for Proof Chain and Reachability workflows
- Implement ProofChainTestFixture for PostgreSQL-backed integration tests.
- Create StellaOps.Integration.ProofChain project with necessary dependencies.
- Add ReachabilityIntegrationTests to validate call graph extraction and reachability analysis.
- Introduce ReachabilityTestFixture for managing corpus and fixture paths.
- Establish StellaOps.Integration.Reachability project with required references.
- Develop UnknownsWorkflowTests to cover the unknowns lifecycle: detection, ranking, escalation, and resolution.
- Create StellaOps.Integration.Unknowns project with dependencies for unknowns workflow.
2025-12-20 22:19:26 +02:00

158 lines
4.9 KiB
JSON

{
"schema_version": "stellaops.corpus.manifest/v1",
"corpus_version": "1.0.0",
"generated_at": "2025-01-15T00:00:00Z",
"total_cases": 12,
"categories": {
"severity-levels": 4,
"vex-scenarios": 4,
"reachability": 3,
"composite": 1
},
"cases": [
{
"case_id": "critical-log4shell-CVE-2021-44228",
"path": "severity-levels/critical/log4shell-CVE-2021-44228",
"category": "severity-levels/critical",
"cve_id": "CVE-2021-44228",
"expected_score": 10.0,
"files_hash": {
"case.json": "sha256:case001",
"sbom.spdx.json": "sha256:sbom001",
"manifest.json": "sha256:manifest001",
"callgraph.json": "sha256:callgraph001",
"expected-score.json": "sha256:expected001"
}
},
{
"case_id": "high-http2-rapid-reset-CVE-2023-44487",
"path": "severity-levels/high/http2-rapid-reset-CVE-2023-44487",
"category": "severity-levels/high",
"cve_id": "CVE-2023-44487",
"expected_score": 7.8,
"files_hash": {
"case.json": "sha256:case002",
"expected-score.json": "sha256:expected002"
}
},
{
"case_id": "medium-json-dos-CVE-2024-12345",
"path": "severity-levels/medium/json-dos-CVE-2024-12345",
"category": "severity-levels/medium",
"cve_id": "CVE-2024-12345",
"expected_score": 3.2,
"files_hash": {
"case.json": "sha256:case003",
"expected-score.json": "sha256:expected003"
}
},
{
"case_id": "low-info-disclosure-CVE-2024-99999",
"path": "severity-levels/low/info-disclosure-CVE-2024-99999",
"category": "severity-levels/low",
"cve_id": "CVE-2024-99999",
"expected_score": 3.1,
"files_hash": {
"case.json": "sha256:case004",
"expected-score.json": "sha256:expected004"
}
},
{
"case_id": "vex-not-affected-component-not-present",
"path": "vex-scenarios/not-affected/component-not-present",
"category": "vex-scenarios/not-affected",
"cve_id": "CVE-2023-99998",
"expected_score": 0.0,
"files_hash": {
"case.json": "sha256:case005",
"vex.openvex.json": "sha256:vex005",
"expected-score.json": "sha256:expected005"
}
},
{
"case_id": "vex-affected-action-required",
"path": "vex-scenarios/affected/action-required",
"category": "vex-scenarios/affected",
"cve_id": "CVE-2023-99997",
"expected_score": 8.2,
"files_hash": {
"case.json": "sha256:case006",
"vex.openvex.json": "sha256:vex006",
"expected-score.json": "sha256:expected006"
}
},
{
"case_id": "vex-fixed-remediated",
"path": "vex-scenarios/fixed/remediated",
"category": "vex-scenarios/fixed",
"cve_id": "CVE-2021-44228",
"expected_score": 0.0,
"files_hash": {
"case.json": "sha256:case007",
"vex.openvex.json": "sha256:vex007",
"expected-score.json": "sha256:expected007"
}
},
{
"case_id": "vex-under-investigation",
"path": "vex-scenarios/under-investigation/pending-analysis",
"category": "vex-scenarios/under-investigation",
"cve_id": "CVE-2025-00001",
"expected_score": 6.5,
"files_hash": {
"case.json": "sha256:case008",
"vex.openvex.json": "sha256:vex008",
"expected-score.json": "sha256:expected008"
}
},
{
"case_id": "reachability-confirmed-reachable",
"path": "reachability/reachable/confirmed-path",
"category": "reachability/reachable",
"cve_id": "CVE-2024-11111",
"expected_score": 7.9,
"files_hash": {
"case.json": "sha256:case009",
"callgraph.json": "sha256:callgraph009",
"expected-score.json": "sha256:expected009"
}
},
{
"case_id": "reachability-unreachable-dead-code",
"path": "reachability/unreachable/dead-code",
"category": "reachability/unreachable",
"cve_id": "CVE-2024-22222",
"expected_score": 4.2,
"files_hash": {
"case.json": "sha256:case010",
"callgraph.json": "sha256:callgraph010",
"expected-score.json": "sha256:expected010"
}
},
{
"case_id": "reachability-unknown-analysis-incomplete",
"path": "reachability/unknown/analysis-incomplete",
"category": "reachability/unknown",
"cve_id": "CVE-2024-33333",
"expected_score": 6.5,
"files_hash": {
"case.json": "sha256:case011",
"expected-score.json": "sha256:expected011"
}
},
{
"case_id": "composite-reachable-with-vex-mitigated",
"path": "composite/reachable-with-vex/mitigated",
"category": "composite/reachable-with-vex",
"cve_id": "CVE-2024-44444",
"expected_score": 2.5,
"files_hash": {
"case.json": "sha256:case012",
"vex.openvex.json": "sha256:vex012",
"callgraph.json": "sha256:callgraph012",
"expected-score.json": "sha256:expected012"
}
}
]
}