Skip to content

[Buganizer ID: 494154345] Feature: Add List Resource Vulnerability Findings action to Wiz integration#683

Open
sedovolosiy wants to merge 9 commits intomainfrom
494154345-wiz-action-list-resource-vulnerability-findings-
Open

[Buganizer ID: 494154345] Feature: Add List Resource Vulnerability Findings action to Wiz integration#683
sedovolosiy wants to merge 9 commits intomainfrom
494154345-wiz-action-list-resource-vulnerability-findings-

Conversation

@sedovolosiy
Copy link
Copy Markdown
Contributor

@sedovolosiy sedovolosiy commented Apr 14, 2026

Description

What problem does this PR solve?
Implements the new action List Resource Vulnerability Findings for the Wiz integration, allowing users to retrieve vulnerability findings for specific resources.

How does this PR solve the problem?

  • Added list_resource_vulnerability_findings.py and list_resource_vulnerability_findings.yaml in the actions/ directory.
  • Updated WizApiClient in core/api_client.py to include the get_resource_vulnerability_findings method.
  • Added corresponding unit tests in tests/test_actions/test_list_resource_vulnerability_findings.py.
  • Added a JSON result example file in resources/.
  • Bumped the integration version to 5.0 in pyproject.toml and updated release_notes.yaml.
  • Performed minor import cleanups in existing action files.

Any other relevant information (e.g., design choices, tradeoffs, known issues):
N/A


Checklist:

General Checks:

  • I have read and followed the project's contributing.md guide.
  • My code follows the project's coding style guidelines.
  • I have performed a self-review of my own code.
  • My changes do not introduce any new warnings.
  • My changes pass all existing tests.
  • I have added new tests where appropriate to cover my changes.
  • I have updated the documentation where necessary (e.g., README, API docs).

Open-Source Specific Checks:

  • My changes do not introduce any Personally Identifiable Information (PII) or sensitive customer data.
  • My changes do not expose any internal-only code examples, configurations, or URLs.
  • All code examples, comments, and messages are generic and suitable for a public repository.
  • I understand that any internal context or sensitive details related to this work are handled separately in internal systems (Buganizer for Google team members).

For Google Team Members and Reviewers Only:

  • I have included the Buganizer ID in the PR title or description.
  • I have ensured that all internal discussions and PII related to this work remain in Buganizer.
  • I have tagged the PR with one or more labels that reflect the pull request purpose.

Screenshots (If Applicable)

N/A


Further Comments / Questions

N/A


Note

Medium Risk
Adds a new Wiz action and GraphQL query path that calls the Wiz API and parses new response shapes; main risk is correctness of query/filters and result handling rather than security-sensitive logic.

Overview
Adds a new List Resource Vulnerability Findings action that queries Wiz for vulnerability findings by resource name (supports comma-separated resources) with optional filters (severity, related issue severity, CVE IDs, has-fix/has-public-exploit) and caps per-resource results at 500.

Extends the Wiz client to support this via a new GraphQL query builder (VulnerabilityFindingsQueryBuilder), a new VulnerabilityFinding datamodel/parser, plus an example JsonResult file and tests/mocks to cover success and no-results cases. Integration metadata is updated by bumping the version to 5.0 and adding release notes, alongside minor import cleanups.

Reviewed by Cursor Bugbot for commit 8023110. Bugbot is set up for automated code reviews on this repo. Configure here.

@sedovolosiy sedovolosiy self-assigned this Apr 14, 2026
@sedovolosiy sedovolosiy requested a review from a team as a code owner April 14, 2026 18:06
@gemini-code-assist
Copy link
Copy Markdown
Contributor

Summary of Changes

Hello, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request introduces a new capability to the Wiz integration by allowing users to retrieve vulnerability findings for specific resources. The changes include the necessary action files, API client updates, and supporting data models to facilitate this functionality. Additionally, the integration version has been incremented to reflect these updates, and the test suite has been expanded to ensure the new feature works as expected.

Highlights

  • New Action Implementation: Added the 'List Resource Vulnerability Findings' action to the Wiz integration, enabling users to query vulnerability findings for specific resources with various filtering options.
  • API Client Enhancement: Updated the WizApiClient to include a method for fetching resource vulnerability findings via GraphQL.
  • Integration Version Bump: Updated the integration version to 5.0 in pyproject.toml and added corresponding release notes.
  • Testing and Documentation: Added comprehensive unit tests for the new action and included a JSON result example file.

🧠 New Feature in Public Preview: You can now enable Memory to help Gemini Code Assist learn from your team's feedback. This makes future code reviews more consistent and personalized to your project's style. Click here to enable Memory in your admin console.

Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in pull request comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for GitHub and other Google products, sign up here.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

Copy link
Copy Markdown
Contributor

@gemini-code-assist gemini-code-assist Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request introduces a new action, 'List Resource Vulnerability Findings,' to the Wiz integration, including the necessary API client methods, GraphQL query builders, and data models. The integration version is bumped to 5.0, and several files have been refactored for improved import organization and type safety. Review feedback highlights the need for strict type annotations on all function parameters, adherence to the 2-4 word naming convention for action parameters, and the inclusion of an upper bound for the required Python version in the project configuration.

Copy link
Copy Markdown

@cursor cursor Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cursor Bugbot has reviewed your changes and found 2 potential issues.

Fix All in Cursor

❌ Bugbot Autofix is OFF. To automatically fix reported issues with cloud agents, enable autofix in the Cursor dashboard.

Reviewed by Cursor Bugbot for commit 8023110. Configure here.

@cursor
Copy link
Copy Markdown

cursor Bot commented Apr 14, 2026

You have used all of your free Bugbot PR reviews.

To receive reviews on all of your PRs, visit the Cursor dashboard to activate Pro and start your 14-day free trial.

…e expected by the Wiz API and our own response parsing logic.
@cursor
Copy link
Copy Markdown

cursor Bot commented Apr 14, 2026

You have used all of your free Bugbot PR reviews.

To receive reviews on all of your PRs, visit the Cursor dashboard to activate Pro and start your 14-day free trial.

@cursor
Copy link
Copy Markdown

cursor Bot commented Apr 15, 2026

You have used all of your free Bugbot PR reviews.

To receive reviews on all of your PRs, visit the Cursor dashboard to activate Pro and start your 14-day free trial.

- Refactor `list_resource_vulnerability_findings` action to return findings grouped by entity in `JsonResult`.
- Fix GraphQL query to use `assetName` with the equals operator for resource filtering.
- Update widget HTML to match `EntityListResponseTemplate` exactly (except for the title).
- Update unit tests to assert the new `EntityResult` structure.
- Fix a minor linter warning regarding line length in the test file.
b/502645185
@cursor
Copy link
Copy Markdown

cursor Bot commented Apr 17, 2026

You have used all of your free Bugbot PR reviews.

To receive reviews on all of your PRs, visit the Cursor dashboard to activate Pro and start your 14-day free trial.

@cursor
Copy link
Copy Markdown

cursor Bot commented Apr 17, 2026

You have used all of your free Bugbot PR reviews.

To receive reviews on all of your PRs, visit the Cursor dashboard to activate Pro and start your 14-day free trial.

@cursor
Copy link
Copy Markdown

cursor Bot commented Apr 17, 2026

You have used all of your free Bugbot PR reviews.

To receive reviews on all of your PRs, visit the Cursor dashboard to activate Pro and start your 14-day free trial.

@cursor
Copy link
Copy Markdown

cursor Bot commented Apr 17, 2026

You have used all of your free Bugbot PR reviews.

To receive reviews on all of your PRs, visit the Cursor dashboard to activate Pro and start your 14-day free trial.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant