Skip to content

Commit a0a1a21

Browse files
committed
Revert "Fix demo script for FastMCP 3.x: remove .fn() indirection"
This reverts commit c38595a.
1 parent ad8f810 commit a0a1a21

1 file changed

Lines changed: 7 additions & 7 deletions

File tree

scripts/demo_pvr_triage.sh

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ cmd_tools() {
7373
echo "--- list_pvr_advisories (state=draft) ---"
7474
ADVISORIES=$(python -c "
7575
import seclab_taskflows.mcp_servers.pvr_ghsa as pvr
76-
print(pvr.list_pvr_advisories(owner='anticomputer', repo='vulnerable-test-app', state='draft'))
76+
print(pvr.list_pvr_advisories.fn(owner='anticomputer', repo='vulnerable-test-app', state='draft'))
7777
")
7878
COUNT=$(echo "$ADVISORIES" | python -c "import sys,json; print(len(json.load(sys.stdin)))")
7979
if [ "$COUNT" -ge 1 ]; then
@@ -93,7 +93,7 @@ for a in json.load(sys.stdin):
9393
GHSA=$(echo "$ADVISORIES" | python -c "import sys,json; print(json.load(sys.stdin)[0]['ghsa_id'])")
9494
DETAIL=$(python -c "
9595
import seclab_taskflows.mcp_servers.pvr_ghsa as pvr
96-
print(pvr.fetch_pvr_advisory(owner='anticomputer', repo='vulnerable-test-app', ghsa_id='${GHSA}'))
96+
print(pvr.fetch_pvr_advisory.fn(owner='anticomputer', repo='vulnerable-test-app', ghsa_id='${GHSA}'))
9797
")
9898
if echo "$DETAIL" | python -c "import sys,json; d=json.load(sys.stdin); assert d['ghsa_id']" 2>/dev/null; then
9999
ok "Fetched ${GHSA}: $(echo "$DETAIL" | python -c "import sys,json; d=json.load(sys.stdin); print(f\"{d['severity']} - CWEs: {d['cwes']}\")")"
@@ -105,7 +105,7 @@ print(pvr.fetch_pvr_advisory(owner='anticomputer', repo='vulnerable-test-app', g
105105
echo "--- fetch_security_policy ---"
106106
POLICY=$(python -c "
107107
import seclab_taskflows.mcp_servers.pvr_ghsa as pvr
108-
print(pvr.fetch_security_policy(owner='anticomputer', repo='vulnerable-test-app'))
108+
print(pvr.fetch_security_policy.fn(owner='anticomputer', repo='vulnerable-test-app'))
109109
")
110110
if [ -n "$POLICY" ]; then
111111
ok "Security policy found ($(echo "$POLICY" | wc -l | tr -d ' ') lines)"
@@ -119,7 +119,7 @@ print(pvr.fetch_security_policy(owner='anticomputer', repo='vulnerable-test-app'
119119
echo "--- compare_advisories (dedup detection) ---"
120120
DEDUP=$(python -c "
121121
import seclab_taskflows.mcp_servers.pvr_ghsa as pvr
122-
print(pvr.compare_advisories(owner='anticomputer', repo='vulnerable-test-app', state='draft', target_ghsa=''))
122+
print(pvr.compare_advisories.fn(owner='anticomputer', repo='vulnerable-test-app', state='draft', target_ghsa=''))
123123
")
124124
CLUSTERS=$(echo "$DEDUP" | python -c "import sys,json; print(len(json.load(sys.stdin)['clusters']))")
125125
TOTAL=$(echo "$DEDUP" | python -c "import sys,json; print(json.load(sys.stdin)['total'])")
@@ -139,7 +139,7 @@ for s in d['singles']:
139139
echo "--- fetch_file_at_ref (main.go lines 25-30) ---"
140140
CODE=$(python -c "
141141
import seclab_taskflows.mcp_servers.pvr_ghsa as pvr
142-
print(pvr.fetch_file_at_ref(owner='anticomputer', repo='vulnerable-test-app', path='main.go', ref='main', start_line=25, length=6))
142+
print(pvr.fetch_file_at_ref.fn(owner='anticomputer', repo='vulnerable-test-app', path='main.go', ref='main', start_line=25, length=6))
143143
")
144144
if echo "$CODE" | grep -q "searchHandler"; then
145145
ok "Fetched vulnerable code at main.go:25"
@@ -152,7 +152,7 @@ print(pvr.fetch_file_at_ref(owner='anticomputer', repo='vulnerable-test-app', pa
152152
echo "--- resolve_version_ref (0.0.1 -- expected to fail, no tags) ---"
153153
VER=$(python -c "
154154
import seclab_taskflows.mcp_servers.pvr_ghsa as pvr
155-
print(pvr.resolve_version_ref(owner='anticomputer', repo='vulnerable-test-app', version='0.0.1'))
155+
print(pvr.resolve_version_ref.fn(owner='anticomputer', repo='vulnerable-test-app', version='0.0.1'))
156156
")
157157
if echo "$VER" | grep -q "Could not resolve"; then
158158
ok "Graceful failure: no tags in repo (expected)"
@@ -200,7 +200,7 @@ cmd_triage() {
200200
# Pick the high-quality SQL injection report
201201
ghsa=$(python -c "
202202
import json, seclab_taskflows.mcp_servers.pvr_ghsa as pvr
203-
advs = json.loads(pvr.list_pvr_advisories(owner='anticomputer', repo='vulnerable-test-app', state='draft'))
203+
advs = json.loads(pvr.list_pvr_advisories.fn(owner='anticomputer', repo='vulnerable-test-app', state='draft'))
204204
for a in advs:
205205
if 'SQL' in a['summary'] or 'sql' in a['summary'].lower():
206206
print(a['ghsa_id'])

0 commit comments

Comments
 (0)