
Research
/Security News
Weaponizing Discord for Command and Control Across npm, PyPI, and RubyGems.org
Socket researchers uncover how threat actors weaponize Discord across the npm, PyPI, and RubyGems ecosystems to exfiltrate sensitive data.
@dynatrace-sdk/client-vulnerabilities
Advanced tools
[](https://www.npmjs.com/package/@dynatrace-sdk/client-vulnerabilities/v/1.7.1) [](https://opensource.org/licenses/Apache-2.0)
APIs that manage vulnerability related information.
npm install @dynatrace-sdk/client-vulnerabilities
This SDK is distributed under the Apache License, Version 2.0, see LICENSE for more information.
Full API reference for the latest version of the SDK is also available at the Dynatrace Developer.
import { davisClient } from '@dynatrace-sdk/client-vulnerabilities';
List davis security recommendations
Required scope: vulnerability-service:vulnerabilities:read
This endpoint allows users to query davis security recommendations.
Note that users also need permissions to read security events (see storage:security.events:read
, storage:events:read
and storage:buckets:read
).
Name | Type | Description |
---|---|---|
config.endTime | string | The end of the requested timeframe. |
config.startTime | string | The start of the requested timeframe. You can use one of the following formats:
|
Return type | Status code | Description |
---|---|---|
DavisSecurityRecommendations | 200 | An array of davis security recommendations |
Error Type | Error Message |
---|---|
BadRequest | Malformed request or invalid parameters. |
Unauthorized | Insufficient permissions. |
Forbidden | Access denied. |
NotFound | Resource not found. |
TooManyRequests | Too many requests. |
InternalServerError | There is a problem in the backend. |
NotImplemented | Not implemented. |
ServiceUnavailable | Service Unavailable. |
import { davisClient } from "@dynatrace-sdk/client-vulnerabilities";
const data =
await davisClient.listDavisSecurityRecommendations();
List davis security recommendations with a segment filter
Required scope: vulnerability-service:vulnerabilities:read
This endpoint allows users to query davis security recommendations.
Note that users also need permissions to read security events (see storage:security.events:read
, storage:events:read
and storage:buckets:read
).
Name | Type | Description |
---|---|---|
config.body*required | SegmentRequestBody | |
config.endTime | string | The end of the requested timeframe. |
config.startTime | string | The start of the requested timeframe. You can use one of the following formats:
|
Return type | Status code | Description |
---|---|---|
DavisSecurityRecommendations | 200 | An array of davis security recommendations |
Error Type | Error Message |
---|---|
BadRequest | Malformed request or invalid parameters. |
Unauthorized | Insufficient permissions. |
Forbidden | Access denied. |
NotFound | Resource not found. |
TooManyRequests | Too many requests. |
InternalServerError | There is a problem in the backend. |
NotImplemented | Not implemented. |
ServiceUnavailable | Service Unavailable. |
import { davisClient } from "@dynatrace-sdk/client-vulnerabilities";
const data =
await davisClient.listDavisSecurityRecommendationsWithSegments(
{ body: {} },
);
import { vulnerabilitiesClient } from '@dynatrace-sdk/client-vulnerabilities';
Delete tracking links of certain affected entities
Required scope: vulnerability-service:vulnerabilities:write
This endpoint allows users to delete the tracking links of affected entities that are part of a vulnerability.
Note that users are also required to have the role-based permission SECURITY_PROBLEM_MANAGE
.
Name | Type | Description |
---|---|---|
config.body*required | DeleteTrackingLinksRequestBody | |
config.id*required | string | The ID of the related vulnerability. |
Error Type | Error Message |
---|---|
BadRequest | Malformed request or invalid parameters. |
Unauthorized | Insufficient permissions. |
Forbidden | Access denied. |
NotFound | Resource not found. |
TooManyRequests | Too many requests. |
InternalServerError | There is a problem in the backend. |
NotImplemented | Not implemented. |
ServiceUnavailable | Service Unavailable. |
import { vulnerabilitiesClient } from "@dynatrace-sdk/client-vulnerabilities";
const data =
await vulnerabilitiesClient.deleteTrackingLinksOfAffectedEntities(
{ id: "...", body: { affectedEntityIds: {} } },
);
Get affected entities of a vulnerability
Required scope: vulnerability-service:vulnerabilities:read
This endpoint allows users to query details about the affected entities of a vulnerability.
Note that users also need permissions to read security events (see storage:security.events:read
, storage:events:read
,
and storage:buckets:read
).
Name | Type | Description |
---|---|---|
config.endTime | string | The end of the requested timeframe. |
config.filter | string | The filter parameter, as explained here: This expression filters the returned affected entities. Generally, all fields can be used for filtering, except for the |
config.id*required | string | The ID of the related vulnerability. |
config.sort | string | The sort parameter, as explained here: Fields can be prefixed with Generally, all fields with a single value can be used for sorting; array fields can only be sorted by their counts: If this parameter is omitted, the affected entities are sorted by their id. |
config.startTime | string | The start of the requested timeframe. You can use one of the following formats:
|
Return type | Status code | Description |
---|---|---|
AffectedEntities | 200 | The affected entities of the vulnerability |
Error Type | Error Message |
---|---|
BadRequest | Malformed request or invalid parameters. |
Unauthorized | Insufficient permissions. |
Forbidden | Access denied. |
NotFound | Resource not found. |
TooManyRequests | Too many requests. |
InternalServerError | There is a problem in the backend. |
NotImplemented | Not implemented. |
ServiceUnavailable | Service Unavailable. |
import { vulnerabilitiesClient } from "@dynatrace-sdk/client-vulnerabilities";
const data =
await vulnerabilitiesClient.getAffectedEntities({
id: "...",
});
Get affected entities of a vulnerability with a segment filter
Required scope: vulnerability-service:vulnerabilities:read
This endpoint allows users to query details about the affected entities of a vulnerability.
Note that users also need permissions to read security events (see storage:security.events:read
, storage:events:read
and storage:buckets:read
).
Name | Type | Description |
---|---|---|
config.body*required | SegmentRequestBody | |
config.endTime | string | The end of the requested timeframe. |
config.filter | string | The filter parameter, as explained here: This expression filters the returned affected entities. Generally, all fields can be used for filtering, except for the |
config.id*required | string | The ID of the related vulnerability. |
config.sort | string | The sort parameter, as explained here: Fields can be prefixed with Generally, all fields with a single value can be used for sorting; array fields can only be sorted by their counts: If this parameter is omitted, the affected entities are sorted by their id. |
config.startTime | string | The start of the requested timeframe. You can use one of the following formats:
|
Return type | Status code | Description |
---|---|---|
AffectedEntities | 200 | The affected entities of the vulnerability |
Error Type | Error Message |
---|---|
BadRequest | Malformed request or invalid parameters. |
Unauthorized | Insufficient permissions. |
Forbidden | Access denied. |
NotFound | Resource not found. |
TooManyRequests | Too many requests. |
InternalServerError | There is a problem in the backend. |
NotImplemented | Not implemented. |
ServiceUnavailable | Service Unavailable. |
import { vulnerabilitiesClient } from "@dynatrace-sdk/client-vulnerabilities";
const data =
await vulnerabilitiesClient.getAffectedEntitiesWithSegments(
{ id: "...", body: {} },
);
Get the davis assessment of a vulnerability
Required scope: vulnerability-service:vulnerabilities:read
This endpoint allows users to query details about the davis assessment of a vulnerability.
Note that users also need permissions to read security events (see storage:security.events:read
, storage:events:read
and storage:buckets:read
).
Name | Type | Description |
---|---|---|
config.endTime | string | The end of the requested timeframe. |
config.id*required | string | The ID of the related vulnerability. |
config.startTime | string | The start of the requested timeframe. You can use one of the following formats:
|
Return type | Status code | Description |
---|---|---|
DavisAssessmentDetails | 200 | The davis assessment |
Error Type | Error Message |
---|---|
BadRequest | Malformed request or invalid parameters. |
Unauthorized | Insufficient permissions. |
Forbidden | Access denied. |
NotFound | Resource not found. |
TooManyRequests | Too many requests. |
InternalServerError | There is a problem in the backend. |
NotImplemented | Not implemented. |
ServiceUnavailable | Service Unavailable. |
import { vulnerabilitiesClient } from "@dynatrace-sdk/client-vulnerabilities";
const data = await vulnerabilitiesClient.getDavisAssessment(
{ id: "..." },
);
Get the davis assessment of a vulnerability with a segment filter
Required scope: vulnerability-service:vulnerabilities:read
This endpoint allows users to query details about the davis assessment of a vulnerability.
Note that users also need permissions to read security events (see storage:security.events:read
, storage:events:read
and storage:buckets:read
).
Name | Type | Description |
---|---|---|
config.body*required | SegmentRequestBody | |
config.endTime | string | The end of the requested timeframe. |
config.id*required | string | The ID of the related vulnerability. |
config.startTime | string | The start of the requested timeframe. You can use one of the following formats:
|
Return type | Status code | Description |
---|---|---|
DavisAssessmentDetails | 200 | The davis assessment |
Error Type | Error Message |
---|---|
BadRequest | Malformed request or invalid parameters. |
Unauthorized | Insufficient permissions. |
Forbidden | Access denied. |
NotFound | Resource not found. |
TooManyRequests | Too many requests. |
InternalServerError | There is a problem in the backend. |
NotImplemented | Not implemented. |
ServiceUnavailable | Service Unavailable. |
import { vulnerabilitiesClient } from "@dynatrace-sdk/client-vulnerabilities";
const data =
await vulnerabilitiesClient.getDavisAssessmentWithSegments(
{ id: "...", body: {} },
);
Get details of a vulnerability
Required scope: vulnerability-service:vulnerabilities:read
This endpoint allows users to query details about a single vulnerability.
Note that users also need permissions to read security events (see storage:security.events:read
, storage:events:read
and storage:buckets:read
).
Name | Type | Description |
---|---|---|
config.endTime | string | The end of the requested timeframe. |
config.id*required | string | The ID of the requested vulnerability. |
config.startTime | string | The start of the requested timeframe. You can use one of the following formats:
|
Return type | Status code | Description |
---|---|---|
Vulnerability | 200 | The vulnerability |
Error Type | Error Message |
---|---|
BadRequest | Malformed request or invalid parameters. |
Unauthorized | Insufficient permissions. |
Forbidden | Access denied. |
NotFound | Resource not found. |
TooManyRequests | Too many requests. |
InternalServerError | There is a problem in the backend. |
NotImplemented | Not implemented. |
ServiceUnavailable | Service Unavailable. |
import { vulnerabilitiesClient } from "@dynatrace-sdk/client-vulnerabilities";
const data = await vulnerabilitiesClient.getVulnerability({
id: "...",
});
Get details of a vulnerability with a segment filter
Required scope: vulnerability-service:vulnerabilities:read
This endpoint allows users to query details about a single vulnerability.
Note that users also need permissions to read security events (see storage:security.events:read
, storage:events:read
and storage:buckets:read
).
Name | Type | Description |
---|---|---|
config.body*required | SegmentRequestBody | |
config.endTime | string | The end of the requested timeframe. |
config.id*required | string | The ID of the requested vulnerability. |
config.startTime | string | The start of the requested timeframe. You can use one of the following formats:
|
Return type | Status code | Description |
---|---|---|
Vulnerability | 200 | The vulnerability |
Error Type | Error Message |
---|---|
BadRequest | Malformed request or invalid parameters. |
Unauthorized | Insufficient permissions. |
Forbidden | Access denied. |
NotFound | Resource not found. |
TooManyRequests | Too many requests. |
InternalServerError | There is a problem in the backend. |
NotImplemented | Not implemented. |
ServiceUnavailable | Service Unavailable. |
import { vulnerabilitiesClient } from "@dynatrace-sdk/client-vulnerabilities";
const data =
await vulnerabilitiesClient.getVulnerabilityWithSegments({
id: "...",
body: {},
});
List vulnerabilities
Required scope: vulnerability-service:vulnerabilities:read
This endpoint allows users to query vulnerabilities.
Note that users also need permissions to read security events (see storage:security.events:read
, storage:events:read
and storage:buckets:read
).
Name | Type | Description |
---|---|---|
config.endTime | string | The end of the requested timeframe. |
config.filter | string | The filter parameter, as explained here: This expression filters the returned vulnerabilities. Generally, all fields can be used for filtering. |
config.sort | string | The sort parameter, as explained here: Fields can be prefixed with Generally, all fields with a single value can be used for sorting; however, sorting by fields with array values such as If this parameter is omitted, the vulnerabilities are sorted by their ids. |
config.startTime | string | The start of the requested timeframe. You can use one of the following formats:
|
Return type | Status code | Description |
---|---|---|
Vulnerabilities | 200 | An array of vulnerabilities |
Error Type | Error Message |
---|---|
BadRequest | Malformed request or invalid parameters. |
Unauthorized | Insufficient permissions. |
Forbidden | Access denied. |
NotFound | Resource not found. |
TooManyRequests | Too many requests. |
InternalServerError | There is a problem in the backend. |
NotImplemented | Not implemented. |
ServiceUnavailable | Service Unavailable. |
import { vulnerabilitiesClient } from "@dynatrace-sdk/client-vulnerabilities";
const data =
await vulnerabilitiesClient.listVulnerabilities();
List vulnerabilities with a segment filter
Required scope: vulnerability-service:vulnerabilities:read
This endpoint allows users to query vulnerabilities.
Note that users also need permissions to read security events (see storage:security.events:read
, storage:events:read
and storage:buckets:read
).
Name | Type | Description |
---|---|---|
config.body*required | SegmentRequestBody | |
config.endTime | string | The end of the requested timeframe. |
config.filter | string | The filter parameter, as explained here: This expression filters the returned vulnerabilities. Generally, all fields can be used for filtering. |
config.sort | string | The sort parameter, as explained here: Fields can be prefixed with Generally, all fields with a single value can be used for sorting; however, sorting by fields with array values such as If this parameter is omitted, the vulnerabilities are sorted by their ids. |
config.startTime | string | The start of the requested timeframe. You can use one of the following formats:
|
Return type | Status code | Description |
---|---|---|
Vulnerabilities | 200 | An array of vulnerabilities |
Error Type | Error Message |
---|---|
BadRequest | Malformed request or invalid parameters. |
Unauthorized | Insufficient permissions. |
Forbidden | Access denied. |
NotFound | Resource not found. |
TooManyRequests | Too many requests. |
InternalServerError | There is a problem in the backend. |
NotImplemented | Not implemented. |
ServiceUnavailable | Service Unavailable. |
import { vulnerabilitiesClient } from "@dynatrace-sdk/client-vulnerabilities";
const data =
await vulnerabilitiesClient.listVulnerabilitiesWithSegments(
{ body: {} },
);
Change the mute status of certain affected entities
Required scope: vulnerability-service:vulnerabilities:write
This endpoint allows users to mute or unmute affected entities that are part of a vulnerability.
Note that users are also required to have the role-based permission SECURITY_PROBLEM_MANAGE
.
Name | Type | Description |
---|---|---|
config.body*required | MutingRequestBody | |
config.id*required | string | The ID of the related vulnerability. |
Error Type | Error Message |
---|---|
BadRequest | Malformed request or invalid parameters. |
Unauthorized | Insufficient permissions. |
Forbidden | Access denied. |
NotFound | Resource not found. |
TooManyRequests | Too many requests. |
InternalServerError | There is a problem in the backend. |
NotImplemented | Not implemented. |
ServiceUnavailable | Service Unavailable. |
import { vulnerabilitiesClient } from "@dynatrace-sdk/client-vulnerabilities";
const data =
await vulnerabilitiesClient.muteAffectedEntities({
id: "...",
body: {
affectedEntityIds: {},
reason: "FALSE_POSITIVE",
},
});
Set tracking links of certain affected entities
Required scope: vulnerability-service:vulnerabilities:write
This endpoint allows users to set the tracking links of affected entities that are part of a vulnerability.
Note that users are also required to have the role-based permission SECURITY_PROBLEM_MANAGE
.
Name | Type | Description |
---|---|---|
config.body*required | SetTrackingLinksRequestBody | |
config.id*required | string | The ID of the related vulnerability. |
Error Type | Error Message |
---|---|
BadRequest | Malformed request or invalid parameters. |
Unauthorized | Insufficient permissions. |
Forbidden | Access denied. |
NotFound | Resource not found. |
TooManyRequests | Too many requests. |
InternalServerError | There is a problem in the backend. |
NotImplemented | Not implemented. |
ServiceUnavailable | Service Unavailable. |
import { vulnerabilitiesClient } from "@dynatrace-sdk/client-vulnerabilities";
const data =
await vulnerabilitiesClient.setTrackingLinksOfAffectedEntities(
{
id: "...",
body: {
affectedEntityIds: {},
trackingLink: { url: "...", text: "..." },
},
},
);
Name | Type |
---|---|
count*required | number |
A list of affected entities.
Name | Type |
---|---|
affectedEntities*required | Array<AffectedEntity> |
Name | Type |
---|---|
affectedEntityId*required | string |
httpStatusCode*required | number |
message | string |
Contains detailed information about an affected entity and the related vulnerability.
Name | Type | Description |
---|---|---|
affectedProcesses*required | Array<string> | |
cvss | Cvss | |
davisAssessment*required | DavisAssessment | |
entryPoints | Array<EntryPoint> | |
id*required | string | |
mute | MuteDetails | |
name*required | string | |
resolution*required | Resolution | |
risk*required | Risk | |
trackingLink | TrackingLink | |
type*required | "PROCESS_GROUP" | "HOST" | "KUBERNETES_NODE" | |
vulnerableComponent | VulnerableComponent | |
vulnerableFunctions*required | VulnerableFunctions | A list of vulnerable functions in use. |
Name | Type |
---|---|
affectedProcesses*required | AffectedCounts |
count*required | number |
hosts*required | AffectedCounts |
kubernetesNodes*required | AffectedCounts |
processGroups*required | AffectedCounts |
types*required | Array<string> |
Name | Type |
---|---|
reasons*required | Array<"LIMITED_BY_CONFIGURATION" | "LIMITED_AGENT_SUPPORT"> |
status*required | "NOT_AVAILABLE" | "REDUCED" | "FULL" |
Name | Type |
---|---|
name*required | string |
Contains information about a constraint violation caused by invalid input.
Name | Type | Description |
---|---|---|
message*required | string | The constraint violation description message |
path | string | The path of the parameter that caused the constraint violation |
Name | Type |
---|---|
baseScore*required | number |
vector*required | string |
version*required | string |
Name | Type |
---|---|
reachableDataAssets*required | Array<string> |
status*required | "NOT_AVAILABLE" | "NOT_DETECTED" | "REACHABLE" |
Name | Type |
---|---|
assessmentMode*required | "NOT_AVAILABLE" | "REDUCED" | "FULL" |
dataAssetsStatus*required | "NOT_AVAILABLE" | "NOT_DETECTED" | "REACHABLE" |
exploitStatus*required | "NOT_AVAILABLE" | "AVAILABLE" |
exposureStatus*required | "NOT_AVAILABLE" | "NOT_DETECTED" | "PUBLIC_NETWORK" |
level*required | "NONE" | "LOW" | "MEDIUM" | "HIGH" | "CRITICAL" |
score*required | number |
vector | string |
vulnerableFunctionStatus*required | "NOT_AVAILABLE" | "NOT_IN_USE" | "IN_USE" |
Name | Type |
---|---|
assessmentMode*required | AssessmentModeDetails |
dataAssetsAssessment*required | DataAssetsAssessment |
exploitAssessment*required | ExploitAssessment |
exposureAssessment*required | ExposureAssessment |
vulnerabilityId*required | string |
vulnerableFunctionAssessment*required | VulnerableFunctionAssessment |
Name | Type |
---|---|
action*required | "UPGRADE" |
componentName*required | string |
filter*required | string |
highestRiskLevel*required | "NONE" | "LOW" | "MEDIUM" | "HIGH" | "CRITICAL" |
highestRiskLevelVulnerabilities*required | number |
packageName | string |
technology*required | "DOTNET" | "GO" | "JAVA" | "KUBERNETES" | "NODE_JS" | "PHP" | "PYTHON" |
totalVulnerabilities*required | number |
Name | Type |
---|---|
recommendations*required | Array<DavisSecurityRecommendation> |
Input parameters for deleting tracking links of affected entities.
Name | Type |
---|---|
affectedEntityIds*required | AffectedEntityIds |
Name | Type |
---|---|
results*required | Array<AffectedEntitiesActionResult> |
Name | Type |
---|---|
function | EntryPointFunction |
payload*required | string |
url*required | EntryPointUrl |
userControlledInputs*required | Array<UserControlledInput> |
Name | Type |
---|---|
name*required | string |
Name | Type |
---|---|
path*required | string |
Optional details of the error
Name | Type | Description |
---|---|---|
constraintViolations | Array<ConstraintViolation> | A list of constraint violations of input parameters (path, query, request body) |
errorRef | string | Reference to the error occurrence in the internal self-monitoring, logging, etc. |
Name | Type | Description |
---|---|---|
error*required | HttpError | Standard error response |
Name | Type |
---|---|
status*required | "NOT_AVAILABLE" | "AVAILABLE" |
Name | Type |
---|---|
status*required | "NOT_AVAILABLE" | "NOT_DETECTED" | "PUBLIC_NETWORK" |
Use filter segments to define the considered affected entities. For more information see the documentation.
Name | Type |
---|---|
id*required | string |
variables | Array<FilterSegmentVariable> |
Name | Type |
---|---|
name*required | string |
values*required | Array<string> |
Standard error response
Name | Type | Description |
---|---|---|
code*required | number | The error code (HTTP response) |
details | ErrorDetails | Optional details of the error |
message*required | string | The error code (HTTP response) |
retryAfterSeconds | number | The time after which the request can be retried, in case it was throttled |
Name | Type |
---|---|
dueDate | Date |
isInCatalog*required | boolean |
Name | Type |
---|---|
status*required | "MUTED" | "NOT_MUTED" |
Name | Type |
---|---|
changeDate | string |
comment | string |
reason | "FALSE_POSITIVE" | "IGNORE" | "AFFECTED" | "CONFIGURATION_NOT_AFFECTED" | "OTHER" |
status*required | "MUTED" | "NOT_MUTED" |
user | string |
Input parameters for muting affected entities.
Name | Type |
---|---|
affectedEntityIds*required | AffectedEntityIds |
comment | string |
reason*required | "FALSE_POSITIVE" | "IGNORE" | "AFFECTED" | "CONFIGURATION_NOT_AFFECTED" | "OTHER" |
Name | Type |
---|---|
results*required | Array<AffectedEntitiesActionResult> |
Name | Type |
---|---|
cve*required | Array<string> |
cwe*required | Array<string> |
owasp*required | Array<string> |
Name | Type |
---|---|
description*required | string |
Name | Type |
---|---|
changeDate | string |
status*required | "OPEN" | "RESOLVED" |
Name | Type |
---|---|
level*required | "NONE" | "LOW" | "MEDIUM" | "HIGH" | "CRITICAL" |
score*required | number |
Name | Type |
---|---|
filterSegments | Array<FilterSegment> |
Input parameters for setting tracking links of affected entities.
Name | Type |
---|---|
affectedEntityIds*required | AffectedEntityIds |
trackingLink*required | TrackingLink |
Name | Type | Description |
---|---|---|
text*required | string | The tracking link text set for the affected entities, e.g. 'ISSUE-123'. |
url*required | string | The tracking link URL set for the affected entities, e.g. https://example.com/ISSUE-123. Note that only valid URLs with 'http' or 'https' protocols are supported. Pattern: ^(https?:).*$ |
Name | Type |
---|---|
isMalicious*required | boolean |
key | string |
payload*required | UserControlledInputPayload |
type | string |
value | string |
Name | Type |
---|---|
end*required | number |
start*required | number |
A list of vulnerabilities.
Name | Type | Description |
---|---|---|
vulnerabilities*required | Array<Vulnerability> | A list of vulnerabilities. |
Contains detailed information about the particular vulnerability. For information on the properties see our documentation.
Name | Type | Description |
---|---|---|
affectedEntities*required | AffectedEntityStatistics | |
codeLocation | CodeLocation | |
cvss | Cvss | |
davisAssessment*required | DavisAssessment | |
description*required | string | |
displayId*required | string | |
externalId | string | External provider's unique identifier for the vulnerability. Example: SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-30646 |
id*required | string | |
isFixAvailable*required | boolean | |
kev | KnownExploitedVulnerabilityDetails | |
mute*required | Mute | |
references*required | References | |
remediation | Remediation | |
resolution*required | Resolution | |
risk*required | Risk | |
stack*required | "CODE" | "CODE_LIBRARY" | "SOFTWARE" | "CONTAINER_ORCHESTRATION" | |
technology*required | "DOTNET" | "GO" | "JAVA" | "KUBERNETES" | "NODE_JS" | "PHP" | "PYTHON" | |
title*required | string | |
trackingLinkCoveragePercentage*required | number | Percent of affected entities that have a tracking link assigned. 100% coverage means that every affected entity has a tracking link assigned. Examples: [ 80.5, 30.5 ] |
type*required | string | |
vulnerableComponents*required | Array<VulnerableComponent> | A list of all vulnerable components. |
Name | Type |
---|---|
id*required | string |
name*required | string |
packageName | string |
shortName*required | string |
version | string |
Name | Type |
---|---|
function*required | string |
inUseProcessGroups*required | Array<string> |
notAvailableProcessGroups*required | Array<string> |
notInUseProcessGroups*required | Array<string> |
status*required | "NOT_AVAILABLE" | "NOT_IN_USE" | "IN_USE" |
Name | Type |
---|---|
status*required | "NOT_AVAILABLE" | "NOT_IN_USE" | "IN_USE" |
vulnerableFunctions*required | Array<VulnerableFunction> |
⚠️ Deprecated Use literal values.
Host
| KubernetesNode
| ProcessGroup
⚠️ Deprecated Use literal values.
Full
| NotAvailable
| Reduced
⚠️ Deprecated Use literal values.
LimitedAgentSupport
| LimitedByConfiguration
⚠️ Deprecated Use literal values.
NotAvailable
| NotDetected
| Reachable
⚠️ Deprecated Use literal values.
Upgrade
⚠️ Deprecated Use literal values.
Available
| NotAvailable
⚠️ Deprecated Use literal values.
NotAvailable
| NotDetected
| PublicNetwork
⚠️ Deprecated Use literal values.
Affected
| ConfigurationNotAffected
| FalsePositive
| Ignore
| Other
⚠️ Deprecated Use literal values.
Muted
| NotMuted
⚠️ Deprecated Use literal values.
Critical
| High
| Low
| Medium
| None
⚠️ Deprecated Use literal values.
Code
| CodeLibrary
| ContainerOrchestration
| Software
⚠️ Deprecated Use literal values.
Open
| Resolved
⚠️ Deprecated Use literal values.
Dotnet
| Go
| Java
| Kubernetes
| NodeJs
| Php
| Python
⚠️ Deprecated Use literal values.
InUse
| NotAvailable
| NotInUse
FAQs
[](https://www.npmjs.com/package/@dynatrace-sdk/client-vulnerabilities/v/1.7.1) [](https://opensource.org/licenses/Apache-2.0)
The npm package @dynatrace-sdk/client-vulnerabilities receives a total of 3 weekly downloads. As such, @dynatrace-sdk/client-vulnerabilities popularity was classified as not popular.
We found that @dynatrace-sdk/client-vulnerabilities demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
Socket researchers uncover how threat actors weaponize Discord across the npm, PyPI, and RubyGems ecosystems to exfiltrate sensitive data.
Security News
Socket now integrates with Bun 1.3’s Security Scanner API to block risky packages at install time and enforce your organization’s policies in local dev and CI.
Research
The Socket Threat Research Team is tracking weekly intrusions into the npm registry that follow a repeatable adversarial playbook used by North Korean state-sponsored actors.