-
-
Notifications
You must be signed in to change notification settings - Fork 504
Update dependencies and fix changes #757
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -96,7 +96,10 @@ | |
|
|
||
| // Handler for the scan tool | ||
| s.AddTool(scanTool, func(ctx context.Context, request mcp.CallToolRequest) (*mcp.CallToolResult, error) { | ||
| url := request.Params.Arguments["url"].(string) | ||
| // Type assert Arguments to map[string]any | ||
| args := request.Params.Arguments.(map[string]any) | ||
|
|
||
| url := args["url"].(string) | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Accessing the map key urlVal, ok := args["url"].(string)
if !ok {
return nil, fmt.Errorf("url parameter is missing or not a string")
}
url := urlVal |
||
| if url == "" { | ||
| return nil, fmt.Errorf("URL is required") | ||
| } | ||
|
|
@@ -121,13 +124,13 @@ | |
| } | ||
|
|
||
| for _, opt := range stringOptions { | ||
| if value, ok := request.Params.Arguments[opt.paramName].(string); ok && value != "" { | ||
| if value, ok := args[opt.paramName].(string); ok && value != "" { | ||
| opt.setter(value) | ||
| } | ||
| } | ||
|
|
||
| // Handle special case for headers which requires splitting | ||
| if headers, ok := request.Params.Arguments["headers"].(string); ok && headers != "" { | ||
| if headers, ok := args["headers"].(string); ok && headers != "" { | ||
| rqOptions.Header = strings.Split(headers, "|") | ||
| } | ||
|
|
||
|
|
@@ -141,7 +144,7 @@ | |
| } | ||
|
|
||
| for _, opt := range numericOptions { | ||
| if value, ok := request.Params.Arguments[opt.paramName].(float64); ok { | ||
| if value, ok := args[opt.paramName].(float64); ok { | ||
| opt.setter(int(value)) | ||
| } | ||
| } | ||
|
|
@@ -159,22 +162,22 @@ | |
| } | ||
|
|
||
| for _, opt := range boolOptions { | ||
| if value, ok := request.Params.Arguments[opt.paramName].(bool); ok { | ||
| if value, ok := args[opt.paramName].(bool); ok { | ||
| opt.setter(value) | ||
| } | ||
| } | ||
|
|
||
| // Handle special cases for mining options | ||
| if skipMiningAll, ok := request.Params.Arguments["skip-mining-all"].(bool); ok && skipMiningAll { | ||
| if skipMiningAll, ok := args["skip-mining-all"].(bool); ok && skipMiningAll { | ||
| rqOptions.Mining = false | ||
| rqOptions.FindingDOM = false | ||
| } | ||
|
|
||
| if skipMiningDict, ok := request.Params.Arguments["skip-mining-dict"].(bool); ok && skipMiningDict { | ||
| if skipMiningDict, ok := args["skip-mining-dict"].(bool); ok && skipMiningDict { | ||
| rqOptions.Mining = false | ||
| } | ||
|
|
||
| if skipMiningDOM, ok := request.Params.Arguments["skip-mining-dom"].(bool); ok && skipMiningDOM { | ||
| if skipMiningDOM, ok := args["skip-mining-dom"].(bool); ok && skipMiningDOM { | ||
| rqOptions.FindingDOM = false | ||
| } | ||
|
|
||
|
|
@@ -218,7 +221,10 @@ | |
|
|
||
| // Handler for the results tool | ||
| s.AddTool(resultsTool, func(ctx context.Context, request mcp.CallToolRequest) (*mcp.CallToolResult, error) { | ||
| scanID := request.Params.Arguments["scan_id"].(string) | ||
| // Type assert Arguments to map[string]any | ||
| args := request.Params.Arguments.(map[string]any) | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Similar to the 'url' parameter handling, this direct type assertion for args, ok := request.Params.Arguments.(map[string]any)
if !ok {
return nil, fmt.Errorf("arguments are not of expected type map[string]any")
} |
||
|
|
||
| scanID := args["scan_id"].(string) | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Directly accessing and type asserting scanIDVal, ok := args["scan_id"].(string)
if !ok {
return nil, fmt.Errorf("scan_id parameter is missing or not a string")
}
scanID := scanIDVal |
||
| if scanID == "" { | ||
| return nil, fmt.Errorf("scan_id is required") | ||
| } | ||
|
|
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This direct type assertion for
request.Params.Argumentscan panic if the actual type is notmap[string]any. It's safer to use the 'comma, ok' idiom to check the success of the assertion and handle potential errors gracefully.