@@ -73,7 +73,7 @@ cmd_tools() {
7373 echo " --- list_pvr_advisories (state=draft) ---"
7474 ADVISORIES=$( python -c "
7575import seclab_taskflows.mcp_servers.pvr_ghsa as pvr
76- print(pvr.list_pvr_advisories.fn (owner='anticomputer', repo='vulnerable-test-app', state='draft'))
76+ print(pvr.list_pvr_advisories(owner='anticomputer', repo='vulnerable-test-app', state='draft'))
7777" )
7878 COUNT=$( echo " $ADVISORIES " | python -c " import sys,json; print(len(json.load(sys.stdin)))" )
7979 if [ " $COUNT " -ge 1 ]; then
@@ -93,7 +93,7 @@ for a in json.load(sys.stdin):
9393 GHSA=$( echo " $ADVISORIES " | python -c " import sys,json; print(json.load(sys.stdin)[0]['ghsa_id'])" )
9494 DETAIL=$( python -c "
9595import seclab_taskflows.mcp_servers.pvr_ghsa as pvr
96- print(pvr.fetch_pvr_advisory.fn (owner='anticomputer', repo='vulnerable-test-app', ghsa_id='${GHSA} '))
96+ print(pvr.fetch_pvr_advisory(owner='anticomputer', repo='vulnerable-test-app', ghsa_id='${GHSA} '))
9797" )
9898 if echo " $DETAIL " | python -c " import sys,json; d=json.load(sys.stdin); assert d['ghsa_id']" 2> /dev/null; then
9999 ok " Fetched ${GHSA} : $( echo " $DETAIL " | python -c " import sys,json; d=json.load(sys.stdin); print(f\" {d['severity']} - CWEs: {d['cwes']}\" )" ) "
@@ -105,7 +105,7 @@ print(pvr.fetch_pvr_advisory.fn(owner='anticomputer', repo='vulnerable-test-app'
105105 echo " --- fetch_security_policy ---"
106106 POLICY=$( python -c "
107107import seclab_taskflows.mcp_servers.pvr_ghsa as pvr
108- print(pvr.fetch_security_policy.fn (owner='anticomputer', repo='vulnerable-test-app'))
108+ print(pvr.fetch_security_policy(owner='anticomputer', repo='vulnerable-test-app'))
109109" )
110110 if [ -n " $POLICY " ]; then
111111 ok " Security policy found ($( echo " $POLICY " | wc -l | tr -d ' ' ) lines)"
@@ -119,7 +119,7 @@ print(pvr.fetch_security_policy.fn(owner='anticomputer', repo='vulnerable-test-a
119119 echo " --- compare_advisories (dedup detection) ---"
120120 DEDUP=$( python -c "
121121import seclab_taskflows.mcp_servers.pvr_ghsa as pvr
122- print(pvr.compare_advisories.fn (owner='anticomputer', repo='vulnerable-test-app', state='draft', target_ghsa=''))
122+ print(pvr.compare_advisories(owner='anticomputer', repo='vulnerable-test-app', state='draft', target_ghsa=''))
123123" )
124124 CLUSTERS=$( echo " $DEDUP " | python -c " import sys,json; print(len(json.load(sys.stdin)['clusters']))" )
125125 TOTAL=$( echo " $DEDUP " | python -c " import sys,json; print(json.load(sys.stdin)['total'])" )
@@ -139,7 +139,7 @@ for s in d['singles']:
139139 echo " --- fetch_file_at_ref (main.go lines 25-30) ---"
140140 CODE=$( python -c "
141141import seclab_taskflows.mcp_servers.pvr_ghsa as pvr
142- print(pvr.fetch_file_at_ref.fn (owner='anticomputer', repo='vulnerable-test-app', path='main.go', ref='main', start_line=25, length=6))
142+ print(pvr.fetch_file_at_ref(owner='anticomputer', repo='vulnerable-test-app', path='main.go', ref='main', start_line=25, length=6))
143143" )
144144 if echo " $CODE " | grep -q " searchHandler" ; then
145145 ok " Fetched vulnerable code at main.go:25"
@@ -152,7 +152,7 @@ print(pvr.fetch_file_at_ref.fn(owner='anticomputer', repo='vulnerable-test-app',
152152 echo " --- resolve_version_ref (0.0.1 -- expected to fail, no tags) ---"
153153 VER=$( python -c "
154154import seclab_taskflows.mcp_servers.pvr_ghsa as pvr
155- print(pvr.resolve_version_ref.fn (owner='anticomputer', repo='vulnerable-test-app', version='0.0.1'))
155+ print(pvr.resolve_version_ref(owner='anticomputer', repo='vulnerable-test-app', version='0.0.1'))
156156" )
157157 if echo " $VER " | grep -q " Could not resolve" ; then
158158 ok " Graceful failure: no tags in repo (expected)"
@@ -200,7 +200,7 @@ cmd_triage() {
200200 # Pick the high-quality SQL injection report
201201 ghsa=$( python -c "
202202import json, seclab_taskflows.mcp_servers.pvr_ghsa as pvr
203- advs = json.loads(pvr.list_pvr_advisories.fn (owner='anticomputer', repo='vulnerable-test-app', state='draft'))
203+ advs = json.loads(pvr.list_pvr_advisories(owner='anticomputer', repo='vulnerable-test-app', state='draft'))
204204for a in advs:
205205 if 'SQL' in a['summary'] or 'sql' in a['summary'].lower():
206206 print(a['ghsa_id'])
0 commit comments