Usefulness of Vulnerable Method Call Data
This is a completely anonymous short survey meant to collect data on the usefulness of the vulnerable method call information that was included in one of the PRs opened for your project.
Data collected will be anonymized (NO references to projects will be made), processed and used for scientific research purposes (BSc Thesis project in Computer Science at the TU Delft).
We really appreciate you taking your time to fill in this survey!
Sign in to Google to save your progress. Learn more
(OPTIONAL) If you can, please let us know what is the name of the project you are working on
I was aware of the vulnerability affecting my project before being informed by the Pull Request.
Clear selection
If you want, you can provide an open explanation of your answer here
I was convinced by the provided method call data that the vulnerability indeed affects my project.
Clear selection
If you want, you can provide an open explanation of your answer here
I plan on merging the PR in the near future.
Clear selection
If the answer to the previous question is "No",  please provide if you can the reason why
The provided method call information has made my process of dealing with the vulnerable dependency easier (when comparing with past experience).
Clear selection
What did you find to be useful? How was the process made easier for you? Or otherwise, what could have been better?
I have given priority to the task of fixing the vulnerability over other project tasks that are yet to be completed.
Clear selection
If you want, you can provide an open explanation of your answer here
 I would like the idea to receive this kind of method information in future vulnerable dependency Pull Request descriptions.
Clear selection
If you want, you can provide an open explanation of your answer here
Submit
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy