and we're going to try this out Moose . . . lol. I don't think i understand the outputs.
I have a simple python step(named "limit number of vulns while building") that is just picking three items out of a json array. The output of this step which is correct, looks like
data
{
"$success": true,
"limited_vulnerabilities": [
{
"ARS_Severity_Adjusted": "High",
"ARSadjusted": "750.0",
"Active_Risk_Score": "1000",
"CVSS_V3_Score": "7.8",
"CVSS_V3_Severity": "High",
"IsCISAExploitable": "false",
"Title": "Amazon Linux 2023: CVE-2025-32463: Important priority package update for sudo",
"Vulnerability_ID": "amazon_linux_2023-cve-2025-32463",
"assets": [
{
"Hostname": "ip-10-18-136-91",
"IP": "172.17.0.1",
"Operating_System": "Amazon Linux 2023 2023.7.20250527",
"d_macs": "02:42:96:b9:25:b9, 02:f6:87:00:1a:77",
"isAIFM": "false",
"isDORA": "false"
},
{
"Hostname": "shane-ec2",
"IP": "172.29.0.1",
"Operating_System": "Amazon Linux 2023 2023.7.20250609",
"d_macs": "02:42:46:d9:05:3a, 02:23:98:51:1c:87, 02:42:9c:3d:c2:ff, 02:42:6d:b8:74:e8",
"isAIFM": "false",
"isDORA": "false"
}
],
"exposure": "Internal",
"solution": {
"Best Solution": "Update sudo to the latest version available from Amazon, using tools like yum or dnf. By default, AL2023 instances do not automatically receive additional critical and important security updates at launch. The instance includes updates available at the time the version of AL2023 and the chosen AMI were created. For more information on updating your instance, visit this documentation. (https://docs.aws.amazon.com/linux/al2023/ug/updating.html)",
"Solution Type": "WORKAROUND",
"Vulnerability-Name": "Amazon Linux 2023: CVE-2025-32463: Important priority package update for sudo",
"nexpose_id": "amazon_linux_2023-cve-2025-32463",
"vulnerability_id": "393601"
}
},
{
"ARS_Severity_Adjusted": "High",
"ARSadjusted": "750.0",
"Active_Risk_Score": "1000",
"CVSS_V3_Score": "7.5",
"CVSS_V3_Severity": "High",
"Credentials_Succeeded": "true",
"IsCISAExploitable": "false",
"Title": "Apache HTTPD: Range header remote DoS (CVE-2011-3192)",
"Vulnerability_ID": "apache-httpd-cve-2011-3192",
"assets": [
{
"Hostname": "HC1APTR5SV",
"IP": "10.14.76.30",
"Operating_System": "Microsoft Windows Server 2019 Standard Edition 1809",
"d_macs": "00:50:56:9e:4c:15",
"isAIFM": "false",
"isDORA": "false"
}
],
"exposure": "Internal",
"solution": {
"Best Solution": "Download and apply the upgrade from: https://httpd.apache.org/download.cgi (https://httpd.apache.org/download.cgi)",
"Solution Type": "ROLLUP",
"Vulnerability-Name": "Apache HTTPD: Range header remote DoS (CVE-2011-3192)",
"nexpose_id": "apache-httpd-cve-2011-3192",
"vulnerability_id": "27785"
}
},
{
"ARS_Severity_Adjusted": "High",
"ARSadjusted": "750.0",
"Active_Risk_Score": "1000",
"CVSS_V3_Score": "9.8",
"CVSS_V3_Severity": "Critical",
"Credentials_Succeeded": "true",
"IsCISAExploitable": "false",
"Title": "Apache Tomcat: Important: Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet - (CVE-2025-24813)",
"Vulnerability_ID": "apache-tomcat-cve-2025-24813",
"assets": [
{
"Hostname": "HC1-PSFT07-VM",
"IP": "10.14.120.77",
"Operating_System": "Microsoft Windows 10 22H2",
"d_macs": "00:50:56:9e:79:9d",
"isAIFM": "false",
"isDORA": "false"
}
],
"exposure": "Internal",
"solution": {
"Best Solution": "Download and apply the upgrade from: http://archive.apache.org/dist/tomcat/tomcat-11/v11.0.12/ (http://archive.apache.org/dist/tomcat/tomcat-11/v11.0.12/)",
"Solution Type": "ROLLUP",
"Vulnerability-Name": "Apache Tomcat: Important: Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet - (CVE-2025-24813)",
"nexpose_id": "apache-tomcat-cve-2025-24813",
"vulnerability_id": "340976"
}
}
],
"total_vulnerabilities": 40
}
The step configuration, the outputs are
The next step is a loop over the three items. However, when i try to configure the For Each loop i don't get any of the outputs from the previous step, neither the ones in the step or from the step configuration.
I have a feeling this is because i didn't add an output to the python step before the loop. I tried that and still didn't see it.
So i guess my question is how do i "create" a map/collection that contains a key holding the list of vulns output that can be referenced by the loop step?