)]}'
{
  "commit": "0593c0ec8f3a57f386a32b20fa90f8957e79fa08",
  "tree": "53ebbe2493d700131f4141d07d79825f8b86928e",
  "parents": [
    "5f4809d1e748f0dcd36f162c296075d5f12adc2b"
  ],
  "author": {
    "name": "Adurti",
    "email": "adurti.v@tataelxsi.co.in",
    "time": "Thu Mar 28 11:14:53 2024 +0000"
  },
  "committer": {
    "name": "garciadeblas",
    "email": "gerardo.garciadeblas@telefonica.com",
    "time": "Thu Dec 12 16:47:05 2024 +0100"
  },
  "message": "Coverity(phase2)-CWE 330: Use of Insufficiently Random Values\n\nAdded fix for CWE 330: Use of Insufficiently Random Value (Cryptographically weak PRNG)\n\nChange-Id: Iddd9dc85a5be84371c8d6afb47d4571f67af3468\nSigned-off-by: Adurti \u003cadurti.v@tataelxsi.co.in\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "b7768bab92803224c778a5a328cdf000550849ba",
      "old_mode": 33261,
      "old_path": "attic/run_test.py",
      "new_id": "2c247c5367461d98d21c093d6ffb3dd28776d48d",
      "new_mode": 33261,
      "new_path": "attic/run_test.py"
    }
  ]
}
