Introducing Socket Firewall: Free, Proactive Protection for Your Software Supply Chain.Learn More
Socket
Book a DemoInstallSign in
Socket

@dynatrace-sdk/client-vulnerabilities

Package Overview
Dependencies
Maintainers
3
Versions
6
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@dynatrace-sdk/client-vulnerabilities

[![npm](https://img.shields.io/badge/npm-v1.7.1-blue)](https://www.npmjs.com/package/@dynatrace-sdk/client-vulnerabilities/v/1.7.1) [![License](https://img.shields.io/badge/License-Apache_2.0-blue.svg)](https://opensource.org/licenses/Apache-2.0)

latest
npmnpm
Version
1.7.1
Version published
Maintainers
3
Created
Source

@dynatrace-sdk/client-vulnerabilities

npm License

APIs that manage vulnerability related information.

Installation

npm install @dynatrace-sdk/client-vulnerabilities

Getting help

License

This SDK is distributed under the Apache License, Version 2.0, see LICENSE for more information.

API reference

Full API reference for the latest version of the SDK is also available at the Dynatrace Developer.

davisClient

import { davisClient } from '@dynatrace-sdk/client-vulnerabilities';

listDavisSecurityRecommendations

davisClient.listDavisSecurityRecommendations(config): Promise<DavisSecurityRecommendations>

List davis security recommendations

Required scope: vulnerability-service:vulnerabilities:read

This endpoint allows users to query davis security recommendations. Note that users also need permissions to read security events (see storage:security.events:read, storage:events:read and storage:buckets:read).

Parameters

NameTypeDescription
config.endTimestring

The end of the requested timeframe.
Only now is supported.

config.startTimestring

The start of the requested timeframe.
It can't be in the future and the minimum time window has to be 30 minutes i.e. end-time - 30 minutes

You can use one of the following formats:

  • Absolute timestamps, conforming to ISO 8601 i.e. YYYY-MM-DD”T”HH:MM:SS.ssssss”Z”. If no time zone is specified, UTC is used.
  • Relative timeframe, back from now. The format is now-NU, where N is the amount of time and U is the unit of time.
    Supported time units for the relative timeframe are:
    • s: seconds
    • m: minutes
    • h: hours
    • d: days

Returns

Return typeStatus codeDescription
DavisSecurityRecommendations200An array of davis security recommendations

Throws

Error TypeError Message
BadRequestMalformed request or invalid parameters.
UnauthorizedInsufficient permissions.
ForbiddenAccess denied.
NotFoundResource not found.
TooManyRequestsToo many requests.
InternalServerErrorThere is a problem in the backend.
NotImplementedNot implemented.
ServiceUnavailableService Unavailable.
Code example
import { davisClient } from "@dynatrace-sdk/client-vulnerabilities";

const data =
  await davisClient.listDavisSecurityRecommendations();

listDavisSecurityRecommendationsWithSegments

davisClient.listDavisSecurityRecommendationsWithSegments(config): Promise<DavisSecurityRecommendations>

List davis security recommendations with a segment filter

Required scope: vulnerability-service:vulnerabilities:read

This endpoint allows users to query davis security recommendations. Note that users also need permissions to read security events (see storage:security.events:read, storage:events:read and storage:buckets:read).

Parameters

NameTypeDescription
config.body*requiredSegmentRequestBody
config.endTimestring

The end of the requested timeframe.
Only now is supported.

config.startTimestring

The start of the requested timeframe.
It can't be in the future and the minimum time window has to be 30 minutes i.e. end-time - 30 minutes

You can use one of the following formats:

  • Absolute timestamps, conforming to ISO 8601 i.e. YYYY-MM-DD”T”HH:MM:SS.ssssss”Z”. If no time zone is specified, UTC is used.
  • Relative timeframe, back from now. The format is now-NU, where N is the amount of time and U is the unit of time.
    Supported time units for the relative timeframe are:
    • s: seconds
    • m: minutes
    • h: hours
    • d: days

Returns

Return typeStatus codeDescription
DavisSecurityRecommendations200An array of davis security recommendations

Throws

Error TypeError Message
BadRequestMalformed request or invalid parameters.
UnauthorizedInsufficient permissions.
ForbiddenAccess denied.
NotFoundResource not found.
TooManyRequestsToo many requests.
InternalServerErrorThere is a problem in the backend.
NotImplementedNot implemented.
ServiceUnavailableService Unavailable.
Code example
import { davisClient } from "@dynatrace-sdk/client-vulnerabilities";

const data =
  await davisClient.listDavisSecurityRecommendationsWithSegments(
    { body: {} },
  );

vulnerabilitiesClient

import { vulnerabilitiesClient } from '@dynatrace-sdk/client-vulnerabilities';

deleteTrackingLinksOfAffectedEntities

vulnerabilitiesClient.deleteTrackingLinksOfAffectedEntities(config): Promise<EditTrackingLinkResult>

Delete tracking links of certain affected entities

Required scope: vulnerability-service:vulnerabilities:write

This endpoint allows users to delete the tracking links of affected entities that are part of a vulnerability. Note that users are also required to have the role-based permission SECURITY_PROBLEM_MANAGE.

Parameters

NameTypeDescription
config.body*requiredDeleteTrackingLinksRequestBody
config.id*requiredstringThe ID of the related vulnerability.

Throws

Error TypeError Message
BadRequestMalformed request or invalid parameters.
UnauthorizedInsufficient permissions.
ForbiddenAccess denied.
NotFoundResource not found.
TooManyRequestsToo many requests.
InternalServerErrorThere is a problem in the backend.
NotImplementedNot implemented.
ServiceUnavailableService Unavailable.
Code example
import { vulnerabilitiesClient } from "@dynatrace-sdk/client-vulnerabilities";

const data =
  await vulnerabilitiesClient.deleteTrackingLinksOfAffectedEntities(
    { id: "...", body: { affectedEntityIds: {} } },
  );

getAffectedEntities

vulnerabilitiesClient.getAffectedEntities(config): Promise<AffectedEntities>

Get affected entities of a vulnerability

Required scope: vulnerability-service:vulnerabilities:read

This endpoint allows users to query details about the affected entities of a vulnerability. Note that users also need permissions to read security events (see storage:security.events:read, storage:events:read, and storage:buckets:read).

Parameters

NameTypeDescription
config.endTimestring

The end of the requested timeframe.
Only now is supported.

config.filterstring

The filter parameter, as explained here: This expression filters the returned affected entities. Generally, all fields can be used for filtering, except for the entryPoints field. Array fields can additionally be filtered by their number of elements by suffixing with .count: affectedProcesses.count, vulnerableFunctions.count.

config.id*requiredstringThe ID of the related vulnerability.
config.sortstring

The sort parameter, as explained here: Fields can be prefixed with - for descending order. If no prefix is specified, ascending order is used. Multiple fields can be concatenated using a comma as a separator (e.g. resolution.status,-name).

Generally, all fields with a single value can be used for sorting; array fields can only be sorted by their counts: affectedProcesses.count, vulnerableFunctions.count. The entryPoints field does not support sorting.

If this parameter is omitted, the affected entities are sorted by their id.

config.startTimestring

The start of the requested timeframe.
It can't be in the future and the minimum time window has to be 30 minutes i.e. end-time - 30 minutes

You can use one of the following formats:

  • Absolute timestamps, conforming to ISO 8601 i.e. YYYY-MM-DD”T”HH:MM:SS.ssssss”Z”. If no time zone is specified, UTC is used.
  • Relative timeframe, back from now. The format is now-NU, where N is the amount of time and U is the unit of time.
    Supported time units for the relative timeframe are:
    • s: seconds
    • m: minutes
    • h: hours
    • d: days

Returns

Return typeStatus codeDescription
AffectedEntities200The affected entities of the vulnerability

Throws

Error TypeError Message
BadRequestMalformed request or invalid parameters.
UnauthorizedInsufficient permissions.
ForbiddenAccess denied.
NotFoundResource not found.
TooManyRequestsToo many requests.
InternalServerErrorThere is a problem in the backend.
NotImplementedNot implemented.
ServiceUnavailableService Unavailable.
Code example
import { vulnerabilitiesClient } from "@dynatrace-sdk/client-vulnerabilities";

const data =
  await vulnerabilitiesClient.getAffectedEntities({
    id: "...",
  });

getAffectedEntitiesWithSegments

vulnerabilitiesClient.getAffectedEntitiesWithSegments(config): Promise<AffectedEntities>

Get affected entities of a vulnerability with a segment filter

Required scope: vulnerability-service:vulnerabilities:read

This endpoint allows users to query details about the affected entities of a vulnerability. Note that users also need permissions to read security events (see storage:security.events:read, storage:events:read and storage:buckets:read).

Parameters

NameTypeDescription
config.body*requiredSegmentRequestBody
config.endTimestring

The end of the requested timeframe.
Only now is supported.

config.filterstring

The filter parameter, as explained here: This expression filters the returned affected entities. Generally, all fields can be used for filtering, except for the entryPoints field. Array fields can additionally be filtered by their number of elements by suffixing with .count: affectedProcesses.count, vulnerableFunctions.count.

config.id*requiredstringThe ID of the related vulnerability.
config.sortstring

The sort parameter, as explained here: Fields can be prefixed with - for descending order. If no prefix is specified, ascending order is used. Multiple fields can be concatenated using a comma as a separator (e.g. resolution.status,-name).

Generally, all fields with a single value can be used for sorting; array fields can only be sorted by their counts: affectedProcesses.count, vulnerableFunctions.count. The entryPoints field does not support sorting.

If this parameter is omitted, the affected entities are sorted by their id.

config.startTimestring

The start of the requested timeframe.
It can't be in the future and the minimum time window has to be 30 minutes i.e. end-time - 30 minutes

You can use one of the following formats:

  • Absolute timestamps, conforming to ISO 8601 i.e. YYYY-MM-DD”T”HH:MM:SS.ssssss”Z”. If no time zone is specified, UTC is used.
  • Relative timeframe, back from now. The format is now-NU, where N is the amount of time and U is the unit of time.
    Supported time units for the relative timeframe are:
    • s: seconds
    • m: minutes
    • h: hours
    • d: days

Returns

Return typeStatus codeDescription
AffectedEntities200The affected entities of the vulnerability

Throws

Error TypeError Message
BadRequestMalformed request or invalid parameters.
UnauthorizedInsufficient permissions.
ForbiddenAccess denied.
NotFoundResource not found.
TooManyRequestsToo many requests.
InternalServerErrorThere is a problem in the backend.
NotImplementedNot implemented.
ServiceUnavailableService Unavailable.
Code example
import { vulnerabilitiesClient } from "@dynatrace-sdk/client-vulnerabilities";

const data =
  await vulnerabilitiesClient.getAffectedEntitiesWithSegments(
    { id: "...", body: {} },
  );

getDavisAssessment

vulnerabilitiesClient.getDavisAssessment(config): Promise<DavisAssessmentDetails>

Get the davis assessment of a vulnerability

Required scope: vulnerability-service:vulnerabilities:read

This endpoint allows users to query details about the davis assessment of a vulnerability. Note that users also need permissions to read security events (see storage:security.events:read, storage:events:read and storage:buckets:read).

Parameters

NameTypeDescription
config.endTimestring

The end of the requested timeframe.
Only now is supported.

config.id*requiredstringThe ID of the related vulnerability.
config.startTimestring

The start of the requested timeframe.
It can't be in the future and the minimum time window has to be 30 minutes i.e. end-time - 30 minutes

You can use one of the following formats:

  • Absolute timestamps, conforming to ISO 8601 i.e. YYYY-MM-DD”T”HH:MM:SS.ssssss”Z”. If no time zone is specified, UTC is used.
  • Relative timeframe, back from now. The format is now-NU, where N is the amount of time and U is the unit of time.
    Supported time units for the relative timeframe are:
    • s: seconds
    • m: minutes
    • h: hours
    • d: days

Returns

Return typeStatus codeDescription
DavisAssessmentDetails200The davis assessment

Throws

Error TypeError Message
BadRequestMalformed request or invalid parameters.
UnauthorizedInsufficient permissions.
ForbiddenAccess denied.
NotFoundResource not found.
TooManyRequestsToo many requests.
InternalServerErrorThere is a problem in the backend.
NotImplementedNot implemented.
ServiceUnavailableService Unavailable.
Code example
import { vulnerabilitiesClient } from "@dynatrace-sdk/client-vulnerabilities";

const data = await vulnerabilitiesClient.getDavisAssessment(
  { id: "..." },
);

getDavisAssessmentWithSegments

vulnerabilitiesClient.getDavisAssessmentWithSegments(config): Promise<DavisAssessmentDetails>

Get the davis assessment of a vulnerability with a segment filter

Required scope: vulnerability-service:vulnerabilities:read

This endpoint allows users to query details about the davis assessment of a vulnerability. Note that users also need permissions to read security events (see storage:security.events:read, storage:events:read and storage:buckets:read).

Parameters

NameTypeDescription
config.body*requiredSegmentRequestBody
config.endTimestring

The end of the requested timeframe.
Only now is supported.

config.id*requiredstringThe ID of the related vulnerability.
config.startTimestring

The start of the requested timeframe.
It can't be in the future and the minimum time window has to be 30 minutes i.e. end-time - 30 minutes

You can use one of the following formats:

  • Absolute timestamps, conforming to ISO 8601 i.e. YYYY-MM-DD”T”HH:MM:SS.ssssss”Z”. If no time zone is specified, UTC is used.
  • Relative timeframe, back from now. The format is now-NU, where N is the amount of time and U is the unit of time.
    Supported time units for the relative timeframe are:
    • s: seconds
    • m: minutes
    • h: hours
    • d: days

Returns

Return typeStatus codeDescription
DavisAssessmentDetails200The davis assessment

Throws

Error TypeError Message
BadRequestMalformed request or invalid parameters.
UnauthorizedInsufficient permissions.
ForbiddenAccess denied.
NotFoundResource not found.
TooManyRequestsToo many requests.
InternalServerErrorThere is a problem in the backend.
NotImplementedNot implemented.
ServiceUnavailableService Unavailable.
Code example
import { vulnerabilitiesClient } from "@dynatrace-sdk/client-vulnerabilities";

const data =
  await vulnerabilitiesClient.getDavisAssessmentWithSegments(
    { id: "...", body: {} },
  );

getVulnerability

vulnerabilitiesClient.getVulnerability(config): Promise<Vulnerability>

Get details of a vulnerability

Required scope: vulnerability-service:vulnerabilities:read

This endpoint allows users to query details about a single vulnerability. Note that users also need permissions to read security events (see storage:security.events:read, storage:events:read and storage:buckets:read).

Parameters

NameTypeDescription
config.endTimestring

The end of the requested timeframe.
Only now is supported.

config.id*requiredstringThe ID of the requested vulnerability.
config.startTimestring

The start of the requested timeframe.
It can't be in the future and the minimum time window has to be 30 minutes i.e. end-time - 30 minutes

You can use one of the following formats:

  • Absolute timestamps, conforming to ISO 8601 i.e. YYYY-MM-DD”T”HH:MM:SS.ssssss”Z”. If no time zone is specified, UTC is used.
  • Relative timeframe, back from now. The format is now-NU, where N is the amount of time and U is the unit of time.
    Supported time units for the relative timeframe are:
    • s: seconds
    • m: minutes
    • h: hours
    • d: days

Returns

Return typeStatus codeDescription
Vulnerability200The vulnerability

Throws

Error TypeError Message
BadRequestMalformed request or invalid parameters.
UnauthorizedInsufficient permissions.
ForbiddenAccess denied.
NotFoundResource not found.
TooManyRequestsToo many requests.
InternalServerErrorThere is a problem in the backend.
NotImplementedNot implemented.
ServiceUnavailableService Unavailable.
Code example
import { vulnerabilitiesClient } from "@dynatrace-sdk/client-vulnerabilities";

const data = await vulnerabilitiesClient.getVulnerability({
  id: "...",
});

getVulnerabilityWithSegments

vulnerabilitiesClient.getVulnerabilityWithSegments(config): Promise<Vulnerability>

Get details of a vulnerability with a segment filter

Required scope: vulnerability-service:vulnerabilities:read

This endpoint allows users to query details about a single vulnerability. Note that users also need permissions to read security events (see storage:security.events:read, storage:events:read and storage:buckets:read).

Parameters

NameTypeDescription
config.body*requiredSegmentRequestBody
config.endTimestring

The end of the requested timeframe.
Only now is supported.

config.id*requiredstringThe ID of the requested vulnerability.
config.startTimestring

The start of the requested timeframe.
It can't be in the future and the minimum time window has to be 30 minutes i.e. end-time - 30 minutes

You can use one of the following formats:

  • Absolute timestamps, conforming to ISO 8601 i.e. YYYY-MM-DD”T”HH:MM:SS.ssssss”Z”. If no time zone is specified, UTC is used.
  • Relative timeframe, back from now. The format is now-NU, where N is the amount of time and U is the unit of time.
    Supported time units for the relative timeframe are:
    • s: seconds
    • m: minutes
    • h: hours
    • d: days

Returns

Return typeStatus codeDescription
Vulnerability200The vulnerability

Throws

Error TypeError Message
BadRequestMalformed request or invalid parameters.
UnauthorizedInsufficient permissions.
ForbiddenAccess denied.
NotFoundResource not found.
TooManyRequestsToo many requests.
InternalServerErrorThere is a problem in the backend.
NotImplementedNot implemented.
ServiceUnavailableService Unavailable.
Code example
import { vulnerabilitiesClient } from "@dynatrace-sdk/client-vulnerabilities";

const data =
  await vulnerabilitiesClient.getVulnerabilityWithSegments({
    id: "...",
    body: {},
  });

listVulnerabilities

vulnerabilitiesClient.listVulnerabilities(config): Promise<Vulnerabilities>

List vulnerabilities

Required scope: vulnerability-service:vulnerabilities:read

This endpoint allows users to query vulnerabilities. Note that users also need permissions to read security events (see storage:security.events:read, storage:events:read and storage:buckets:read).

Parameters

NameTypeDescription
config.endTimestring

The end of the requested timeframe.
Only now is supported.

config.filterstring

The filter parameter, as explained here: This expression filters the returned vulnerabilities. Generally, all fields can be used for filtering. affectedEntities can only be filtered by affectedEntities.count. vulnerableComponents only supports the contains operator, requiring exact matches within any of the vulnerable component values.

config.sortstring

The sort parameter, as explained here: Fields can be prefixed with - for descending order. If no prefix is specified, ascending order is used. Multiple fields can be concatenated using a comma as a separator (e.g. resolution.status,-technology).

Generally, all fields with a single value can be used for sorting; however, sorting by fields with array values such as references.cve isn't possible. affectedEntities can only be sorted by affectedEntities.count.

If this parameter is omitted, the vulnerabilities are sorted by their ids.

config.startTimestring

The start of the requested timeframe.
It can't be in the future and the minimum time window has to be 30 minutes i.e. end-time - 30 minutes

You can use one of the following formats:

  • Absolute timestamps, conforming to ISO 8601 i.e. YYYY-MM-DD”T”HH:MM:SS.ssssss”Z”. If no time zone is specified, UTC is used.
  • Relative timeframe, back from now. The format is now-NU, where N is the amount of time and U is the unit of time.
    Supported time units for the relative timeframe are:
    • s: seconds
    • m: minutes
    • h: hours
    • d: days

Returns

Return typeStatus codeDescription
Vulnerabilities200An array of vulnerabilities

Throws

Error TypeError Message
BadRequestMalformed request or invalid parameters.
UnauthorizedInsufficient permissions.
ForbiddenAccess denied.
NotFoundResource not found.
TooManyRequestsToo many requests.
InternalServerErrorThere is a problem in the backend.
NotImplementedNot implemented.
ServiceUnavailableService Unavailable.
Code example
import { vulnerabilitiesClient } from "@dynatrace-sdk/client-vulnerabilities";

const data =
  await vulnerabilitiesClient.listVulnerabilities();

listVulnerabilitiesWithSegments

vulnerabilitiesClient.listVulnerabilitiesWithSegments(config): Promise<Vulnerabilities>

List vulnerabilities with a segment filter

Required scope: vulnerability-service:vulnerabilities:read

This endpoint allows users to query vulnerabilities. Note that users also need permissions to read security events (see storage:security.events:read, storage:events:read and storage:buckets:read).

Parameters

NameTypeDescription
config.body*requiredSegmentRequestBody
config.endTimestring

The end of the requested timeframe.
Only now is supported.

config.filterstring

The filter parameter, as explained here: This expression filters the returned vulnerabilities. Generally, all fields can be used for filtering. affectedEntities can only be filtered by affectedEntities.count. vulnerableComponents only supports the contains operator, requiring exact matches within any of the vulnerable component values.

config.sortstring

The sort parameter, as explained here: Fields can be prefixed with - for descending order. If no prefix is specified, ascending order is used. Multiple fields can be concatenated using a comma as a separator (e.g. resolution.status,-technology).

Generally, all fields with a single value can be used for sorting; however, sorting by fields with array values such as references.cve isn't possible. affectedEntities can only be sorted by affectedEntities.count.

If this parameter is omitted, the vulnerabilities are sorted by their ids.

config.startTimestring

The start of the requested timeframe.
It can't be in the future and the minimum time window has to be 30 minutes i.e. end-time - 30 minutes

You can use one of the following formats:

  • Absolute timestamps, conforming to ISO 8601 i.e. YYYY-MM-DD”T”HH:MM:SS.ssssss”Z”. If no time zone is specified, UTC is used.
  • Relative timeframe, back from now. The format is now-NU, where N is the amount of time and U is the unit of time.
    Supported time units for the relative timeframe are:
    • s: seconds
    • m: minutes
    • h: hours
    • d: days

Returns

Return typeStatus codeDescription
Vulnerabilities200An array of vulnerabilities

Throws

Error TypeError Message
BadRequestMalformed request or invalid parameters.
UnauthorizedInsufficient permissions.
ForbiddenAccess denied.
NotFoundResource not found.
TooManyRequestsToo many requests.
InternalServerErrorThere is a problem in the backend.
NotImplementedNot implemented.
ServiceUnavailableService Unavailable.
Code example
import { vulnerabilitiesClient } from "@dynatrace-sdk/client-vulnerabilities";

const data =
  await vulnerabilitiesClient.listVulnerabilitiesWithSegments(
    { body: {} },
  );

muteAffectedEntities

vulnerabilitiesClient.muteAffectedEntities(config): Promise<MutingResult>

Change the mute status of certain affected entities

Required scope: vulnerability-service:vulnerabilities:write

This endpoint allows users to mute or unmute affected entities that are part of a vulnerability. Note that users are also required to have the role-based permission SECURITY_PROBLEM_MANAGE.

Parameters

NameTypeDescription
config.body*requiredMutingRequestBody
config.id*requiredstringThe ID of the related vulnerability.

Throws

Error TypeError Message
BadRequestMalformed request or invalid parameters.
UnauthorizedInsufficient permissions.
ForbiddenAccess denied.
NotFoundResource not found.
TooManyRequestsToo many requests.
InternalServerErrorThere is a problem in the backend.
NotImplementedNot implemented.
ServiceUnavailableService Unavailable.
Code example
import { vulnerabilitiesClient } from "@dynatrace-sdk/client-vulnerabilities";

const data =
  await vulnerabilitiesClient.muteAffectedEntities({
    id: "...",
    body: {
      affectedEntityIds: {},
      reason: "FALSE_POSITIVE",
    },
  });

setTrackingLinksOfAffectedEntities

vulnerabilitiesClient.setTrackingLinksOfAffectedEntities(config): Promise<EditTrackingLinkResult>

Set tracking links of certain affected entities

Required scope: vulnerability-service:vulnerabilities:write

This endpoint allows users to set the tracking links of affected entities that are part of a vulnerability. Note that users are also required to have the role-based permission SECURITY_PROBLEM_MANAGE.

Parameters

NameTypeDescription
config.body*requiredSetTrackingLinksRequestBody
config.id*requiredstringThe ID of the related vulnerability.

Throws

Error TypeError Message
BadRequestMalformed request or invalid parameters.
UnauthorizedInsufficient permissions.
ForbiddenAccess denied.
NotFoundResource not found.
TooManyRequestsToo many requests.
InternalServerErrorThere is a problem in the backend.
NotImplementedNot implemented.
ServiceUnavailableService Unavailable.
Code example
import { vulnerabilitiesClient } from "@dynatrace-sdk/client-vulnerabilities";

const data =
  await vulnerabilitiesClient.setTrackingLinksOfAffectedEntities(
    {
      id: "...",
      body: {
        affectedEntityIds: {},
        trackingLink: { url: "...", text: "..." },
      },
    },
  );

Types

AffectedCounts

NameType
count*requirednumber

AffectedEntities

A list of affected entities.

NameType
affectedEntities*requiredArray<AffectedEntity>

AffectedEntitiesActionResult

NameType
affectedEntityId*requiredstring
httpStatusCode*requirednumber
messagestring

AffectedEntity

Contains detailed information about an affected entity and the related vulnerability.

NameTypeDescription
affectedProcesses*requiredArray<string>
cvssCvss
davisAssessment*requiredDavisAssessment
entryPointsArray<EntryPoint>
id*requiredstring
muteMuteDetails
name*requiredstring
resolution*requiredResolution
risk*requiredRisk
trackingLinkTrackingLink
type*required"PROCESS_GROUP" | "HOST" | "KUBERNETES_NODE"
vulnerableComponentVulnerableComponent
vulnerableFunctions*requiredVulnerableFunctionsA list of vulnerable functions in use.

AffectedEntityStatistics

NameType
affectedProcesses*requiredAffectedCounts
count*requirednumber
hosts*requiredAffectedCounts
kubernetesNodes*requiredAffectedCounts
processGroups*requiredAffectedCounts
types*requiredArray<string>

AssessmentModeDetails

NameType
reasons*requiredArray<"LIMITED_BY_CONFIGURATION" | "LIMITED_AGENT_SUPPORT">
status*required"NOT_AVAILABLE" | "REDUCED" | "FULL"

CodeLocation

NameType
name*requiredstring

ConstraintViolation

Contains information about a constraint violation caused by invalid input.

NameTypeDescription
message*requiredstringThe constraint violation description message
pathstringThe path of the parameter that caused the constraint violation

Cvss

NameType
baseScore*requirednumber
vector*requiredstring
version*requiredstring

DataAssetsAssessment

NameType
reachableDataAssets*requiredArray<string>
status*required"NOT_AVAILABLE" | "NOT_DETECTED" | "REACHABLE"

DavisAssessment

NameType
assessmentMode*required"NOT_AVAILABLE" | "REDUCED" | "FULL"
dataAssetsStatus*required"NOT_AVAILABLE" | "NOT_DETECTED" | "REACHABLE"
exploitStatus*required"NOT_AVAILABLE" | "AVAILABLE"
exposureStatus*required"NOT_AVAILABLE" | "NOT_DETECTED" | "PUBLIC_NETWORK"
level*required"NONE" | "LOW" | "MEDIUM" | "HIGH" | "CRITICAL"
score*requirednumber
vectorstring
vulnerableFunctionStatus*required"NOT_AVAILABLE" | "NOT_IN_USE" | "IN_USE"

DavisAssessmentDetails

NameType
assessmentMode*requiredAssessmentModeDetails
dataAssetsAssessment*requiredDataAssetsAssessment
exploitAssessment*requiredExploitAssessment
exposureAssessment*requiredExposureAssessment
vulnerabilityId*requiredstring
vulnerableFunctionAssessment*requiredVulnerableFunctionAssessment

DavisSecurityRecommendation

NameType
action*required"UPGRADE"
componentName*requiredstring
filter*requiredstring
highestRiskLevel*required"NONE" | "LOW" | "MEDIUM" | "HIGH" | "CRITICAL"
highestRiskLevelVulnerabilities*requirednumber
packageNamestring
technology*required"DOTNET" | "GO" | "JAVA" | "KUBERNETES" | "NODE_JS" | "PHP" | "PYTHON"
totalVulnerabilities*requirednumber

DavisSecurityRecommendations

NameType
recommendations*requiredArray<DavisSecurityRecommendation>

DeleteTrackingLinksRequestBody

Input parameters for deleting tracking links of affected entities.

NameType
affectedEntityIds*requiredAffectedEntityIds

EditTrackingLinkResult

NameType
results*requiredArray<AffectedEntitiesActionResult>

EntryPoint

NameType
functionEntryPointFunction
payload*requiredstring
url*requiredEntryPointUrl
userControlledInputs*requiredArray<UserControlledInput>

EntryPointFunction

NameType
name*requiredstring

EntryPointUrl

NameType
path*requiredstring

ErrorDetails

Optional details of the error

NameTypeDescription
constraintViolationsArray<ConstraintViolation>A list of constraint violations of input parameters (path, query, request body)
errorRefstringReference to the error occurrence in the internal self-monitoring, logging, etc.

ErrorEnvelope

NameTypeDescription
error*requiredHttpErrorStandard error response

ExploitAssessment

NameType
status*required"NOT_AVAILABLE" | "AVAILABLE"

ExposureAssessment

NameType
status*required"NOT_AVAILABLE" | "NOT_DETECTED" | "PUBLIC_NETWORK"

FilterSegment

Use filter segments to define the considered affected entities. For more information see the documentation.

NameType
id*requiredstring
variablesArray<FilterSegmentVariable>

FilterSegmentVariable

NameType
name*requiredstring
values*requiredArray<string>

HttpError

Standard error response

NameTypeDescription
code*requirednumberThe error code (HTTP response)
detailsErrorDetailsOptional details of the error
message*requiredstringThe error code (HTTP response)
retryAfterSecondsnumberThe time after which the request can be retried, in case it was throttled

KnownExploitedVulnerabilityDetails

NameType
dueDateDate
isInCatalog*requiredboolean

Mute

NameType
status*required"MUTED" | "NOT_MUTED"

MuteDetails

NameType
changeDatestring
commentstring
reason"FALSE_POSITIVE" | "IGNORE" | "AFFECTED" | "CONFIGURATION_NOT_AFFECTED" | "OTHER"
status*required"MUTED" | "NOT_MUTED"
userstring

MutingRequestBody

Input parameters for muting affected entities.

NameType
affectedEntityIds*requiredAffectedEntityIds
commentstring
reason*required"FALSE_POSITIVE" | "IGNORE" | "AFFECTED" | "CONFIGURATION_NOT_AFFECTED" | "OTHER"

MutingResult

NameType
results*requiredArray<AffectedEntitiesActionResult>

References

NameType
cve*requiredArray<string>
cwe*requiredArray<string>
owasp*requiredArray<string>

Remediation

NameType
description*requiredstring

Resolution

NameType
changeDatestring
status*required"OPEN" | "RESOLVED"

Risk

NameType
level*required"NONE" | "LOW" | "MEDIUM" | "HIGH" | "CRITICAL"
score*requirednumber

SegmentRequestBody

NameType
filterSegmentsArray<FilterSegment>

SetTrackingLinksRequestBody

Input parameters for setting tracking links of affected entities.

NameType
affectedEntityIds*requiredAffectedEntityIds
trackingLink*requiredTrackingLink
NameTypeDescription
text*requiredstringThe tracking link text set for the affected entities, e.g. 'ISSUE-123'.
url*requiredstringThe tracking link URL set for the affected entities, e.g. https://example.com/ISSUE-123. Note that only valid URLs with 'http' or 'https' protocols are supported.
Pattern: ^(https?:).*$

UserControlledInput

NameType
isMalicious*requiredboolean
keystring
payload*requiredUserControlledInputPayload
typestring
valuestring

UserControlledInputPayload

NameType
end*requirednumber
start*requirednumber

Vulnerabilities

A list of vulnerabilities.

NameTypeDescription
vulnerabilities*requiredArray<Vulnerability>A list of vulnerabilities.

Vulnerability

Contains detailed information about the particular vulnerability. For information on the properties see our documentation.

NameTypeDescription
affectedEntities*requiredAffectedEntityStatistics
codeLocationCodeLocation
cvssCvss
davisAssessment*requiredDavisAssessment
description*requiredstring
displayId*requiredstring
externalIdstringExternal provider's unique identifier for the vulnerability. Example: SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-30646
id*requiredstring
isFixAvailable*requiredboolean
kevKnownExploitedVulnerabilityDetails
mute*requiredMute
references*requiredReferences
remediationRemediation
resolution*requiredResolution
risk*requiredRisk
stack*required"CODE" | "CODE_LIBRARY" | "SOFTWARE" | "CONTAINER_ORCHESTRATION"
technology*required"DOTNET" | "GO" | "JAVA" | "KUBERNETES" | "NODE_JS" | "PHP" | "PYTHON"
title*requiredstring
trackingLinkCoveragePercentage*requirednumber

Percent of affected entities that have a tracking link assigned. 100% coverage means that every affected entity has a tracking link assigned. Examples: [ 80.5, 30.5 ]

type*requiredstring
vulnerableComponents*requiredArray<VulnerableComponent>A list of all vulnerable components.

VulnerableComponent

NameType
id*requiredstring
name*requiredstring
packageNamestring
shortName*requiredstring
versionstring

VulnerableFunction

NameType
function*requiredstring
inUseProcessGroups*requiredArray<string>
notAvailableProcessGroups*requiredArray<string>
notInUseProcessGroups*requiredArray<string>
status*required"NOT_AVAILABLE" | "NOT_IN_USE" | "IN_USE"

VulnerableFunctionAssessment

NameType
status*required"NOT_AVAILABLE" | "NOT_IN_USE" | "IN_USE"
vulnerableFunctions*requiredArray<VulnerableFunction>

Enums

AffectedEntityType

⚠️ Deprecated Use literal values.

Enum keys

Host | KubernetesNode | ProcessGroup

AssessmentMode

⚠️ Deprecated Use literal values.

Enum keys

Full | NotAvailable | Reduced

AssessmentModeReason

⚠️ Deprecated Use literal values.

Enum keys

LimitedAgentSupport | LimitedByConfiguration

DataAssetsStatus

⚠️ Deprecated Use literal values.

Enum keys

NotAvailable | NotDetected | Reachable

DavisSecurityRecommendationAction

⚠️ Deprecated Use literal values.

Enum keys

Upgrade

ExploitStatus

⚠️ Deprecated Use literal values.

Enum keys

Available | NotAvailable

ExposureStatus

⚠️ Deprecated Use literal values.

Enum keys

NotAvailable | NotDetected | PublicNetwork

MuteReason

⚠️ Deprecated Use literal values.

Enum keys

Affected | ConfigurationNotAffected | FalsePositive | Ignore | Other

MuteStatus

⚠️ Deprecated Use literal values.

Enum keys

Muted | NotMuted

RiskLevel

⚠️ Deprecated Use literal values.

Enum keys

Critical | High | Low | Medium | None

Stack

⚠️ Deprecated Use literal values.

Enum keys

Code | CodeLibrary | ContainerOrchestration | Software

Status

⚠️ Deprecated Use literal values.

Enum keys

Open | Resolved

Technology

⚠️ Deprecated Use literal values.

Enum keys

Dotnet | Go | Java | Kubernetes | NodeJs | Php | Python

VulnerableFunctionStatus

⚠️ Deprecated Use literal values.

Enum keys

InUse | NotAvailable | NotInUse

FAQs

Package last updated on 09 Sep 2025

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts