diff --git a/ee/spec/factories/ci/job_artifacts.rb b/ee/spec/factories/ci/job_artifacts.rb
index 6ae8010cb41bdc8287fd49750d5953c5bfb0dea4..36f17eb3937a665946eed7383fe4f837bc13f8db 100644
--- a/ee/spec/factories/ci/job_artifacts.rb
+++ b/ee/spec/factories/ci/job_artifacts.rb
@@ -118,7 +118,7 @@
 
       after(:build) do |artifact, _|
         artifact.file = fixture_file_upload(
-          Rails.root.join('ee/spec/fixtures/security-reports/feature-branch/gl-dependency-scanning-report.json'), 'application/json')
+          Rails.root.join('ee/spec/fixtures/security_reports/feature-branch/gl-dependency-scanning-report.json'), 'application/json')
       end
     end
 
@@ -148,7 +148,7 @@
 
       after(:build) do |artifact, _|
         artifact.file = fixture_file_upload(
-          Rails.root.join('spec/fixtures/security-reports/feature-branch/gl-container-scanning-report.json'), 'application/json')
+          Rails.root.join('ee/spec/fixtures/security_reports/feature-branch/gl-container-scanning-report.json'), 'application/json')
       end
     end
 
diff --git a/ee/spec/fixtures/security-reports/feature-branch/gl-dependency-scanning-report.json b/ee/spec/fixtures/security-reports/feature-branch/gl-dependency-scanning-report.json
deleted file mode 100644
index ff452b6b59222ab75c09a698f99236e146b7bfb6..0000000000000000000000000000000000000000
--- a/ee/spec/fixtures/security-reports/feature-branch/gl-dependency-scanning-report.json
+++ /dev/null
@@ -1,170 +0,0 @@
-{
-    "version": "1.3",
-    "vulnerabilities": [
-      {
-        "category": "dependency_scanning",
-        "name": "io.netty/netty - CVE-2014-3488",
-        "message": "DoS by CPU exhaustion when using malicious SSL packets",
-        "cve": "app/pom.xml:io.netty/netty@3.9.1.Final:CVE-2014-3488",
-        "severity": "Unknown",
-        "solution": "Upgrade to the latest version",
-        "scanner": {
-          "id": "gemnasium",
-          "name": "Gemnasium"
-        },
-        "location": {
-          "file": "app/pom.xml",
-          "dependency": {
-            "package": {
-              "name": "io.netty/netty"
-            },
-            "version": "3.9.1.Final"
-          }
-        },
-        "identifiers": [
-          {
-            "type": "gemnasium",
-            "name": "Gemnasium-d1bf36d9-9f07-46cd-9cfc-8675338ada8f",
-            "value": "d1bf36d9-9f07-46cd-9cfc-8675338ada8f",
-            "url": "https://deps.sec.gitlab.com/packages/maven/io.netty/netty/versions/3.9.1.Final/advisories"
-          },
-          {
-            "type": "cve",
-            "name": "CVE-2014-3488",
-            "value": "CVE-2014-3488",
-            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3488"
-          }
-        ],
-        "links": [
-          {
-            "url": "https://bugzilla.redhat.com/CVE-2014-3488"
-          },
-          {
-            "url": "http://netty.io/news/2014/06/11/3.html"
-          },
-          {
-            "url": "https://github.com/netty/netty/issues/2562"
-          }
-        ],
-        "priority": "Unknown",
-        "file": "app/pom.xml",
-        "url": "https://bugzilla.redhat.com/CVE-2014-3488",
-        "tool": "gemnasium"
-      },
-      {
-        "category": "dependency_scanning",
-        "name": "Django - CVE-2017-12794",
-        "message": "Possible XSS in traceback section of technical 500 debug page",
-        "cve": "app/requirements.txt:Django@1.11.3:CVE-2017-12794",
-        "severity": "Unknown",
-        "solution": "Upgrade to latest version or apply patch.",
-        "scanner": {
-          "id": "gemnasium",
-          "name": "Gemnasium"
-        },
-        "location": {
-          "file": "app/requirements.txt",
-          "dependency": {
-            "package": {
-              "name": "Django"
-            },
-            "version": "1.11.3"
-          }
-        },
-        "identifiers": [
-          {
-            "type": "gemnasium",
-            "name": "Gemnasium-6162a015-8635-4a15-8d7c-dc9321db366f",
-            "value": "6162a015-8635-4a15-8d7c-dc9321db366f",
-            "url": "https://deps.sec.gitlab.com/packages/pypi/Django/versions/1.11.3/advisories"
-          },
-          {
-            "type": "cve",
-            "name": "CVE-2017-12794",
-            "value": "CVE-2017-12794",
-            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12794"
-          }
-        ],
-        "links": [
-          {
-            "url": "https://www.djangoproject.com/weblog/2017/sep/05/security-releases/"
-          }
-        ],
-        "priority": "Unknown",
-        "file": "app/requirements.txt",
-        "url": "https://www.djangoproject.com/weblog/2017/sep/05/security-releases/",
-        "tool": "gemnasium"
-      },
-      {
-        "category": "dependency_scanning",
-        "message": "Directory traversal vulnerability in rubyzip",
-        "cve": "Gemfile.lock:rubyzip:cve:CVE-2017-5946",
-        "severity": "High",
-        "solution": "upgrade to \u003e= 1.2.1",
-        "scanner": {
-          "id": "bundler_audit",
-          "name": "bundler-audit"
-        },
-        "location": {
-          "file": "Gemfile.lock",
-          "dependency": {
-            "package": {
-              "name": "rubyzip"
-            },
-            "version": "1.2.0"
-          }
-        },
-        "identifiers": [
-          {
-            "type": "cve",
-            "name": "CVE-2017-5946",
-            "value": "CVE-2017-5946",
-            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5946"
-          }
-        ],
-        "links": [
-          {
-            "url": "https://github.com/rubyzip/rubyzip/issues/315"
-          }
-        ]
-      },
-      {
-        "category": "dependency_scanning",
-        "name": "ffi - CVE-2018-1000201",
-        "message": "ruby-ffi DDL loading issue on Windows OS",
-        "cve": "ffi:1.9.18:CVE-2018-1000201",
-        "severity": "High",
-        "solution": "upgrade to \u003e= 1.9.24",
-        "scanner": {
-          "id": "bundler_audit",
-          "name": "bundler-audit"
-        },
-        "location": {
-          "file": "sast-sample-rails/Gemfile.lock",
-          "dependency": {
-            "package": {
-              "name": "ffi"
-            },
-            "version": "1.9.18"
-          }
-        },
-        "identifiers": [
-          {
-            "type": "cve",
-            "name": "CVE-2018-1000201",
-            "value": "CVE-2018-1000201",
-            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000201"
-          }
-        ],
-        "links": [
-          {
-            "url": "https://github.com/ffi/ffi/releases/tag/1.9.24"
-          }
-        ],
-        "priority": "High",
-        "file": "sast-sample-rails/Gemfile.lock",
-        "url": "https://github.com/ffi/ffi/releases/tag/1.9.24",
-        "tool": "bundler_audit"
-      }
-    ]
-  }
\ No newline at end of file
diff --git a/ee/spec/fixtures/security_reports/feature-branch/gl-dependency-scanning-report.json b/ee/spec/fixtures/security_reports/feature-branch/gl-dependency-scanning-report.json
index 8555be6618ce6980e94443fcaf76938b78b570e0..f8d92ce586b44fa6c6783b29a172ac3946b118b8 100644
--- a/ee/spec/fixtures/security_reports/feature-branch/gl-dependency-scanning-report.json
+++ b/ee/spec/fixtures/security_reports/feature-branch/gl-dependency-scanning-report.json
@@ -97,47 +97,36 @@
     },
     {
       "category": "dependency_scanning",
-      "name": "nokogiri - USN-3424-1",
-      "message": "Vulnerabilities in libxml2",
-      "cve": "rails/Gemfile.lock:nokogiri@1.8.0:USN-3424-1",
-      "severity": "Unknown",
-      "solution": "Upgrade to latest version.",
+      "message": "Directory traversal vulnerability in rubyzip",
+      "cve": "Gemfile.lock:rubyzip:cve:CVE-2017-5946",
+      "severity": "High",
+      "solution": "upgrade to \u003e= 1.2.1",
       "scanner": {
-        "id": "gemnasium",
-        "name": "Gemnasium"
+        "id": "bundler_audit",
+        "name": "bundler-audit"
       },
       "location": {
-        "file": "rails/Gemfile.lock",
+        "file": "Gemfile.lock",
         "dependency": {
           "package": {
-            "name": "nokogiri"
+            "name": "rubyzip"
           },
-          "version": "1.8.0"
+          "version": "1.2.0"
         }
       },
       "identifiers": [
         {
-          "type": "gemnasium",
-          "name": "Gemnasium-06565b64-486d-4326-b906-890d9915804d",
-          "value": "06565b64-486d-4326-b906-890d9915804d",
-          "url": "https://deps.sec.gitlab.com/packages/gem/nokogiri/versions/1.8.0/advisories"
-        },
-        {
-          "type": "usn",
-          "name": "USN-3424-1",
-          "value": "USN-3424-1",
-          "url": "https://usn.ubuntu.com/3424-1/"
+          "type": "cve",
+          "name": "CVE-2017-5946",
+          "value": "CVE-2017-5946",
+          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5946"
         }
       ],
       "links": [
         {
-          "url": "https://github.com/sparklemotion/nokogiri/issues/1673"
+          "url": "https://github.com/rubyzip/rubyzip/issues/315"
         }
-      ],
-      "priority": "Unknown",
-      "file": "rails/Gemfile.lock",
-      "url": "https://github.com/sparklemotion/nokogiri/issues/1673",
-      "tool": "gemnasium"
+      ]
     },
     {
       "category": "dependency_scanning",