@@ -227,7 +227,7 @@ def send(cls,
227
227
228
228
@classmethod
229
229
def send_phishing_email (cls ,
230
- raw_alert : BinaryIO ,
230
+ raw_email : BinaryIO ,
231
231
api : IntezerApiClient = None ,
232
232
environment : Optional [str ] = None ,
233
233
default_verdict : Optional [str ] = None ,
@@ -238,7 +238,7 @@ def send_phishing_email(cls,
238
238
"""
239
239
Send an alert for further investigation using the Intezer Analyze API.
240
240
241
- :param raw_alert : The raw alert data.
241
+ :param raw_email : The raw alert data.
242
242
:param api: The API connection to Intezer.
243
243
:param environment: The environment of the alert.
244
244
:param default_verdict: The default verdict to send the alert with.
@@ -250,12 +250,12 @@ def send_phishing_email(cls,
250
250
resulting alert object will be initialized with the alert triage data.
251
251
"""
252
252
_api = IntezerApi (api or get_global_api ())
253
- if not bool (raw_alert .getvalue ()):
253
+ if not bool (raw_email .getvalue ()):
254
254
raise ValueError ('alert cannot be empty' )
255
255
256
256
send_alert_params = dict (
257
- alert = raw_alert ,
258
- file_name = cls ._parse_alert_id_from_alert_stream (raw_alert ),
257
+ alert = raw_email ,
258
+ file_name = cls ._parse_alert_id_from_alert_stream (raw_email ),
259
259
alert_source = 'phishing_emails' ,
260
260
environment = environment ,
261
261
display_fields = ',' .join (['sender' , 'received' , 'subject' , 'message_id' , 'to' ]),
0 commit comments