{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":179491243,"defaultBranch":"main","name":"zap-extensions","ownerLogin":"kingthorin","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2019-04-04T12:16:50.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/7570458?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1726760089.0","currentOid":""},"activityList":{"items":[{"before":"968d3ebe6ff089e5b38980a6021d9a02ef12eca0","after":"64c40d43d7899506b1821ba76394a493d98619c4","ref":"refs/heads/main","pushedAt":"2024-09-19T15:35:04.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"Merge pull request #5716 from kingthorin/csrf-get\n\nascanrulesBeta & pscanrules: CSRF rules ignore GET unless Low threshold","shortMessageHtmlLink":"Merge pull request zaproxy#5716 from kingthorin/csrf-get"}},{"before":"2fe816503ad8fe3dde70706b66e5c3fcd534270a","after":null,"ref":"refs/heads/csrf-get","pushedAt":"2024-09-19T15:34:49.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"}},{"before":"c749c130fe95fed5846a1a73229778c67266378a","after":"2fe816503ad8fe3dde70706b66e5c3fcd534270a","ref":"refs/heads/csrf-get","pushedAt":"2024-09-19T15:13:27.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"ascanrulesBeta & pscanrules: CSRF rules ignore GET unless Low threshold\n\n- CHANGELOGs > Added change note.\n- Scan Rules > Added condition to bail of now Low threshold and GET\nrequest.\n- Unit Tests > Updated to assert the new behavior and leverage\nparameterized tests.\n- Help files > Updated to note the new condition.\n\nSigned-off-by: kingthorin ","shortMessageHtmlLink":"ascanrulesBeta & pscanrules: CSRF rules ignore GET unless Low threshold"}},{"before":"fed220d3c35e4cf1c840c1743bcbc22989458104","after":"968d3ebe6ff089e5b38980a6021d9a02ef12eca0","ref":"refs/heads/main","pushedAt":"2024-09-19T15:10:29.000Z","pushType":"push","commitsCount":6,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"Merge pull request #5746 from zapbot/crowdin-update\n\nUpdate localized resources","shortMessageHtmlLink":"Merge pull request zaproxy#5746 from zapbot/crowdin-update"}},{"before":"1151ac23559707b7431fb2414d9c7e497aefedc3","after":null,"ref":"refs/heads/yet-moar-examples","pushedAt":"2024-09-18T14:12:53.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"}},{"before":"fbc656ffe3a39fe35918c29fe986f5cb623cd075","after":"1151ac23559707b7431fb2414d9c7e497aefedc3","ref":"refs/heads/yet-moar-examples","pushedAt":"2024-09-18T13:48:51.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"ascanrules: More example alerts\n\n- Scan Rules > Added example alert handling.\n- Unit Tests > Added tests for the example alerts and references.\n- CHANGELOG > Added change note.\n\nSigned-off-by: kingthorin ","shortMessageHtmlLink":"ascanrules: More example alerts"}},{"before":"ed90ba484c81212799d33e0ec6fa978be1f7a8dc","after":"e4cf659a25638638f7ed7900d47d43c29f035fc5","ref":"refs/heads/prxy-xfwd","pushedAt":"2024-09-18T13:47:18.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"ascanrulesBeta: Address possible FP in proxy detection rule\n\n- CHANGELOG > Added change note.\n- ProxyDisclosureScanRule > Added condition to skip messages if they\nhave evidence content to start with. Removed misleading Attack\ntext from the Alert.\n- ProxyDisclosureScanRuleUnitTest > Added a test to assert the new\nbehavior.\n\nSigned-off-by: kingthorin ","shortMessageHtmlLink":"ascanrulesBeta: Address possible FP in proxy detection rule"}},{"before":"7a4fb2c1e6a9257db8e1ff9a3d26a0563bd95ea5","after":"c749c130fe95fed5846a1a73229778c67266378a","ref":"refs/heads/csrf-get","pushedAt":"2024-09-18T11:01:08.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"ascanrulesBeta & pscanrules: CSRF rules ignore GET unless Low threshold\n\n- CHANGELOGs > Added change note.\n- Scan Rules > Added condition to bail of now Low threshold and GET\nrequest.\n- Unit Tests > Updated to assert the new behavior and leverage\nparameterized tests.\n- Help files > Updated to note the new condition.\n\nSigned-off-by: kingthorin ","shortMessageHtmlLink":"ascanrulesBeta & pscanrules: CSRF rules ignore GET unless Low threshold"}},{"before":"45bd70536a9204fc8f7dbec0faffeb4214350911","after":"7a4fb2c1e6a9257db8e1ff9a3d26a0563bd95ea5","ref":"refs/heads/csrf-get","pushedAt":"2024-09-18T10:52:19.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"ascanrulesBeta & pscanrules: CSRF rules ignore GET unless Low threshold\n\n- CHANGELOGs > Added change note.\n- Scan Rules > Added condition to bail of now Low threshold and GET\nrequest.\n- Unit Tests > Updated to assert the new behavior and leverage\nparameterized tests.\n- Help files > Updated to note the new condition.\n\nSigned-off-by: kingthorin ","shortMessageHtmlLink":"ascanrulesBeta & pscanrules: CSRF rules ignore GET unless Low threshold"}},{"before":"0fbdb8e5691781be46e5ec53f045f292edf26683","after":"fed220d3c35e4cf1c840c1743bcbc22989458104","ref":"refs/heads/main","pushedAt":"2024-09-18T10:48:36.000Z","pushType":"push","commitsCount":47,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"Merge pull request #5743 from zapbot/bump-version\n\nPrepare next dev iteration(s)","shortMessageHtmlLink":"Merge pull request zaproxy#5743 from zapbot/bump-version"}},{"before":"141375be3ddc5090538e81245dfab5348032a839","after":null,"ref":"refs/heads/rules-clean","pushedAt":"2024-09-17T13:10:02.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"}},{"before":"5c9c46efe208a6d48a42ef3e4e26fce3f67deb1e","after":"141375be3ddc5090538e81245dfab5348032a839","ref":"refs/heads/rules-clean","pushedAt":"2024-09-17T11:14:06.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"ascanrulesAlpha: Add example alerts to example rules\n\n- CHANGELOG > Added change note.\n- Scan Rules > Added example alert handling, updated to conform to the\ncommon active scan rule tests.\n- Scan Rule Unit Tests > Added to assert the example alert and\nreferences, as well as common tests.\n\nSigned-off-by: kingthorin ","shortMessageHtmlLink":"ascanrulesAlpha: Add example alerts to example rules"}},{"before":"d1cf763ebd4ae66127a73f3159dfbb0347b7b938","after":"5c9c46efe208a6d48a42ef3e4e26fce3f67deb1e","ref":"refs/heads/rules-clean","pushedAt":"2024-09-16T22:09:04.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"ascanrulesAlpha: Add example alerts to example rules\n\n- CHANGELOG > Added change note.\n- Scan Rules > Added example alert handling, updated to conform to the\ncommon active scan rule tests.\n- Scan Rule Unit Tests > Added to assert the example alert and\nreferences, as well as common tests.\n\nSigned-off-by: kingthorin ","shortMessageHtmlLink":"ascanrulesAlpha: Add example alerts to example rules"}},{"before":"4a7e68216a8dc5154b5b9657a846a001b3f04528","after":"d1cf763ebd4ae66127a73f3159dfbb0347b7b938","ref":"refs/heads/rules-clean","pushedAt":"2024-09-16T21:27:16.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"ascanrulesAlpha: Add example alerts to example rules\n\n- CHANGELOG > Added change note.\n- Scan Rules > Added example alert handling, updated to conform to the\ncommon active scan rule tests.\n- Scan Rule Unit Tests > Added to assert the example alert and\nreferences, as well as common tests.\n\nSigned-off-by: kingthorin ","shortMessageHtmlLink":"ascanrulesAlpha: Add example alerts to example rules"}},{"before":"5299b5b3beaea4c62cec83aec1ed2528657d42c7","after":"4a7e68216a8dc5154b5b9657a846a001b3f04528","ref":"refs/heads/rules-clean","pushedAt":"2024-09-16T21:14:28.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"scan rules: Clean code tweaks\n\n- Add static modifier where applicable.\n- CHANGELOG > Add maintenance note (if there wasn't already one\npresent).\n- pscanrules > Made resource message methods private again where example\nalerts have been implemented, or removed them where there was only a\nsingle usage (inlining the Constant resource message usage).","shortMessageHtmlLink":"scan rules: Clean code tweaks"}},{"before":"23c58e37e60f3a3648c226ad4c53eef18ed312b7","after":"5299b5b3beaea4c62cec83aec1ed2528657d42c7","ref":"refs/heads/rules-clean","pushedAt":"2024-09-16T21:13:47.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"scan rules: Clean code tweaks\n\n- Add static modifier where applicable.\n- CHANGELOG > Add maintenance note (if there wasn't already one\npresent).\n- pscanrules > Made resource message methods private again where example\nalerts have been implemented, or removed them where there was only a\nsingle usage (inlining the Constant resource message usage).","shortMessageHtmlLink":"scan rules: Clean code tweaks"}},{"before":"709f2d76802817dd1c3eb1e9e5b6fdb257359396","after":"23c58e37e60f3a3648c226ad4c53eef18ed312b7","ref":"refs/heads/rules-clean","pushedAt":"2024-09-16T21:00:03.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"ascanrulesAlpha: Add example alerts to example rules\n\n- CHANGELOG > Added change note.\n- Scan Rules > Added example alert handling, updated to conform to the\ncommon active scan rule tests.\n- Scan Rule Unit Tests > Added to assert the example alert and\nreferences, as well as common tests.\n\nSigned-off-by: kingthorin ","shortMessageHtmlLink":"ascanrulesAlpha: Add example alerts to example rules"}},{"before":"ac0cded477b2407c3688e9222e3e85baba7fea53","after":"709f2d76802817dd1c3eb1e9e5b6fdb257359396","ref":"refs/heads/rules-clean","pushedAt":"2024-09-16T20:58:06.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"ascanrulesAlpha: Add example alerts to example rules\n\n- CHANGELOG > Added change note.\n- Scan Rules > Added example alert handling, updated to conform to the\ncommon active scan rule tests.\n- Scan Rule Unit Tests > Added to assert the example alert and\nreferences, as well as common tests.\n\nSigned-off-by: kingthorin ","shortMessageHtmlLink":"ascanrulesAlpha: Add example alerts to example rules"}},{"before":"90a6a15c70e8f183e6d662b8f7af3a26fae98127","after":"fbc656ffe3a39fe35918c29fe986f5cb623cd075","ref":"refs/heads/yet-moar-examples","pushedAt":"2024-09-16T17:32:27.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"ascanrules: More example alerts\n\n- Scan Rules > Added example alert handling.\n- Unit Tests > Added tests for the example alerts and references.\n- CHANGELOG > Added change note.\n\nSigned-off-by: kingthorin ","shortMessageHtmlLink":"ascanrules: More example alerts"}},{"before":"d9c72ac629e44fe5bd43ece3a878617d3a8a63e0","after":"45bd70536a9204fc8f7dbec0faffeb4214350911","ref":"refs/heads/csrf-get","pushedAt":"2024-09-16T12:27:03.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"ascanrulesBeta & pscanrules: CSRF rules ignore GET unless Low threshold\n\n- CHANGELOGs > Added change note.\n- Scan Rules > Added condition to bail of now Low threshold and GET\nrequest.\n- Unit Tests > Updated to assert the new behavior and leverage\nparameterized tests.\n- Help files > Updated to note the new condition.\n\nSigned-off-by: kingthorin ","shortMessageHtmlLink":"ascanrulesBeta & pscanrules: CSRF rules ignore GET unless Low threshold"}},{"before":"ba475bd2f232747df603c55950c64687ea5eb5ad","after":"d9c72ac629e44fe5bd43ece3a878617d3a8a63e0","ref":"refs/heads/csrf-get","pushedAt":"2024-09-13T10:57:56.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"ascanrulesBeta & pscanrules: CSRF rules ignore GET unless Low threshold\n\n- CHANGELOGs > Added change note.\n- Scan Rules > Added condition to bail of now Low threshold and GET\nrequest.\n- Unit Tests > Updated to assert the new behavior and leverage\nparameterized tests.\n- Help files > Updated to note the new condition.\n\nSigned-off-by: kingthorin ","shortMessageHtmlLink":"ascanrulesBeta & pscanrules: CSRF rules ignore GET unless Low threshold"}},{"before":"bc19141e5abe20c5b64ce8784c616d70a54a0466","after":"ba475bd2f232747df603c55950c64687ea5eb5ad","ref":"refs/heads/csrf-get","pushedAt":"2024-09-10T23:13:39.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"ascanrulesBeta & pscanrules: CSRF rules ignore GET unless Low threshold\n\n- CHANGELOGs > Added change note.\n- Scan Rules > Added condition to bail of now Low threshold and GET\nrequest.\n- Unit Tests > Updated to assert the new behavior and leverage\nparameterized tests.\n- Help files > Updated to note the new condition.\n\nSigned-off-by: kingthorin ","shortMessageHtmlLink":"ascanrulesBeta & pscanrules: CSRF rules ignore GET unless Low threshold"}},{"before":"f62d8fa8737e5e04e056915f5291476af8e2f195","after":"ed90ba484c81212799d33e0ec6fa978be1f7a8dc","ref":"refs/heads/prxy-xfwd","pushedAt":"2024-09-10T14:27:26.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"ascanrulesBeta: Address possible FP in proxy detection rule\n\n- CHANGELOG > Added change note.\n- ProxyDisclosureScanRule > Added condition to skip messages if they\nhave evidence content to start with. Removed misleading Attack\ntext from the Alert.\n- ProxyDisclosureScanRuleUnitTest > Added a test to assert the new\nbehavior.\n\nSigned-off-by: kingthorin ","shortMessageHtmlLink":"ascanrulesBeta: Address possible FP in proxy detection rule"}},{"before":"cb67b5d058269cc2698a7a65091cc1871476b1dd","after":"ac0cded477b2407c3688e9222e3e85baba7fea53","ref":"refs/heads/rules-clean","pushedAt":"2024-09-10T14:20:19.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"ascanrulesAlpha: Add example alerts to example rules\n\n- CHANGELOG > Added change note.\n- Scan Rules > Added example alert handling, updated to conform to the\ncommon active scan rule tests.\n- Scan Rule Unit Tests > Added to assert the example alert and\nreferences, as well as common tests.\n\nSigned-off-by: kingthorin ","shortMessageHtmlLink":"ascanrulesAlpha: Add example alerts to example rules"}},{"before":"984ff6f3dafd1fb312b2bdbaa4baab1818fa8682","after":"0fbdb8e5691781be46e5ec53f045f292edf26683","ref":"refs/heads/main","pushedAt":"2024-09-10T13:30:07.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"Merge pull request #5713 from kingthorin/hash-osx\n\npscanrules: Adjust Mac OSX Salted SHA-1 name, risk, and confidence","shortMessageHtmlLink":"Merge pull request zaproxy#5713 from kingthorin/hash-osx"}},{"before":"824b5df83170a4207bdf1bc5aad7a5c647cf9826","after":"f62d8fa8737e5e04e056915f5291476af8e2f195","ref":"refs/heads/prxy-xfwd","pushedAt":"2024-09-10T00:44:17.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"ascanrulesBeta: Address possible FP in proxy detection rule\n\n- CHANGELOG > Added change note.\n- ProxyDisclosureScanRule > Added condition to skip messages if they\nhave evidence content to start with. Removed misleading Attack\ntext from the Alert.\n- ProxyDisclosureScanRuleUnitTest > Added a test to assert the new\nbehavior.\n\nSigned-off-by: kingthorin ","shortMessageHtmlLink":"ascanrulesBeta: Address possible FP in proxy detection rule"}},{"before":"b491554baa356d2b4cbb020d1e2431b5e2528d5f","after":"824b5df83170a4207bdf1bc5aad7a5c647cf9826","ref":"refs/heads/prxy-xfwd","pushedAt":"2024-09-10T00:36:51.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"ascanrulesBeta: Address possible FP in proxy detection rule\n\n- CHANGELOG > Added change note.\n- ascanbeta.html > added note about the new condition.\n- ProxyDisclosureScanRule > Added condition to skip messages if they\nhave \"x-forward\" type content to start with. Removed misleading Attack\ntext from the Alert.\n- ProxyDisclosureScanRuleUnitTest > Added a test to assert the new\nbehavior.\n\nSigned-off-by: kingthorin ","shortMessageHtmlLink":"ascanrulesBeta: Address possible FP in proxy detection rule"}},{"before":"595a0cd8580731a129c4db01c9d62a2f280146e8","after":"cb67b5d058269cc2698a7a65091cc1871476b1dd","ref":"refs/heads/rules-clean","pushedAt":"2024-09-10T00:34:31.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"ascanrulesAlpha: Add example alerts to example rules\n\n- CHANGELOG > Added change note.\n- Scan Rules > Added example alert handling, updated to conform to the\ncommon active scan rule tests.\n- Scan Rule Unit Tests > Added to assert the example alert and\nreferences, as well as common tests.\n\nSigned-off-by: kingthorin ","shortMessageHtmlLink":"ascanrulesAlpha: Add example alerts to example rules"}},{"before":"694da9fc9c67a33149eda1660718f6cb5f004121","after":"595a0cd8580731a129c4db01c9d62a2f280146e8","ref":"refs/heads/rules-clean","pushedAt":"2024-09-10T00:20:40.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"ascanrulesAlpha: Add example alerts to example rules\n\n- CHANGELOG > Added change note.\n- Scan Rules > Added example alert handling, updated to conform to the\ncommon active scan rule tests.\n- Scan Rule Unit Tests > Added to assert the example alert and\nreferences, as well as common tests.\n\nSigned-off-by: kingthorin ","shortMessageHtmlLink":"ascanrulesAlpha: Add example alerts to example rules"}},{"before":"1fddfa2b67970b5e71789239892fccccbdf871c7","after":"694da9fc9c67a33149eda1660718f6cb5f004121","ref":"refs/heads/rules-clean","pushedAt":"2024-09-09T23:05:15.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kingthorin","name":"Rick M","path":"/kingthorin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7570458?s=80&v=4"},"commit":{"message":"ascanrulesAlpha: Add example alerts to example rules\n\n- CHANGELOG > Added change note.\n- Scan Rules > Added example alert handling, updated to conform to the\ncommon active scan rule tests.\n- Scan Rule Unit Tests > Added to assert the example alert and\nreferences, as well as common tests.\n\nSigned-off-by: kingthorin ","shortMessageHtmlLink":"ascanrulesAlpha: Add example alerts to example rules"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0xOVQxNTozNTowNC4wMDAwMDBazwAAAAS7CtV7","startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0xOVQxNTozNTowNC4wMDAwMDBazwAAAAS7CtV7","endCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0wOVQyMzowNToxNS4wMDAwMDBazwAAAASxb7XJ"}},"title":"Activity ยท kingthorin/zap-extensions"}