diff --git a/bin/async_capture.py b/bin/async_capture.py index 38b48e3..1a393ee 100755 --- a/bin/async_capture.py +++ b/bin/async_capture.py @@ -18,6 +18,7 @@ from lookyloo.default import AbstractManager, get_config from lookyloo.helpers import get_captures_dir from lookyloo.modules import FOX +from website.web import modules logging.config.dictConfig(get_config('logging')) @@ -112,8 +113,8 @@ class AsyncCapture(AbstractManager): settings = json.loads(to_capture['auto_report']) elif isinstance(to_capture['auto_report'], dict): settings = to_capture['auto_report'] - - self.lookyloo.send_mail(uuid, email=settings.get('email', ''), + response_3rd_party = modules(uuid, True) + self.lookyloo.send_mail(uuid,response_3rd_party, email=settings.get('email', ''), comment=settings.get('comment')) lazy_cleanup = self.lookyloo.redis.pipeline() diff --git a/website/web/__init__.py b/website/web/__init__.py index 5eeb175..f390706 100644 --- a/website/web/__init__.py +++ b/website/web/__init__.py @@ -901,11 +901,11 @@ def modules(tree_uuid: str, mail: bool = False) -> str | WerkzeugResponse | Resp if short_results[module]: # some might have more values which have to be checked if they are empty for data in short_results[module]: if short_results[module][data]: # if true we can consider that there is a hit and the capture might be malicious - return ("**************************************************\n" + return str("**************************************************\n" " Malicious capture according to 3rd party modules \n" "**************************************************") - return ('********************************************\n' + return str('********************************************\n' ' Capture doesn\'t seem to be malicious\n' '********************************************')