diff --git a/Packs/CyrenInboxSecurity/Scripts/CyrenShowThreatIndicators/CyrenShowThreatIndicators.yml b/Packs/CyrenInboxSecurity/Scripts/CyrenShowThreatIndicators/CyrenShowThreatIndicators.yml index 9eff479a01aa..6e6f00c91f8d 100644 --- a/Packs/CyrenInboxSecurity/Scripts/CyrenShowThreatIndicators/CyrenShowThreatIndicators.yml +++ b/Packs/CyrenInboxSecurity/Scripts/CyrenShowThreatIndicators/CyrenShowThreatIndicators.yml @@ -1,13 +1,15 @@ -comment: |- - Displays threat indicators in readable format +comment: 'Displays threat indicators in readable format + This automation runs using the default Limited User role, unless you explicitly change the permissions. + For more information, see the section about permissions here: - https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Automations + + https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Automations' commonfields: id: Cyren-Show-Threat-Indicators version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.92207 enabled: true name: Cyren-Show-Threat-Indicators script: '' diff --git a/Packs/DeepInstinct/Integrations/DeepInstinct/DeepInstinct.yml b/Packs/DeepInstinct/Integrations/DeepInstinct/DeepInstinct.yml index e00c90e7ecb1..f26170181d24 100644 --- a/Packs/DeepInstinct/Integrations/DeepInstinct/DeepInstinct.yml +++ b/Packs/DeepInstinct/Integrations/DeepInstinct/DeepInstinct.yml @@ -8,12 +8,12 @@ description: The Deep Learning cybersecurity platform, for zero time prevention. configuration: - display: Base server URL name: base_url - defaultvalue: "https://my-deep-instinct-path.deepinstinctweb.com" + defaultvalue: https://my-deep-instinct-path.deepinstinctweb.com type: 0 required: true - display: API Key name: apikey - defaultvalue: "" + defaultvalue: '' type: 4 required: true - display: Fetch incidents @@ -26,7 +26,7 @@ configuration: required: false - display: First event ID to fetch from name: first_fetch_id - defaultvalue: "0" + defaultvalue: '0' type: 0 required: false script: @@ -117,7 +117,7 @@ script: arguments: - name: first_event_id description: First event id to get as max events in response can be 50 - defaultValue: "0" + defaultValue: '0' outputs: - contextPath: DeepInstinct.Events.events.ID description: event ID @@ -309,7 +309,7 @@ script: description: comma separeted list of event ids isArray: true description: close list of events - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.92207 isfetch: true script: '-' type: python diff --git a/Packs/Digital_Defense_FrontlineVM/Integrations/Digital_Defense_FrontlineVM/Digital_Defense_FrontlineVM.yml b/Packs/Digital_Defense_FrontlineVM/Integrations/Digital_Defense_FrontlineVM/Digital_Defense_FrontlineVM.yml index 88d27fe50f4f..8d8f8261208a 100644 --- a/Packs/Digital_Defense_FrontlineVM/Integrations/Digital_Defense_FrontlineVM/Digital_Defense_FrontlineVM.yml +++ b/Packs/Digital_Defense_FrontlineVM/Integrations/Digital_Defense_FrontlineVM/Digital_Defense_FrontlineVM.yml @@ -13,12 +13,12 @@ configuration: required: true - display: Trust any certificate (not secure) name: insecure - defaultvalue: "false" + defaultvalue: 'false' type: 8 required: false - display: API Token to access Frontline VM name: apiToken - defaultvalue: "" + defaultvalue: '' type: 4 required: true - display: Fetch incidents @@ -164,7 +164,7 @@ script: - contextPath: FrontlineVM.Scan.IP description: The IP address of the scan (can be a single IP address or a range of IP addresses). description: Performs a scan on the specified asset. - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.92207 isfetch: true subtype: python3 fromversion: 5.0.0 diff --git a/Packs/ExtraHop/Scripts/ExtraHopTrackIncidents/ExtraHopTrackIncidents.yml b/Packs/ExtraHop/Scripts/ExtraHopTrackIncidents/ExtraHopTrackIncidents.yml index ad2653466b66..071bf37d2476 100644 --- a/Packs/ExtraHop/Scripts/ExtraHopTrackIncidents/ExtraHopTrackIncidents.yml +++ b/Packs/ExtraHop/Scripts/ExtraHopTrackIncidents/ExtraHopTrackIncidents.yml @@ -14,8 +14,8 @@ enabled: true scripttarget: 0 dependson: must: - - 'ExtraHop v2|||extrahop-ticket-track' -dockerimage: demisto/python3:3.10.11.61265 + - ExtraHop v2|||extrahop-ticket-track +dockerimage: demisto/python3:3.10.14.92207 runas: DBotWeakRole tests: - ExtraHop_v2-Test diff --git a/Packs/FeedCyCognito/Scripts/FeedCyCognitoGetAssetEndpoint/FeedCyCognitoGetAssetEndpoint.yml b/Packs/FeedCyCognito/Scripts/FeedCyCognitoGetAssetEndpoint/FeedCyCognitoGetAssetEndpoint.yml index 4f90b86a906a..f13a7dba9a56 100644 --- a/Packs/FeedCyCognito/Scripts/FeedCyCognitoGetAssetEndpoint/FeedCyCognitoGetAssetEndpoint.yml +++ b/Packs/FeedCyCognito/Scripts/FeedCyCognitoGetAssetEndpoint/FeedCyCognitoGetAssetEndpoint.yml @@ -11,7 +11,7 @@ enabled: true script: '' scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.8.36650 +dockerimage: demisto/python3:3.10.14.92207 runas: DBotWeakRole fromversion: 6.2.0 tests: diff --git a/Packs/FeedReversingLabsRansomwareAndRelatedToolsApp/Integrations/ReversingLabsRansomwareAndRelatedToolsFeed/ReversingLabsRansomwareAndRelatedToolsFeed.yml b/Packs/FeedReversingLabsRansomwareAndRelatedToolsApp/Integrations/ReversingLabsRansomwareAndRelatedToolsFeed/ReversingLabsRansomwareAndRelatedToolsFeed.yml index e3dbe7ee83e8..d8d2b36267d9 100644 --- a/Packs/FeedReversingLabsRansomwareAndRelatedToolsApp/Integrations/ReversingLabsRansomwareAndRelatedToolsFeed/ReversingLabsRansomwareAndRelatedToolsFeed.yml +++ b/Packs/FeedReversingLabsRansomwareAndRelatedToolsApp/Integrations/ReversingLabsRansomwareAndRelatedToolsFeed/ReversingLabsRansomwareAndRelatedToolsFeed.yml @@ -13,7 +13,7 @@ configuration: required: false - display: ReversingLabs TitaniumCloud URL name: host - defaultvalue: "https://data.reversinglabs.com" + defaultvalue: https://data.reversinglabs.com type: 0 required: true - display: Credentials @@ -42,7 +42,7 @@ configuration: - F - Reliability cannot be judged required: true type: 15 -- display: "" +- display: '' name: feedExpirationPolicy defaultvalue: indicatorType type: 17 @@ -52,9 +52,9 @@ configuration: - indicatorType - suddenDeath required: false -- display: "" +- display: '' name: feedExpirationInterval - defaultvalue: "20160" + defaultvalue: '20160' type: 1 required: false - display: Feed Fetch Interval @@ -116,13 +116,13 @@ script: defaultValue: 50 description: The maximum number of indicators to return. The default value is 50. - name: indicator_types - defaultValue: 'ipv4,domain,hash,uri' + defaultValue: ipv4,domain,hash,uri description: Which indicator types should be fetched from the feed. Possible values are 'ipv4', 'domain', 'hash', 'uri'. - name: hours_back defaultValue: 1 description: Defines how many hours back in time should the indicators be fetched from. Value should be between 1 and 4. Recommended value is 1. description: Gets indicators from the feed. - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.92207 feed: true subtype: python3 fromversion: 6.0.0 diff --git a/Packs/FireEye-Detection-on-Demand/Integrations/FireEye-Detection-on-Demand/FireEye-Detection-on-Demand.yml b/Packs/FireEye-Detection-on-Demand/Integrations/FireEye-Detection-on-Demand/FireEye-Detection-on-Demand.yml index a38202b678f9..813bf96aea12 100644 --- a/Packs/FireEye-Detection-on-Demand/Integrations/FireEye-Detection-on-Demand/FireEye-Detection-on-Demand.yml +++ b/Packs/FireEye-Detection-on-Demand/Integrations/FireEye-Detection-on-Demand/FireEye-Detection-on-Demand.yml @@ -6,7 +6,7 @@ display: FireEye Detection on Demand category: Forensics & Malware Analysis description: FireEye Detection On Demand is a threat detection service delivered as an API for integration into the SOC workflow, SIEM analytics, data repositories, or web applications, etc. It delivers flexible file and content analysis to identify malicious behavior wherever the enterprise needs it. configuration: -- display: "DoD hostname" +- display: DoD hostname name: url defaultvalue: https://feapi.marketplace.apps.fireeye.com type: 0 @@ -15,7 +15,7 @@ configuration: name: apikey type: 4 required: true - additionalinfo: "Visit https://fireeye.dev/docs/detection-on-demand for more information on generating API keys" + additionalinfo: Visit https://fireeye.dev/docs/detection-on-demand for more information on generating API keys - display: Trust any certificate (not secure) name: insecure type: 8 @@ -27,7 +27,7 @@ configuration: script: script: '' type: python - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.92207 runonce: false subtype: python3 commands: @@ -50,7 +50,7 @@ script: - contextPath: DBotScore.Vendor description: The vendor used to calculate the score. - contextPath: File.Malicious.Vendor - description: "N/A" + description: N/A - contextPath: File.MD5 description: The MD5 hash of the file - contextPath: FireEyeDoD.engine_results.cache_lookup.sha256 @@ -103,37 +103,37 @@ script: - name: screenshot auto: PREDEFINED predefined: - - "True" - - "False" - defaultValue: "False" + - 'True' + - 'False' + defaultValue: 'False' description: Extract screenshot of screen activity during dynamic analysis if true, which later can be downloaded with artifacts api - name: video auto: PREDEFINED predefined: - - "True" - - "False" - defaultValue: "False" + - 'True' + - 'False' + defaultValue: 'False' description: Extract video activity during dynamic analysis if true, which later can be downloaded with artifacts api - name: fileExtraction auto: PREDEFINED predefined: - - "True" - - "False" - defaultValue: "False" + - 'True' + - 'False' + defaultValue: 'False' description: Extract dropped files from vm during dynamic analysis if true, which later can be downloaded with artifacts api - name: memoryDump auto: PREDEFINED predefined: - - "True" - - "False" - defaultValue: "False" + - 'True' + - 'False' + defaultValue: 'False' description: Extract memory dump files from vm during dynamic analysis if true, which later can be downloaded with artifacts api - name: pcap auto: PREDEFINED predefined: - - "True" - - "False" - defaultValue: "False" + - 'True' + - 'False' + defaultValue: 'False' description: Extract pcap files from vm during dynamic analysis if true, which later can be downloaded with artifacts api outputs: - contextPath: FireEyeDoD.Scan.report_id @@ -166,16 +166,16 @@ script: description: If True, additional information will be returned auto: PREDEFINED predefined: - - "True" - - "False" - defaultValue: "False" + - 'True' + - 'False' + defaultValue: 'False' - name: get_screenshot auto: PREDEFINED predefined: - - "True" - - "False" + - 'True' + - 'False' description: Whether or not to get screenshot artifacts from the report - defaultValue: "False" + defaultValue: 'False' - name: get_artifact auto: PREDEFINED predefined: @@ -228,7 +228,7 @@ script: - name: expiration default: true description: Expiration (in hours) for browser viewable report pre-signed URL link. Default value is 72 hours. Minimum is 1 hour, and maximum is 8760 hours (365 days). - defaultValue: "72" + defaultValue: '72' description: Generates a pre-signed URL for a report fromversion: 6.0.0 tests: diff --git a/Packs/Genians/Integrations/Genians/Genians.yml b/Packs/Genians/Integrations/Genians/Genians.yml index 7eb51cde0ce8..f45244e7ded8 100755 --- a/Packs/Genians/Integrations/Genians/Genians.yml +++ b/Packs/Genians/Integrations/Genians/Genians.yml @@ -5,26 +5,26 @@ name: Genians display: Genians category: Network Security description: Use the Genian NAC integration to block IP addresses using the assign tag. -detaileddescription: +detaileddescription: null configuration: - display: Server IP (e.g. 172.29.62.26) name: server_ip - defaultvalue: "" + defaultvalue: '' type: 0 required: true - display: API Key (e.g. 912fae69-b454-4608-bf4b-fa142353b463) name: apikey - defaultvalue: "" + defaultvalue: '' type: 4 required: true - display: Trust any certificate (not secure) name: insecure - defaultvalue: "false" + defaultvalue: 'false' type: 8 required: false - display: Tag Name (e.g. THREAT, GUEST) name: tag_name - defaultvalue: "" + defaultvalue: '' type: 0 required: true - display: Fetch indicators @@ -59,7 +59,7 @@ script: description: Tag name type: string description: Removes the tag(s) from the Node specified. - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.92207 runonce: false script: '-' subtype: python3 diff --git a/Packs/GoogleChronicleBackstory/Scripts/ListDeviceEventsScript/ListDeviceEventsScript.yml b/Packs/GoogleChronicleBackstory/Scripts/ListDeviceEventsScript/ListDeviceEventsScript.yml index b7e7e6e75125..13e419a9575d 100644 --- a/Packs/GoogleChronicleBackstory/Scripts/ListDeviceEventsScript/ListDeviceEventsScript.yml +++ b/Packs/GoogleChronicleBackstory/Scripts/ListDeviceEventsScript/ListDeviceEventsScript.yml @@ -1099,7 +1099,7 @@ tags: - enhancement timeout: '0' type: python -dockerimage: demisto/python3:3.10.9.40422 +dockerimage: demisto/python3:3.10.14.92207 runas: DBotWeakRole tests: - No tests (auto formatted) diff --git a/Packs/Gurucul/Integrations/GuruculGRA/GuruculGRA.yml b/Packs/Gurucul/Integrations/GuruculGRA/GuruculGRA.yml index 2e6022153622..afb741daf020 100644 --- a/Packs/Gurucul/Integrations/GuruculGRA/GuruculGRA.yml +++ b/Packs/Gurucul/Integrations/GuruculGRA/GuruculGRA.yml @@ -17,12 +17,12 @@ configuration: required: true - display: Trust any certificate (not secure) name: insecure - defaultvalue: "false" + defaultvalue: 'false' type: 8 required: false - display: Use system proxy settings name: proxy - defaultvalue: "false" + defaultvalue: 'false' type: 8 required: false - display: Fetch incidents @@ -40,7 +40,7 @@ configuration: required: false - display: Maximum number of incidents per fetch name: max_fetch - defaultvalue: "25" + defaultvalue: '25' type: 0 required: false script: @@ -52,12 +52,12 @@ script: - name: page required: true description: Page No - defaultValue: "1" + defaultValue: '1' - name: max required: true default: true description: Per page record count - defaultValue: "25" + defaultValue: '25' outputs: - contextPath: Gra.Users.firstName description: First Name @@ -107,12 +107,12 @@ script: - name: page required: true description: Page No - defaultValue: "1" + defaultValue: '1' - name: max required: true default: true description: Per page record count - defaultValue: "25" + defaultValue: '25' outputs: - contextPath: Gra.Accounts.id description: Id @@ -163,12 +163,12 @@ script: - name: page required: true description: Page No - defaultValue: "1" + defaultValue: '1' - name: max required: true default: true description: Per page record count - defaultValue: "25" + defaultValue: '25' outputs: - contextPath: Gra.Active.Resource.Accounts.id description: ID @@ -218,12 +218,12 @@ script: - name: page required: true description: Page No - defaultValue: "1" + defaultValue: '1' - name: max required: true default: true description: Per page record count - defaultValue: "25" + defaultValue: '25' outputs: - contextPath: Gra.User.Accounts.id description: Id @@ -274,12 +274,12 @@ script: - name: page required: true description: Page No - defaultValue: "1" + defaultValue: '1' - name: max required: true default: true description: Per page record count - defaultValue: "25" + defaultValue: '25' outputs: - contextPath: Gra.Resource.Highrisk.Accounts.id description: Id @@ -326,12 +326,12 @@ script: - name: page required: true description: Page No - defaultValue: "1" + defaultValue: '1' - name: max required: true default: true description: Per page record count - defaultValue: "25" + defaultValue: '25' outputs: - contextPath: Gra.Hpa.id description: Id @@ -382,12 +382,12 @@ script: - name: page required: true description: Page No - defaultValue: "1" + defaultValue: '1' - name: max required: true default: true description: Per page record count - defaultValue: "25" + defaultValue: '25' outputs: - contextPath: Gra.Resource.Hpa.id description: Id @@ -434,12 +434,12 @@ script: - name: page required: true description: Page No - defaultValue: "1" + defaultValue: '1' - name: max required: true default: true description: Per page record count - defaultValue: "25" + defaultValue: '25' outputs: - contextPath: Gra.Orphan.Accounts.id description: Id @@ -491,11 +491,11 @@ script: required: true default: true description: Page No - defaultValue: "1" + defaultValue: '1' - name: max required: true description: Per page record count - defaultValue: "25" + defaultValue: '25' outputs: - contextPath: Gra.Resource.Orphan.Accounts.id description: Id @@ -545,12 +545,12 @@ script: - name: page required: true description: Page No - defaultValue: "1" + defaultValue: '1' - name: max required: true default: true description: Per page record count - defaultValue: "25" + defaultValue: '25' outputs: - contextPath: Gra.User.Activity.employee_id description: Employee Id @@ -628,7 +628,7 @@ script: - name: page required: true description: Page No - defaultValue: "1" + defaultValue: '1' - name: max required: true default: true @@ -727,11 +727,11 @@ script: - name: page required: true description: Page No - defaultValue: "1" + defaultValue: '1' - name: max required: true description: Per page record count - defaultValue: "25" + defaultValue: '25' outputs: - contextPath: Gra.Cases.entityId description: EntityId @@ -775,11 +775,11 @@ script: - name: page required: true description: Page No - defaultValue: "1" + defaultValue: '1' - name: max required: true description: Per page record count - defaultValue: "25" + defaultValue: '25' outputs: - contextPath: Gra.User.Anomalies.anomaly_name description: Anomaly Name @@ -814,7 +814,7 @@ script: required: true description: Case Comment - name: riskAcceptDate - description: Risk Accept Date in ‘yyyy-MM-dd’ format. (applicable only in case of closing a case as Risk Managed) + description: "Risk Accept Date in \u2018yyyy-MM-dd\u2019 format. (applicable only in case of closing a case as Risk Managed)" outputs: - contextPath: Gra.Case.Action.Message description: Message @@ -852,7 +852,7 @@ script: required: true description: Case Comment - name: riskAcceptDate - description: Risk Accept Date in ‘yyyy-MM-dd’ format. (applicable only in case of closing anomalies as Risk Accepted) + description: "Risk Accept Date in \u2018yyyy-MM-dd\u2019 format. (applicable only in case of closing anomalies as Risk Accepted)" outputs: - contextPath: Gra.Case.Action.Anomaly.Message description: Message @@ -978,7 +978,7 @@ script: description: Current status of anomaly type: String description: Retrieve anomalies for specified case id. - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.92207 isfetch: true subtype: python3 fromversion: 5.0.0