GraphQL Schema documentation
API Endpoints
https://app.eu.onekey.com/api/graphql
Queries
allAnalysisConfigurations
Response
Returns [AnalysisConfiguration!]!
Example
Query
query allAnalysisConfigurations {
allAnalysisConfigurations {
id
name
binaryAnalysis
rtosAnalysis
}
}
Response
{
"data": {
"allAnalysisConfigurations": [
{
"id": "4",
"name": "xyz789",
"binaryAnalysis": true,
"rtosAnalysis": false
}
]
}
}
allApiTokens
Response
Returns [ApiToken!]!
Example
Query
query allApiTokens {
allApiTokens {
id
name
description
createdBy
createdAt
expireAt
lastUsedAt
permissions {
...ApiTokenPermissionFragment
}
}
}
Response
{
"data": {
"allApiTokens": [
{
"id": "4",
"name": "abc123",
"description": "abc123",
"createdBy": "xyz789",
"createdAt": Datetime,
"expireAt": Datetime,
"lastUsedAt": Datetime,
"permissions": [ApiTokenPermission]
}
]
}
}
allFirmwares
Response
Returns [Firmware!]!
Arguments
Name | Description |
---|---|
filter - FirmwareFilter
|
|
query - String
|
|
count - Int
|
Example
Query
query allFirmwares(
$filter: FirmwareFilter,
$query: String,
$count: Int
) {
allFirmwares(
filter: $filter,
query: $query,
count: $count
) {
id
name
uploadTime
version
notes
totalSize
binary {
...FirmwareBinaryFragment
}
sbom {
...FirmwareSBOMFragment
}
analysisConfiguration {
...AnalysisConfigurationFragment
}
analyses {
...AnalysisFragment
}
latestAnalysisTime
latestAnalysis {
...AnalysisFragment
}
fileCount
files {
...FileFragment
}
blobs {
...BlobFragment
}
processing {
... on ProcessingInProgress {
...ProcessingInProgressFragment
}
... on ProcessingFailed {
...ProcessingFailedFragment
}
... on ProcessingFinished {
...ProcessingFinishedFragment
}
}
monitoring
uploader
componentCount
components {
...ComponentFragment
}
certificates {
...CertificateFragment
}
privateKeys {
...PrivateKeyFragment
}
latestIssues {
...IssueFragment
}
fileContent {
...FileContentResultFragment
}
releaseDate
product {
...ProductFragment
}
complianceItems {
...ComplianceItemFragment
}
complianceExtraItems {
...ComplianceExtraItemFragment
}
elfDetails {
...ELFDetailsFragment
}
managementProtocols {
...ManagementProtocolFragment
}
downloadUrl
spriteSheets {
...SpriteSheetFragment
}
cveMatches {
...CVEMatchFragment
}
compareAnalyses {
...AnalysesComparisonFragment
}
extractionProblems {
...ExtractionProblemFragment
}
labels
properties {
...PropertyFragment
}
supportingFiles {
...SupportingFileFragment
}
complianceBundles {
...ComplianceBundleFragment
}
auditTrail {
...AuditRecordFragment
}
uris {
...URIFragment
}
uriCount
linkedLibraries {
...LinkedLibraryFragment
}
}
}
Variables
{
"filter": FirmwareFilter,
"query": "xyz789",
"count": 987
}
Response
{
"data": {
"allFirmwares": [
{
"id": 4,
"name": "xyz789",
"uploadTime": Datetime,
"version": "xyz789",
"notes": "xyz789",
"totalSize": {},
"binary": FirmwareBinary,
"sbom": FirmwareSBOM,
"analysisConfiguration": AnalysisConfiguration,
"analyses": [Analysis],
"latestAnalysisTime": Datetime,
"latestAnalysis": Analysis,
"fileCount": 987,
"files": [File],
"blobs": [Blob],
"processing": ProcessingInProgress,
"monitoring": false,
"uploader": "abc123",
"componentCount": 987,
"components": [Component],
"certificates": [Certificate],
"privateKeys": [PrivateKey],
"latestIssues": [Issue],
"fileContent": [FileContentResult],
"releaseDate": "2007-12-03",
"product": Product,
"complianceItems": [ComplianceItem],
"complianceExtraItems": [ComplianceExtraItem],
"elfDetails": ELFDetails,
"managementProtocols": [ManagementProtocol],
"downloadUrl": "abc123",
"spriteSheets": [SpriteSheet],
"cveMatches": [CVEMatch],
"compareAnalyses": AnalysesComparison,
"extractionProblems": [ExtractionProblem],
"labels": ["abc123"],
"properties": [Property],
"supportingFiles": [SupportingFile],
"complianceBundles": [ComplianceBundle],
"auditTrail": [AuditRecord],
"uris": [URI],
"uriCount": 123,
"linkedLibraries": [LinkedLibrary]
}
]
}
}
allGuidelines
Response
Returns [ComplianceGuideline!]!
Example
Query
query allGuidelines {
allGuidelines {
id
title
publisherName
publisherType
publicationDate
url
auxiliaryProperties {
...ComplianceAuxiliaryPropertyFragment
}
summary
chapters {
...ComplianceChapterFragment
}
}
}
Response
{
"data": {
"allGuidelines": [
{
"id": 4,
"title": "xyz789",
"publisherName": "xyz789",
"publisherType": "GOVERNMENT_ORGANISATION",
"publicationDate": "2007-12-03",
"url": "xyz789",
"auxiliaryProperties": [
ComplianceAuxiliaryProperty
],
"summary": "xyz789",
"chapters": [ComplianceChapter]
}
]
}
}
allIssueDocs
Response
Returns [IssueDoc!]!
Example
Query
query allIssueDocs {
allIssueDocs {
type
summary
description
mitigation
cwes {
...CWEFragment
}
references {
...ReferenceFragment
}
}
}
Response
{
"data": {
"allIssueDocs": [
{
"type": "abc123",
"summary": "abc123",
"description": "xyz789",
"mitigation": "abc123",
"cwes": [CWE],
"references": [Reference]
}
]
}
}
allProductGroups
Response
Returns [ProductGroup!]!
Example
Query
query allProductGroups {
allProductGroups {
id
name
description
products {
...ProductFragment
}
}
}
Response
{
"data": {
"allProductGroups": [
{
"id": "4",
"name": "xyz789",
"description": "abc123",
"products": [Product]
}
]
}
}
allProducts
Response
Returns [Product!]!
Example
Query
query allProducts {
allProducts {
id
name
vendor
category
firmwareTimeline {
...FirmwareTimelineItemFragment
}
productGroups {
...ProductGroupFragment
}
}
}
Response
{
"data": {
"allProducts": [
{
"id": 4,
"name": "abc123",
"vendor": "xyz789",
"category": "xyz789",
"firmwareTimeline": [FirmwareTimelineItem],
"productGroups": [ProductGroup]
}
]
}
}
allReportConfigurations
Response
Returns [ReportConfiguration!]!
Example
Query
query allReportConfigurations {
allReportConfigurations {
id
name
issueSeverities
analysisTechniqueDetails
complianceGuidelines {
...ComplianceGuidelineFragment
}
includeComments
includedStatuses
excludedStatuses
}
}
Response
{
"data": {
"allReportConfigurations": [
{
"id": 4,
"name": "xyz789",
"issueSeverities": ["CRITICAL"],
"analysisTechniqueDetails": false,
"complianceGuidelines": [ComplianceGuideline],
"includeComments": true,
"includedStatuses": ["NONE"],
"excludedStatuses": ["NONE"]
}
]
}
}
allReports
Response
Returns [Report!]!
Arguments
Name | Description |
---|---|
filter - ReportFilter
|
Example
Query
query allReports($filter: ReportFilter) {
allReports(filter: $filter) {
id
title
classification
generatedTime
reportConfiguration {
...ReportConfigurationFragment
}
firmwares {
...FirmwareFragment
}
downloadUrl
size
state
links {
...ReportLinkFragment
}
}
}
Variables
{"filter": ReportFilter}
Response
{
"data": {
"allReports": [
{
"id": "4",
"title": "abc123",
"classification": "xyz789",
"generatedTime": Datetime,
"reportConfiguration": ReportConfiguration,
"firmwares": [Firmware],
"downloadUrl": "abc123",
"size": 987,
"state": "GENERATING",
"links": [ReportLink]
}
]
}
}
allUserGroups
Response
Returns [UserGroup!]!
Example
Query
query allUserGroups {
allUserGroups {
id
name
description
productGroups {
...ProductGroupFragment
}
roles
users {
...UserFragment
}
}
}
Response
{
"data": {
"allUserGroups": [
{
"id": "4",
"name": "abc123",
"description": "abc123",
"productGroups": [ProductGroup],
"roles": ["ADMIN"],
"users": [User]
}
]
}
}
allUsers
Response
Returns [User!]!
Example
Query
query allUsers {
allUsers {
email
created
userGroups {
...UserGroupFragment
}
roles
}
}
Response
{
"data": {
"allUsers": [
{
"email": "abc123",
"created": Datetime,
"userGroups": [UserGroup],
"roles": ["ADMIN"]
}
]
}
}
compareFirmwareAnalyses
Description
Compare the latest analyses of two firmware
Response
Returns an AnalysesComparison
Example
Query
query compareFirmwareAnalyses(
$base: ID!,
$other: ID!
) {
compareFirmwareAnalyses(
base: $base,
other: $other
) {
base {
...AnalysisFragment
}
other {
...AnalysisFragment
}
issues {
...IssuesComparisonFragment
}
cveEntries {
...CVEEntriesComparisonFragment
}
cveMatches {
...CVEMatchesComparisonFragment
}
components {
...ComponentsComparisonFragment
}
}
}
Variables
{
"base": "4",
"other": "4"
}
Response
{
"data": {
"compareFirmwareAnalyses": {
"base": Analysis,
"other": Analysis,
"issues": IssuesComparison,
"cveEntries": CVEEntriesComparison,
"cveMatches": CVEMatchesComparison,
"components": ComponentsComparison
}
}
}
firmware
Example
Query
query firmware($id: ID!) {
firmware(id: $id) {
id
name
uploadTime
version
notes
totalSize
binary {
...FirmwareBinaryFragment
}
sbom {
...FirmwareSBOMFragment
}
analysisConfiguration {
...AnalysisConfigurationFragment
}
analyses {
...AnalysisFragment
}
latestAnalysisTime
latestAnalysis {
...AnalysisFragment
}
fileCount
files {
...FileFragment
}
blobs {
...BlobFragment
}
processing {
... on ProcessingInProgress {
...ProcessingInProgressFragment
}
... on ProcessingFailed {
...ProcessingFailedFragment
}
... on ProcessingFinished {
...ProcessingFinishedFragment
}
}
monitoring
uploader
componentCount
components {
...ComponentFragment
}
certificates {
...CertificateFragment
}
privateKeys {
...PrivateKeyFragment
}
latestIssues {
...IssueFragment
}
fileContent {
...FileContentResultFragment
}
releaseDate
product {
...ProductFragment
}
complianceItems {
...ComplianceItemFragment
}
complianceExtraItems {
...ComplianceExtraItemFragment
}
elfDetails {
...ELFDetailsFragment
}
managementProtocols {
...ManagementProtocolFragment
}
downloadUrl
spriteSheets {
...SpriteSheetFragment
}
cveMatches {
...CVEMatchFragment
}
compareAnalyses {
...AnalysesComparisonFragment
}
extractionProblems {
...ExtractionProblemFragment
}
labels
properties {
...PropertyFragment
}
supportingFiles {
...SupportingFileFragment
}
complianceBundles {
...ComplianceBundleFragment
}
auditTrail {
...AuditRecordFragment
}
uris {
...URIFragment
}
uriCount
linkedLibraries {
...LinkedLibraryFragment
}
}
}
Variables
{"id": "4"}
Response
{
"data": {
"firmware": {
"id": "4",
"name": "xyz789",
"uploadTime": Datetime,
"version": "xyz789",
"notes": "abc123",
"totalSize": {},
"binary": FirmwareBinary,
"sbom": FirmwareSBOM,
"analysisConfiguration": AnalysisConfiguration,
"analyses": [Analysis],
"latestAnalysisTime": Datetime,
"latestAnalysis": Analysis,
"fileCount": 987,
"files": [File],
"blobs": [Blob],
"processing": ProcessingInProgress,
"monitoring": true,
"uploader": "xyz789",
"componentCount": 123,
"components": [Component],
"certificates": [Certificate],
"privateKeys": [PrivateKey],
"latestIssues": [Issue],
"fileContent": [FileContentResult],
"releaseDate": "2007-12-03",
"product": Product,
"complianceItems": [ComplianceItem],
"complianceExtraItems": [ComplianceExtraItem],
"elfDetails": ELFDetails,
"managementProtocols": [ManagementProtocol],
"downloadUrl": "abc123",
"spriteSheets": [SpriteSheet],
"cveMatches": [CVEMatch],
"compareAnalyses": AnalysesComparison,
"extractionProblems": [ExtractionProblem],
"labels": ["xyz789"],
"properties": [Property],
"supportingFiles": [SupportingFile],
"complianceBundles": [ComplianceBundle],
"auditTrail": [AuditRecord],
"uris": [URI],
"uriCount": 123,
"linkedLibraries": [LinkedLibrary]
}
}
}
globalAnalysisProfile
Response
Returns an AnalysisProfile!
Example
Query
query globalAnalysisProfile {
globalAnalysisProfile {
issueRules {
...AnalysisProfileRuleFragment
}
cveRules {
...AnalysisProfileRuleFragment
}
}
}
Response
{
"data": {
"globalAnalysisProfile": {
"issueRules": [AnalysisProfileRule],
"cveRules": [AnalysisProfileRule]
}
}
}
tenant
Response
Returns a Tenant!
Example
Query
query tenant {
tenant {
name
activationDate
supportContacts
}
}
Response
{
"data": {
"tenant": {
"name": "xyz789",
"activationDate": "2007-12-03",
"supportContacts": ["abc123"]
}
}
}
user
Response
Returns a User!
Example
Query
query user {
user {
email
created
userGroups {
...UserGroupFragment
}
roles
}
}
Response
{
"data": {
"user": {
"email": "xyz789",
"created": Datetime,
"userGroups": [UserGroup],
"roles": ["ADMIN"]
}
}
}
Mutations
addFirmwareComponent
Response
Returns a FirmwareComponentEditResult
Arguments
Name | Description |
---|---|
input - FirmwareAddComponentInput!
|
Example
Query
mutation addFirmwareComponent($input: FirmwareAddComponentInput!) {
addFirmwareComponent(input: $input) {
... on Component {
...ComponentFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": FirmwareAddComponentInput}
Response
{"data": {"addFirmwareComponent": Component}}
applyGlobalAnalysisProfile
Response
Returns a MutationError
Arguments
Name | Description |
---|---|
input - IDInput!
|
Example
Query
mutation applyGlobalAnalysisProfile($input: IDInput!) {
applyGlobalAnalysisProfile(input: $input) {
count
errors {
...ErrorFragment
}
}
}
Variables
{"input": IDInput}
Response
{
"data": {
"applyGlobalAnalysisProfile": {
"count": 123,
"errors": [Error]
}
}
}
createAnalysisConfiguration
Response
Returns an AnalysisConfigurationResult!
Arguments
Name | Description |
---|---|
input - AnalysisConfigurationCreateInput!
|
Example
Query
mutation createAnalysisConfiguration($input: AnalysisConfigurationCreateInput!) {
createAnalysisConfiguration(input: $input) {
... on AnalysisConfiguration {
...AnalysisConfigurationFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": AnalysisConfigurationCreateInput}
Response
{
"data": {
"createAnalysisConfiguration": AnalysisConfiguration
}
}
createApiToken
Response
Returns an ApiTokenCreateResult!
Arguments
Name | Description |
---|---|
input - ApiTokenCreateInput!
|
Example
Query
mutation createApiToken($input: ApiTokenCreateInput!) {
createApiToken(input: $input) {
... on CreatedApiToken {
...CreatedApiTokenFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": ApiTokenCreateInput}
Response
{"data": {"createApiToken": CreatedApiToken}}
createComplianceBundle
Response
Returns a ComplianceBundleCreateResult!
Arguments
Name | Description |
---|---|
input - ComplianceBundleCreateInput!
|
Example
Query
mutation createComplianceBundle($input: ComplianceBundleCreateInput!) {
createComplianceBundle(input: $input) {
... on ComplianceBundle {
...ComplianceBundleFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": ComplianceBundleCreateInput}
Response
{"data": {"createComplianceBundle": ComplianceBundle}}
createFirmwareUpload
Description
Creates the metadata for the firmware, and the result will have the uploadUrl field, where the actual firmware file should be posted with a Content-Type: multipart/form-data.
Response
Returns a FirmwareUploadResult!
Arguments
Name | Description |
---|---|
input - FirmwareUploadInput!
|
Example
Query
mutation createFirmwareUpload($input: FirmwareUploadInput!) {
createFirmwareUpload(input: $input) {
... on FirmwareUploadMetadata {
...FirmwareUploadMetadataFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": FirmwareUploadInput}
Response
{"data": {"createFirmwareUpload": FirmwareUploadMetadata}}
createProductGroup
Response
Returns a ProductGroupResult!
Arguments
Name | Description |
---|---|
input - ProductGroupCreateInput!
|
Example
Query
mutation createProductGroup($input: ProductGroupCreateInput!) {
createProductGroup(input: $input) {
... on ProductGroup {
...ProductGroupFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": ProductGroupCreateInput}
Response
{"data": {"createProductGroup": ProductGroup}}
createReportConfiguration
Response
Returns a ReportConfigurationResult!
Arguments
Name | Description |
---|---|
input - ReportConfigurationCreateInput
|
Example
Query
mutation createReportConfiguration($input: ReportConfigurationCreateInput) {
createReportConfiguration(input: $input) {
... on ReportConfiguration {
...ReportConfigurationFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": ReportConfigurationCreateInput}
Response
{
"data": {
"createReportConfiguration": ReportConfiguration
}
}
createReportLink
Response
Returns a ReportLinkResult!
Arguments
Name | Description |
---|---|
input - CreateReportLinkInput!
|
Example
Query
mutation createReportLink($input: CreateReportLinkInput!) {
createReportLink(input: $input) {
... on CreatedReportLink {
...CreatedReportLinkFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": CreateReportLinkInput}
Response
{"data": {"createReportLink": CreatedReportLink}}
createUser
Response
Returns a UserResult!
Arguments
Name | Description |
---|---|
input - UserCreateInput!
|
Example
Query
mutation createUser($input: UserCreateInput!) {
createUser(input: $input) {
... on User {
...UserFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": UserCreateInput}
Response
{"data": {"createUser": User}}
createUserGroup
Response
Returns a UserGroupResult!
Arguments
Name | Description |
---|---|
input - UserGroupCreateInput!
|
Example
Query
mutation createUserGroup($input: UserGroupCreateInput!) {
createUserGroup(input: $input) {
... on UserGroup {
...UserGroupFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": UserGroupCreateInput}
Response
{"data": {"createUserGroup": UserGroup}}
deleteAnalysisConfiguration
Response
Returns a MutationError
Arguments
Name | Description |
---|---|
input - IDInput!
|
Example
Query
mutation deleteAnalysisConfiguration($input: IDInput!) {
deleteAnalysisConfiguration(input: $input) {
count
errors {
...ErrorFragment
}
}
}
Variables
{"input": IDInput}
Response
{
"data": {
"deleteAnalysisConfiguration": {
"count": 987,
"errors": [Error]
}
}
}
deleteApiToken
Response
Returns a MutationError
Arguments
Name | Description |
---|---|
input - IDInput!
|
Example
Query
mutation deleteApiToken($input: IDInput!) {
deleteApiToken(input: $input) {
count
errors {
...ErrorFragment
}
}
}
Variables
{"input": IDInput}
Response
{
"data": {
"deleteApiToken": {"count": 123, "errors": [Error]}
}
}
deleteFirmware
Response
Returns a MutationError
Arguments
Name | Description |
---|---|
input - IDInput!
|
Example
Query
mutation deleteFirmware($input: IDInput!) {
deleteFirmware(input: $input) {
count
errors {
...ErrorFragment
}
}
}
Variables
{"input": IDInput}
Response
{
"data": {
"deleteFirmware": {"count": 123, "errors": [Error]}
}
}
deleteFirmwareComponent
Response
Returns a MutationError
Arguments
Name | Description |
---|---|
input - FirmwareDeleteComponentInput!
|
Example
Query
mutation deleteFirmwareComponent($input: FirmwareDeleteComponentInput!) {
deleteFirmwareComponent(input: $input) {
count
errors {
...ErrorFragment
}
}
}
Variables
{"input": FirmwareDeleteComponentInput}
Response
{
"data": {
"deleteFirmwareComponent": {
"count": 123,
"errors": [Error]
}
}
}
deleteFirmwareSupportingFile
Response
Returns a MutationError
Arguments
Name | Description |
---|---|
input - FirmwareSupportingFileDeleteInput!
|
Example
Query
mutation deleteFirmwareSupportingFile($input: FirmwareSupportingFileDeleteInput!) {
deleteFirmwareSupportingFile(input: $input) {
count
errors {
...ErrorFragment
}
}
}
Variables
{"input": FirmwareSupportingFileDeleteInput}
Response
{
"data": {
"deleteFirmwareSupportingFile": {
"count": 123,
"errors": [Error]
}
}
}
deleteProductGroup
Response
Returns a MutationError
Arguments
Name | Description |
---|---|
input - ProductGroupDeleteInput!
|
Example
Query
mutation deleteProductGroup($input: ProductGroupDeleteInput!) {
deleteProductGroup(input: $input) {
count
errors {
...ErrorFragment
}
}
}
Variables
{"input": ProductGroupDeleteInput}
Response
{
"data": {
"deleteProductGroup": {
"count": 123,
"errors": [Error]
}
}
}
deleteReport
Response
Returns a MutationError
Arguments
Name | Description |
---|---|
input - IDInput!
|
Example
Query
mutation deleteReport($input: IDInput!) {
deleteReport(input: $input) {
count
errors {
...ErrorFragment
}
}
}
Variables
{"input": IDInput}
Response
{
"data": {
"deleteReport": {"count": 987, "errors": [Error]}
}
}
deleteReportConfiguration
Response
Returns a MutationError
Arguments
Name | Description |
---|---|
input - ReportConfigurationDeleteInput
|
Example
Query
mutation deleteReportConfiguration($input: ReportConfigurationDeleteInput) {
deleteReportConfiguration(input: $input) {
count
errors {
...ErrorFragment
}
}
}
Variables
{"input": ReportConfigurationDeleteInput}
Response
{
"data": {
"deleteReportConfiguration": {
"count": 987,
"errors": [Error]
}
}
}
deleteUser
Response
Returns a MutationError
Arguments
Name | Description |
---|---|
input - UserDeleteInput!
|
Example
Query
mutation deleteUser($input: UserDeleteInput!) {
deleteUser(input: $input) {
count
errors {
...ErrorFragment
}
}
}
Variables
{"input": UserDeleteInput}
Response
{
"data": {
"deleteUser": {"count": 987, "errors": [Error]}
}
}
deleteUserGroup
Response
Returns a MutationError
Arguments
Name | Description |
---|---|
input - IDInput!
|
Example
Query
mutation deleteUserGroup($input: IDInput!) {
deleteUserGroup(input: $input) {
count
errors {
...ErrorFragment
}
}
}
Variables
{"input": IDInput}
Response
{
"data": {
"deleteUserGroup": {"count": 123, "errors": [Error]}
}
}
disableMonitoring
Response
Returns a MutationError
Arguments
Name | Description |
---|---|
input - IDInput!
|
Example
Query
mutation disableMonitoring($input: IDInput!) {
disableMonitoring(input: $input) {
count
errors {
...ErrorFragment
}
}
}
Variables
{"input": IDInput}
Response
{
"data": {
"disableMonitoring": {"count": 987, "errors": [Error]}
}
}
enableMonitoring
Response
Returns a MutationError
Arguments
Name | Description |
---|---|
input - IDInput!
|
Example
Query
mutation enableMonitoring($input: IDInput!) {
enableMonitoring(input: $input) {
count
errors {
...ErrorFragment
}
}
}
Variables
{"input": IDInput}
Response
{
"data": {
"enableMonitoring": {"count": 123, "errors": [Error]}
}
}
generateReport
Response
Returns a GenerateReportResult!
Arguments
Name | Description |
---|---|
input - GenerateReportInput
|
Example
Query
mutation generateReport($input: GenerateReportInput) {
generateReport(input: $input) {
... on Report {
...ReportFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": GenerateReportInput}
Response
{"data": {"generateReport": Report}}
requestFirmwareReview
Response
Returns a MutationError
Arguments
Name | Description |
---|---|
input - FirmwareReviewInput
|
Example
Query
mutation requestFirmwareReview($input: FirmwareReviewInput) {
requestFirmwareReview(input: $input) {
count
errors {
...ErrorFragment
}
}
}
Variables
{"input": FirmwareReviewInput}
Response
{
"data": {
"requestFirmwareReview": {
"count": 987,
"errors": [Error]
}
}
}
triggerAnalysis
Description
Triggers a new analysis on the given firmware
Response
Returns a TriggerAnalysisResult!
Arguments
Name | Description |
---|---|
input - IDInput!
|
Example
Query
mutation triggerAnalysis($input: IDInput!) {
triggerAnalysis(input: $input) {
... on TriggeredAnalysis {
...TriggeredAnalysisFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": IDInput}
Response
{"data": {"triggerAnalysis": TriggeredAnalysis}}
updateAnalysisConfiguration
Response
Returns an AnalysisConfigurationResult!
Arguments
Name | Description |
---|---|
input - AnalysisConfigurationUpdateInput!
|
Example
Query
mutation updateAnalysisConfiguration($input: AnalysisConfigurationUpdateInput!) {
updateAnalysisConfiguration(input: $input) {
... on AnalysisConfiguration {
...AnalysisConfigurationFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": AnalysisConfigurationUpdateInput}
Response
{
"data": {
"updateAnalysisConfiguration": AnalysisConfiguration
}
}
updateCVEStatus
Response
Returns an UpdateCVEStatusResult
Arguments
Name | Description |
---|---|
input - UpdateCVEStatusInput
|
Example
Query
mutation updateCVEStatus($input: UpdateCVEStatusInput) {
updateCVEStatus(input: $input) {
... on CVEMatchesWithUpdatedStatus {
...CVEMatchesWithUpdatedStatusFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": UpdateCVEStatusInput}
Response
{"data": {"updateCVEStatus": CVEMatchesWithUpdatedStatus}}
updateComplianceExtraItem
Response
Returns a ComplianceExtraItemUpdateResult!
Arguments
Name | Description |
---|---|
input - ComplianceExtraItemUpdateInput
|
Example
Query
mutation updateComplianceExtraItem($input: ComplianceExtraItemUpdateInput) {
updateComplianceExtraItem(input: $input) {
... on ComplianceExtraItem {
...ComplianceExtraItemFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": ComplianceExtraItemUpdateInput}
Response
{
"data": {
"updateComplianceExtraItem": ComplianceExtraItem
}
}
updateComplianceItem
Response
Returns a ComplianceItemUpdateResult!
Arguments
Name | Description |
---|---|
input - ComplianceItemUpdateInput
|
Example
Query
mutation updateComplianceItem($input: ComplianceItemUpdateInput) {
updateComplianceItem(input: $input) {
... on ComplianceItemUpdateResults {
...ComplianceItemUpdateResultsFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": ComplianceItemUpdateInput}
Response
{
"data": {
"updateComplianceItem": ComplianceItemUpdateResults
}
}
updateFirmware
Description
Update any part of the uploaded firmware metadata.
Response
Returns a FirmwareUpdateResult!
Arguments
Name | Description |
---|---|
input - FirmwareUpdateInput
|
Example
Query
mutation updateFirmware($input: FirmwareUpdateInput) {
updateFirmware(input: $input) {
... on Firmware {
...FirmwareFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": FirmwareUpdateInput}
Response
{"data": {"updateFirmware": Firmware}}
updateFirmwareComponent
Response
Returns a FirmwareComponentEditResult
Arguments
Name | Description |
---|---|
input - FirmwareUpdateComponentInput!
|
Example
Query
mutation updateFirmwareComponent($input: FirmwareUpdateComponentInput!) {
updateFirmwareComponent(input: $input) {
... on Component {
...ComponentFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": FirmwareUpdateComponentInput}
Response
{"data": {"updateFirmwareComponent": Component}}
updateGlobalAnalysisProfile
Response
Returns an UpdateGlobalAnalysisProfileResult
Arguments
Name | Description |
---|---|
input - AnalysisProfileUpdateInput
|
Example
Query
mutation updateGlobalAnalysisProfile($input: AnalysisProfileUpdateInput) {
updateGlobalAnalysisProfile(input: $input) {
... on AnalysisProfile {
...AnalysisProfileFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": AnalysisProfileUpdateInput}
Response
{"data": {"updateGlobalAnalysisProfile": AnalysisProfile}}
updateIssueStatus
Response
Returns an UpdateIssueStatusResult
Arguments
Name | Description |
---|---|
input - UpdateIssueStatusInput
|
Example
Query
mutation updateIssueStatus($input: UpdateIssueStatusInput) {
updateIssueStatus(input: $input) {
... on IssuesWithUpdatedStatus {
...IssuesWithUpdatedStatusFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": UpdateIssueStatusInput}
Response
{"data": {"updateIssueStatus": IssuesWithUpdatedStatus}}
updateProductGroup
Response
Returns a ProductGroupResult!
Arguments
Name | Description |
---|---|
input - ProductGroupUpdateInput!
|
Example
Query
mutation updateProductGroup($input: ProductGroupUpdateInput!) {
updateProductGroup(input: $input) {
... on ProductGroup {
...ProductGroupFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": ProductGroupUpdateInput}
Response
{"data": {"updateProductGroup": ProductGroup}}
updateReportConfiguration
Response
Returns a ReportConfigurationResult!
Arguments
Name | Description |
---|---|
input - ReportConfigurationUpdateInput
|
Example
Query
mutation updateReportConfiguration($input: ReportConfigurationUpdateInput) {
updateReportConfiguration(input: $input) {
... on ReportConfiguration {
...ReportConfigurationFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": ReportConfigurationUpdateInput}
Response
{
"data": {
"updateReportConfiguration": ReportConfiguration
}
}
updateUser
Response
Returns a UserResult!
Arguments
Name | Description |
---|---|
input - UserUpdateInput!
|
Example
Query
mutation updateUser($input: UserUpdateInput!) {
updateUser(input: $input) {
... on User {
...UserFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": UserUpdateInput}
Response
{"data": {"updateUser": User}}
updateUserGroup
Response
Returns a UserGroupResult!
Arguments
Name | Description |
---|---|
input - UserGroupUpdateInput!
|
Example
Query
mutation updateUserGroup($input: UserGroupUpdateInput!) {
updateUserGroup(input: $input) {
... on UserGroup {
...UserGroupFragment
}
... on MutationError {
...MutationErrorFragment
}
}
}
Variables
{"input": UserGroupUpdateInput}
Response
{"data": {"updateUserGroup": UserGroup}}
Subscriptions
complianceBundleGenerationUpdate
Response
Returns a ComplianceBundle
Arguments
Name | Description |
---|---|
complianceBundleId - ID!
|
Example
Query
subscription complianceBundleGenerationUpdate($complianceBundleId: ID!) {
complianceBundleGenerationUpdate(complianceBundleId: $complianceBundleId) {
id
guideline {
...ComplianceGuidelineFragment
}
createdBy
createdAt
description
state
size
sha256
downloadUrl
}
}
Variables
{"complianceBundleId": 4}
Response
{
"data": {
"complianceBundleGenerationUpdate": {
"id": 4,
"guideline": ComplianceGuideline,
"createdBy": "xyz789",
"createdAt": Datetime,
"description": "xyz789",
"state": "GENERATING",
"size": {},
"sha256": "abc123",
"downloadUrl": "abc123"
}
}
}
firmwareProcessingUpdates
Response
Returns [FirmwareProcessingUpdate!]!
Example
Query
subscription firmwareProcessingUpdates {
firmwareProcessingUpdates {
firmwareID
name
processing {
... on ProcessingInProgress {
...ProcessingInProgressFragment
}
... on ProcessingFailed {
...ProcessingFailedFragment
}
... on ProcessingFinished {
...ProcessingFinishedFragment
}
}
}
}
Response
{
"data": {
"firmwareProcessingUpdates": [
{
"firmwareID": 4,
"name": "abc123",
"processing": ProcessingInProgress
}
]
}
}
reportGenerationUpdate
Example
Query
subscription reportGenerationUpdate($reportId: ID!) {
reportGenerationUpdate(reportId: $reportId) {
id
title
classification
generatedTime
reportConfiguration {
...ReportConfigurationFragment
}
firmwares {
...FirmwareFragment
}
downloadUrl
size
state
links {
...ReportLinkFragment
}
}
}
Variables
{"reportId": "4"}
Response
{
"data": {
"reportGenerationUpdate": {
"id": 4,
"title": "abc123",
"classification": "abc123",
"generatedTime": Datetime,
"reportConfiguration": ReportConfiguration,
"firmwares": [Firmware],
"downloadUrl": "xyz789",
"size": 987,
"state": "GENERATING",
"links": [ReportLink]
}
}
}
Types
AnalysesComparison
Fields
Field Name | Description |
---|---|
base - Analysis!
|
|
other - Analysis!
|
|
issues - IssuesComparison!
|
|
cveEntries - CVEEntriesComparison!
|
|
cveMatches - CVEMatchesComparison!
|
|
components - ComponentsComparison!
|
Example
{
"base": Analysis,
"other": Analysis,
"issues": IssuesComparison,
"cveEntries": CVEEntriesComparison,
"cveMatches": CVEMatchesComparison,
"components": ComponentsComparison
}
AnalysesComparisonSummary
Fields
Field Name | Description |
---|---|
base - Analysis!
|
|
issues - ComparisonCount!
|
|
cveEntries - ComparisonCount!
|
|
components - ComparisonCount!
|
Example
{
"base": Analysis,
"issues": ComparisonCount,
"cveEntries": ComparisonCount,
"components": ComparisonCount
}
AnalysesFilter
Fields
Input Field | Description |
---|---|
state - AnalysisState
|
When both are specified it means "finished AND failed". |
result - AnalysisResult
|
|
timeRange - DatetimeRange
|
Start time of the analysis |
type - AnalysisType
|
|
id - ID
|
Example
{
"state": "WAITING",
"result": "COMPLETE",
"timeRange": DatetimeRange,
"type": "INITIAL",
"id": 4
}
Analysis
Description
Represents a complete analysis of a firmware
Fields
Field Name | Description |
---|---|
id - ID!
|
UUID of the analysis |
issues - [Issue!]!
|
|
Arguments
|
|
firmware - Firmware!
|
|
state - AnalysisState!
|
|
result - AnalysisResult
|
|
resultErrors - [AnalysisResultError!]!
|
|
startTime - Datetime!
|
|
endTime - Datetime
|
|
type - AnalysisType!
|
|
issueCount - SeverityCounts
|
|
Arguments
|
|
cveMatchCount - SeverityCounts
|
|
Arguments
|
|
cveMatches - [CVEMatch!]!
|
|
Arguments
|
|
previousComparisonSummary - AnalysesComparisonSummary
|
Changed issue and CVE information compared to the previous successful analysis. The previous analysis is the one finished just before the current one and is not affected by the filter used. This information is available from the second finished analysis. |
isOutdated - Boolean!
|
Components have been changed (edited) since the analysis was run, CVE list and other data is outdated |
Example
{
"id": "4",
"issues": [Issue],
"firmware": Firmware,
"state": "WAITING",
"result": "COMPLETE",
"resultErrors": [AnalysisResultError],
"startTime": Datetime,
"endTime": Datetime,
"type": "INITIAL",
"issueCount": SeverityCounts,
"cveMatchCount": SeverityCounts,
"cveMatches": [CVEMatch],
"previousComparisonSummary": AnalysesComparisonSummary,
"isOutdated": true
}
AnalysisConfiguration
AnalysisConfigurationCreateInput
AnalysisConfigurationResult
Types
Union Types |
---|
Example
AnalysisConfiguration
AnalysisConfigurationUpdateInput
AnalysisProfile
Fields
Field Name | Description |
---|---|
issueRules - [AnalysisProfileRule!]!
|
|
cveRules - [AnalysisProfileRule!]!
|
Example
{
"issueRules": [AnalysisProfileRule],
"cveRules": [AnalysisProfileRule]
}
AnalysisProfileRule
Example
{
"enabled": false,
"firmwareSelector": "abc123",
"query": "xyz789",
"status": "NONE",
"comment": "abc123"
}
AnalysisProfileRuleInput
Example
{
"enabled": true,
"firmwareSelector": "abc123",
"query": "xyz789",
"status": "NONE",
"comment": "abc123"
}
AnalysisProfileUpdateInput
Fields
Input Field | Description |
---|---|
issueRules - [AnalysisProfileRuleInput!]
|
|
cveRules - [AnalysisProfileRuleInput!]
|
Example
{
"issueRules": [AnalysisProfileRuleInput],
"cveRules": [AnalysisProfileRuleInput]
}
AnalysisResult
Values
Enum Value | Description |
---|---|
|
|
|
|
|
Example
"COMPLETE"
AnalysisResultError
Fields
Field Name | Description |
---|---|
missing - [String!]!
|
|
reason - String!
|
Example
{
"missing": ["abc123"],
"reason": "abc123"
}
AnalysisState
Values
Enum Value | Description |
---|---|
|
|
|
|
|
|
|
Example
"WAITING"
AnalysisType
Values
Enum Value | Description |
---|---|
|
Initial analysis after firmware upload |
|
Automatic daily monitoring analysis |
|
Manually triggered analysis |
Example
"INITIAL"
AndroidConfigurationPropertyIssue
Example
{
"id": 4,
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"line": "abc123",
"name": "abc123"
}
ApiToken
Example
{
"id": 4,
"name": "abc123",
"description": "abc123",
"createdBy": "xyz789",
"createdAt": Datetime,
"expireAt": Datetime,
"lastUsedAt": Datetime,
"permissions": [ApiTokenPermission]
}
ApiTokenCreateInput
Fields
Input Field | Description |
---|---|
name - String!
|
|
description - String
|
|
permissions - [ApiTokenPermissionInput!]!
|
|
expire - Datetime!
|
Example
{
"name": "abc123",
"description": "xyz789",
"permissions": [ApiTokenPermissionInput],
"expire": Datetime
}
ApiTokenCreateResult
Types
Union Types |
---|
Example
CreatedApiToken
ApiTokenPermission
Fields
Field Name | Description |
---|---|
roles - [Role!]!
|
|
productGroup - ProductGroup
|
Example
{"roles": ["ADMIN"], "productGroup": ProductGroup}
ApiTokenPermissionInput
AuditRecord
Example
{
"timestamp": Datetime,
"firmwareId": "abc123",
"userEmail": "xyz789",
"comment": "abc123",
"status": "NONE",
"stableKey": "abc123",
"type": "ISSUE",
"objectSummary": "abc123"
}
AuditTrailFilter
Fields
Input Field | Description |
---|---|
timestamp - DatetimeRange
|
Example
{"timestamp": DatetimeRange}
AuthorizedKeyIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
line - String!
|
|
keyType - String!
|
|
fingerprintMd5 - String!
|
|
fingerprintSha256 - String!
|
Example
{
"id": "4",
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"line": "xyz789",
"keyType": "xyz789",
"fingerprintMd5": "xyz789",
"fingerprintSha256": "abc123"
}
BigInt
Description
Integer with value possibly bigger than the Int maximum defined in GraphQL
Example
{}
BinaryStartDangerousServiceIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
problem - Statement!
|
Example
{
"id": 4,
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"problem": Statement
}
BitLength
Example
BitLength
Blob
Example
{
"stableKey": "abc123",
"extractedRoot": Directory,
"size": {},
"extractedSize": {},
"extractedRootPath": "abc123",
"extractionProblems": [BlobExtractionProblem]
}
BlobExtractionProblem
BlobFilter
Boolean
Description
The Boolean
scalar type represents true
or false
.
Example
true
CVEEntriesComparison
Fields
Field Name | Description |
---|---|
new - [CVEEntry!]!
|
|
dropped - [CVEEntry!]!
|
|
newCount - Int!
|
|
droppedCount - Int!
|
Example
{
"new": [CVEEntry],
"dropped": [CVEEntry],
"newCount": 987,
"droppedCount": 987
}
CVEEntry
Fields
Field Name | Description |
---|---|
id - CVEID!
|
|
description - String
|
|
name - String
|
|
publicationDate - Datetime!
|
|
modificationDate - Datetime!
|
|
severity - Severity!
|
|
cvss2 - CVSS2
|
|
cvss3 - CVSS3
|
|
references - [CVEReference!]!
|
|
cwes - [CWE!]!
|
|
exploitMaturity - CVEExploitMaturity!
|
|
epssProbability - Float
|
|
epssPercentile - Float
|
Example
{
"id": CVEID,
"description": "xyz789",
"name": "abc123",
"publicationDate": Datetime,
"modificationDate": Datetime,
"severity": "CRITICAL",
"cvss2": CVSS2,
"cvss3": CVSS3,
"references": [CVEReference],
"cwes": [CWE],
"exploitMaturity": "NOT_DEFINED",
"epssProbability": 123.45,
"epssPercentile": 123.45
}
CVEExploitMaturity
Values
Enum Value | Description |
---|---|
|
|
|
|
|
|
|
|
|
Example
"NOT_DEFINED"
CVEFix
CVEID
Example
CVEID
CVEMatch
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
component - Component!
|
|
cve - CVEEntry!
|
|
score - Int!
|
|
evidences - [CVEMatchEvidence!]!
|
|
fixes - [CVEFix!]!
|
|
status - Status!
|
|
auditTrail - [AuditRecord!]!
|
Example
{
"id": "4",
"stableKey": "abc123",
"component": Component,
"cve": CVEEntry,
"score": 123,
"evidences": [CVEMatchEvidence],
"fixes": [CVEFix],
"status": "NONE",
"auditTrail": [AuditRecord]
}
CVEMatchEvidence
Fields
Field Name | Description |
---|---|
name - String!
|
|
match - Boolean!
|
|
score - Int!
|
|
description - String!
|
|
files - [String!]!
|
Example
{
"name": "abc123",
"match": false,
"score": 987,
"description": "abc123",
"files": ["abc123"]
}
CVEMatchFilter
Fields
Input Field | Description |
---|---|
id - ID
|
|
status - StatusFilter
|
|
comment - String
|
Any of the audit trail comments contain the specified string, case insensitive |
score - IntFilter
|
|
cveEntryId - StringFilter
|
|
component - ComponentFilter
|
Example
{
"id": 4,
"status": StatusFilter,
"comment": "xyz789",
"score": IntFilter,
"cveEntryId": StringFilter,
"component": ComponentFilter
}
CVEMatchesComparison
Fields
Field Name | Description |
---|---|
new - [CVEMatch!]!
|
|
dropped - [CVEMatch!]!
|
|
newCount - Int!
|
|
droppedCount - Int!
|
Example
{
"new": [CVEMatch],
"dropped": [CVEMatch],
"newCount": 123,
"droppedCount": 123
}
CVEMatchesWithUpdatedStatus
Fields
Field Name | Description |
---|---|
cveMatches - [CVEMatch!]!
|
Example
{"cveMatches": [CVEMatch]}
CVEReference
Fields
Field Name | Description |
---|---|
name - String
|
|
url - String
|
|
source - String
|
|
tags - [String!]!
|
Example
{
"name": "xyz789",
"url": "xyz789",
"source": "xyz789",
"tags": ["xyz789"]
}
CVSS2
Fields
Field Name | Description |
---|---|
vector - String!
|
|
score - Float!
|
|
accessVector - CVSSAttackVector!
|
|
accessComplexity - CVSSAttackComplexity!
|
|
integrityImpact - CVSSCIAType!
|
|
confidentialityImpact - CVSSCIAType!
|
|
availabilityImpact - CVSSCIAType!
|
|
authentication - CVSSAuthenticationType!
|
Example
{
"vector": "abc123",
"score": 123.45,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"integrityImpact": "NONE",
"confidentialityImpact": "NONE",
"availabilityImpact": "NONE",
"authentication": "NONE"
}
CVSS3
Fields
Field Name | Description |
---|---|
vector - String!
|
|
baseScore - Float!
|
|
attackVector - CVSSAttackVector!
|
|
attackComplexity - CVSSAttackComplexity!
|
|
integrityImpact - CVSSCIAType!
|
|
confidentialityImpact - CVSSCIAType!
|
|
availabilityImpact - CVSSCIAType!
|
|
userInteraction - CVSSUserInteractionType!
|
|
privilegesRequired - CVSSPrivilegesRequiredType!
|
|
scope - CVSSScopeType!
|
Example
{
"vector": "abc123",
"baseScore": 987.65,
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"integrityImpact": "NONE",
"confidentialityImpact": "NONE",
"availabilityImpact": "NONE",
"userInteraction": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED"
}
CVSSAttackComplexity
Values
Enum Value | Description |
---|---|
|
|
|
|
|
Example
"LOW"
CVSSAttackVector
Values
Enum Value | Description |
---|---|
|
|
|
|
|
|
|
Example
"NETWORK"
CVSSAuthenticationType
Values
Enum Value | Description |
---|---|
|
|
|
|
|
Example
"NONE"
CVSSCIAType
Values
Enum Value | Description |
---|---|
|
|
|
|
|
|
|
|
|
Example
"NONE"
CVSSPrivilegesRequiredType
Values
Enum Value | Description |
---|---|
|
|
|
|
|
Example
"NONE"
CVSSScopeType
Values
Enum Value | Description |
---|---|
|
|
|
Example
"UNCHANGED"
CVSSUserInteractionType
Values
Enum Value | Description |
---|---|
|
|
|
Example
"NONE"
CWE
CWEID
Example
CWEID
Certificate
Fields
Field Name | Description |
---|---|
id - ID!
|
|
fingerprintSha1 - String!
|
|
fingerprintSha256 - String!
|
|
details - String!
|
OpenSSL text output of the certificate |
issuer - String!
|
|
subject - String!
|
|
pem - String!
|
PEM encoded certificate |
notBefore - Datetime!
|
|
notAfter - Datetime!
|
|
signatureAlgorithmOid - String!
|
|
file - RegularFile!
|
|
privateKeys - [PrivateKey!]!
|
Example
{
"id": 4,
"fingerprintSha1": "xyz789",
"fingerprintSha256": "xyz789",
"details": "abc123",
"issuer": "xyz789",
"subject": "abc123",
"pem": "xyz789",
"notBefore": Datetime,
"notAfter": Datetime,
"signatureAlgorithmOid": "abc123",
"file": RegularFile,
"privateKeys": [PrivateKey]
}
CertificateCAVerificationFailedIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
certificate - Certificate!
|
|
verificationError - CertificateVerificationError!
|
Example
{
"id": "4",
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"certificate": Certificate,
"verificationError": "SELF_SIGNED"
}
CertificateExpiredIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
certificate - Certificate!
|
Example
{
"id": 4,
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"certificate": Certificate
}
CertificateKeyLengthIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
certificate - Certificate!
|
|
keyType - String!
|
|
keyLength - Int!
|
Example
{
"id": 4,
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"certificate": Certificate,
"keyType": "xyz789",
"keyLength": 123
}
CertificateRSAPublicExponentIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
certificate - Certificate!
|
|
exponent - Int!
|
Example
{
"id": "4",
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"certificate": Certificate,
"exponent": 987
}
CertificateSignatureIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
certificate - Certificate!
|
|
signatureOid - String!
|
|
signatureName - String!
|
Example
{
"id": 4,
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"certificate": Certificate,
"signatureOid": "xyz789",
"signatureName": "xyz789"
}
CertificateTrustedCAMissmatchIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
certificate - Certificate!
|
|
missmatchType - TrustedCAMissmatch!
|
Example
{
"id": "4",
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"certificate": Certificate,
"missmatchType": "RENEWED"
}
CertificateVerificationError
Values
Enum Value | Description |
---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Example
"SELF_SIGNED"
CertificateVerificationFailedIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
certificate - Certificate!
|
|
verificationError - CertificateVerificationError!
|
Example
{
"id": 4,
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"certificate": Certificate,
"verificationError": "SELF_SIGNED"
}
CertificateVersionIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
certificate - Certificate!
|
|
version - String!
|
Example
{
"id": "4",
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"certificate": Certificate,
"version": "abc123"
}
Chunk
Fields
Field Name | Description |
---|---|
parentFile - RegularFile!
|
|
index - Int!
|
|
startOffset - BigInt!
|
|
endOffset - BigInt!
|
|
size - BigInt!
|
|
extractedRoot - Directory
|
|
type - String!
|
|
stableKey - String!
|
|
meanEntropy - Float
|
|
entropy - Entropy
|
|
extractedSize - BigInt!
|
|
extractedRootPath - String
|
|
extractionProblems - [BlobExtractionProblem!]!
|
Example
{
"parentFile": RegularFile,
"index": 123,
"startOffset": {},
"endOffset": {},
"size": {},
"extractedRoot": Directory,
"type": "xyz789",
"stableKey": "xyz789",
"meanEntropy": 987.65,
"entropy": Entropy,
"extractedSize": {},
"extractedRootPath": "xyz789",
"extractionProblems": [BlobExtractionProblem]
}
CodeInjectionIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
problem - Statement!
|
|
source - Statement!
|
|
propagators - [Statement!]!
|
Example
{
"id": 4,
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"problem": Statement,
"source": Statement,
"propagators": [Statement]
}
CommandInjectionIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
problem - Statement!
|
|
source - Statement!
|
|
propagators - [Statement!]!
|
Example
{
"id": "4",
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"problem": Statement,
"source": Statement,
"propagators": [Statement]
}
ComparisonCount
CompiledUnit
ComplianceAnalysisFindingRule
Fields
Field Name | Description |
---|---|
suggestion - ComplianceItemSuggestion!
|
|
cveQuery - String
|
|
issueQuery - String
|
|
argument - String
|
Example
{
"suggestion": "YES",
"cveQuery": "abc123",
"issueQuery": "abc123",
"argument": "abc123"
}
ComplianceAuxiliaryProperty
ComplianceBundle
Fields
Field Name | Description |
---|---|
id - ID!
|
|
guideline - ComplianceGuideline!
|
|
createdBy - String!
|
|
createdAt - Datetime!
|
|
description - String
|
|
state - GenerationState!
|
|
size - BigInt
|
|
sha256 - String
|
|
downloadUrl - String
|
Example
{
"id": "4",
"guideline": ComplianceGuideline,
"createdBy": "abc123",
"createdAt": Datetime,
"description": "abc123",
"state": "GENERATING",
"size": {},
"sha256": "xyz789",
"downloadUrl": "xyz789"
}
ComplianceBundleCreateInput
ComplianceBundleCreateResult
Types
Union Types |
---|
Example
ComplianceBundle
ComplianceBundleFilter
Fields
Input Field | Description |
---|---|
guidelineId - ID
|
Example
{"guidelineId": "4"}
ComplianceChapter
Fields
Field Name | Description |
---|---|
id - ID!
|
|
type - ComplianceChapterType!
|
|
sections - [ComplianceGuidelineSection!]!
|
|
extras - [ComplianceExtra!]!
|
Example
{
"id": "4",
"type": "REQUIREMENTS",
"sections": [ComplianceGuidelineSection],
"extras": [ComplianceExtra]
}
ComplianceChapterType
Values
Enum Value | Description |
---|---|
|
|
|
|
|
Example
"REQUIREMENTS"
ComplianceDefaultSuggestionRule
Fields
Field Name | Description |
---|---|
suggestion - ComplianceItemSuggestion!
|
Example
{"suggestion": "YES"}
ComplianceExtra
Fields
Field Name | Description |
---|---|
id - ID!
|
|
title - String!
|
|
description - String
|
|
columns - [ComplianceAuxiliaryProperty!]!
|
|
relatedProvisions - [ComplianceProvision!]!
|
Example
{
"id": 4,
"title": "xyz789",
"description": "xyz789",
"columns": [ComplianceAuxiliaryProperty],
"relatedProvisions": [ComplianceProvision]
}
ComplianceExtraItem
Fields
Field Name | Description |
---|---|
id - ID!
|
|
guideline - ComplianceGuideline!
|
|
chapter - ComplianceChapter!
|
|
extra - ComplianceExtra!
|
|
data - DataTable!
|
Example
{
"id": "4",
"guideline": ComplianceGuideline,
"chapter": ComplianceChapter,
"extra": ComplianceExtra,
"data": DataTable
}
ComplianceExtraItemFilter
ComplianceExtraItemUpdateInput
Fields
Input Field | Description |
---|---|
firmwareId - ID!
|
|
extraId - ID!
|
|
data - DataTableInput!
|
NOTE: Already stored data will be overridden |
Example
{
"firmwareId": "4",
"extraId": "4",
"data": DataTableInput
}
ComplianceExtraItemUpdateResult
Types
Union Types |
---|
Example
ComplianceExtraItem
ComplianceGuideline
Fields
Field Name | Description |
---|---|
id - ID!
|
|
title - String!
|
|
publisherName - String!
|
|
publisherType - ComplianceGuidelinePublisherType!
|
|
publicationDate - Date!
|
|
url - String!
|
|
auxiliaryProperties - [ComplianceAuxiliaryProperty!]!
|
|
summary - String!
|
|
chapters - [ComplianceChapter!]!
|
Example
{
"id": "4",
"title": "xyz789",
"publisherName": "abc123",
"publisherType": "GOVERNMENT_ORGANISATION",
"publicationDate": "2007-12-03",
"url": "xyz789",
"auxiliaryProperties": [ComplianceAuxiliaryProperty],
"summary": "xyz789",
"chapters": [ComplianceChapter]
}
ComplianceGuidelinePublisherType
Values
Enum Value | Description |
---|---|
|
|
|
|
|
|
|
Example
"GOVERNMENT_ORGANISATION"
ComplianceGuidelineSection
Description
A section or chapter of a compliance guideline, which groups similar guideline provisions.
Fields
Field Name | Description |
---|---|
id - ID!
|
|
title - String!
|
|
provisions - [ComplianceProvision!]!
|
Example
{
"id": 4,
"title": "xyz789",
"provisions": [ComplianceProvision]
}
ComplianceItem
Fields
Field Name | Description |
---|---|
id - ID!
|
|
guideline - ComplianceGuideline!
|
|
chapter - ComplianceChapter!
|
|
section - ComplianceGuidelineSection!
|
|
provision - ComplianceProvision!
|
|
currentData - ComplianceItemData!
|
|
latestData - ComplianceItemData!
|
|
claim - ComplianceItemClaim
|
|
argument - String
|
|
status - ComplianceItemStatus!
|
Example
{
"id": 4,
"guideline": ComplianceGuideline,
"chapter": ComplianceChapter,
"section": ComplianceGuidelineSection,
"provision": ComplianceProvision,
"currentData": ComplianceItemData,
"latestData": ComplianceItemData,
"claim": "NOT_APPLICABLE",
"argument": "xyz789",
"status": "UP_TO_DATE"
}
ComplianceItemClaim
Values
Enum Value | Description |
---|---|
|
|
|
|
|
Example
"NOT_APPLICABLE"
ComplianceItemData
Fields
Field Name | Description |
---|---|
createdAt - Datetime!
|
|
revision - String!
|
|
analysis - Analysis!
|
|
issues - [Issue!]!
|
|
cveMatches - [CVEMatch!]!
|
|
suggestion - ComplianceItemSuggestion!
|
|
argument - String
|
Example
{
"createdAt": Datetime,
"revision": "xyz789",
"analysis": Analysis,
"issues": [Issue],
"cveMatches": [CVEMatch],
"suggestion": "YES",
"argument": "xyz789"
}
ComplianceItemFilter
ComplianceItemStatus
Values
Enum Value | Description |
---|---|
|
|
|
|
|
|
|
Example
"UP_TO_DATE"
ComplianceItemSuggestion
Values
Enum Value | Description |
---|---|
|
|
|
|
|
|
|
Example
"YES"
ComplianceItemUpdateInput
Fields
Input Field | Description |
---|---|
id - ID!
|
|
claim - ComplianceItemClaim!
|
|
argument - String!
|
|
latestRevision - String!
|
latestRevision is a data integrity guard: it must match with latestData.revision on the backend for the request to succeed. If the revisions match, latestData copied over to currentData and the |
Example
{
"id": 4,
"claim": "NOT_APPLICABLE",
"argument": "xyz789",
"latestRevision": "abc123"
}
ComplianceItemUpdateResult
Types
Union Types |
---|
Example
ComplianceItemUpdateResults
ComplianceItemUpdateResults
Description
We return all compliance items that are changed as a result of the mutation (eg: the one that was changed, plus all the ones that depend directly or indirectly on this.)
Fields
Field Name | Description |
---|---|
items - [ComplianceItem!]!
|
Example
{"items": [ComplianceItem]}
ComplianceProvision
Fields
Field Name | Description |
---|---|
id - ID!
|
|
title - String!
|
|
requirement - String
|
|
problemBackground - String
|
|
solution - String
|
|
rules - [ComplianceRule!]!
|
|
relatedExtras - [ComplianceExtra!]!
|
Example
{
"id": "4",
"title": "abc123",
"requirement": "abc123",
"problemBackground": "xyz789",
"solution": "abc123",
"rules": [ComplianceRule],
"relatedExtras": [ComplianceExtra]
}
ComplianceProvisionRule
Fields
Field Name | Description |
---|---|
suggestion - ComplianceItemSuggestion!
|
|
provision - ComplianceProvision!
|
|
provisionResult - ComplianceItemSuggestion!
|
|
argument - String
|
Example
{
"suggestion": "YES",
"provision": ComplianceProvision,
"provisionResult": "YES",
"argument": "abc123"
}
ComplianceRule
Fields
Field Name | Description |
---|---|
suggestion - ComplianceItemSuggestion!
|
Possible Types
ComplianceRule Types |
---|
Example
{"suggestion": "YES"}
Component
Description
A software component with version information (package, library, module, application, kernel etc.)
Fields
Field Name | Description |
---|---|
key - String!
|
Uniquely identifies the component across analyses |
name - String!
|
|
version - String!
|
|
update - String!
|
|
files - [RegularFile!]!
|
|
fileCount - Int!
|
|
cpes - [String!]!
|
List of CPEs (Common Platform Enumeration) |
licenses - [String!]!
|
|
license_explanation - String
|
|
tags - [ComponentTag!]!
|
|
cveMatches - [CVEMatch!]!
|
|
Arguments
|
|
cveMatchCount - SeverityCounts!
|
|
Arguments
|
|
possibleVersions - [String!]!
|
|
evidences - [ComponentEvidence!]!
|
|
isOutdated - Boolean!
|
Example
{
"key": "xyz789",
"name": "xyz789",
"version": "xyz789",
"update": "xyz789",
"files": [RegularFile],
"fileCount": 123,
"cpes": ["abc123"],
"licenses": ["abc123"],
"license_explanation": "xyz789",
"tags": ["CRYPTOGRAPHY"],
"cveMatches": [CVEMatch],
"cveMatchCount": SeverityCounts,
"possibleVersions": ["xyz789"],
"evidences": [ComponentEvidence],
"isOutdated": true
}
ComponentEvidence
Fields
Field Name | Description |
---|---|
id - ID!
|
|
type - ComponentEvidenceType!
|
|
name - String!
|
Uniquely identifies the component across analyses |
version - String!
|
|
possibleVersions - [String!]!
|
|
update - String!
|
|
files - [RegularFile!]!
|
|
cpes - [String!]!
|
List of CPEs (Common Platform Enumeration) |
licenses - [String!]!
|
|
license_explanation - String
|
|
tags - [ComponentTag!]!
|
Example
{
"id": "4",
"type": "BINARY_COMPILED_UNIT",
"name": "abc123",
"version": "xyz789",
"possibleVersions": ["abc123"],
"update": "abc123",
"files": [RegularFile],
"cpes": ["abc123"],
"licenses": ["xyz789"],
"license_explanation": "xyz789",
"tags": ["CRYPTOGRAPHY"]
}
ComponentEvidenceType
Values
Enum Value | Description |
---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Example
"BINARY_COMPILED_UNIT"
ComponentFilter
Fields
Input Field | Description |
---|---|
tag - ComponentTag
|
|
name - String
|
|
version - String
|
|
update - String
|
|
filePath - String
|
Example
{
"tag": "CRYPTOGRAPHY",
"name": "abc123",
"version": "xyz789",
"update": "xyz789",
"filePath": "abc123"
}
ComponentTag
Values
Enum Value | Description |
---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Example
"CRYPTOGRAPHY"
ComponentsComparison
Fields
Field Name | Description |
---|---|
new - [Component!]!
|
|
dropped - [Component!]!
|
|
newCount - Int!
|
|
droppedCount - Int!
|
Example
{
"new": [Component],
"dropped": [Component],
"newCount": 123,
"droppedCount": 123
}
Confidence
Values
Enum Value | Description |
---|---|
|
|
|
|
|
Example
"HIGH"
ContentFilter
Description
Only one of these can be specified at the same time
Fields
Input Field | Description |
---|---|
string - StringFilter
|
To search by string, at least 4 characters need to be specified |
importedFunction - StringFilter
|
|
exportedFunction - StringFilter
|
|
symbol - StringFilter
|
Example
{
"string": StringFilter,
"importedFunction": StringFilter,
"exportedFunction": StringFilter,
"symbol": StringFilter
}
CreateReportLinkInput
CreatedApiToken
CreatedReportLink
DataTable
Fields
Field Name | Description |
---|---|
rows - [DataTableRow!]!
|
Example
{"rows": [DataTableRow]}
DataTableInput
Fields
Input Field | Description |
---|---|
rows - [DataTableRowInput!]!
|
Example
{"rows": [DataTableRowInput]}
DataTableRow
Fields
Field Name | Description |
---|---|
columns - [Property!]!
|
Example
{"columns": [Property]}
DataTableRowInput
Fields
Input Field | Description |
---|---|
columns - [PropertyInput]!
|
Example
{"columns": [PropertyInput]}
Date
Example
"2007-12-03"
Datetime
Description
ISO 8601 formatted time
Example
Datetime
DatetimeRange
Directory
Example
{
"path": "xyz789",
"name": "xyz789",
"firmware": Firmware,
"parentBlob": Blob,
"stableKey": "abc123",
"blobRelativePath": "abc123",
"multiFile": MultiFile
}
DropbearCLIArgumentIssue
Example
{
"id": "4",
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"name": "abc123",
"line": "abc123"
}
ELFCategory
Values
Enum Value | Description |
---|---|
|
General crypto |
|
DSA related crypto |
|
SSL/TLS communication related |
|
RSA related crypto |
|
Diffie-Hellman related |
|
AES related crypto, may indicate hard-coded keys |
|
DES related crypto, may indicate hard-coded keys. |
|
Low-level ASN1 manipulation |
|
BASE64 encoding/decoding |
|
X509 certificate related |
|
Operation on PEM files |
|
Elliptic curve crypto |
|
PKCS related |
|
HASH function |
|
Blowfish related crypto, may indicate hard-coded keys |
|
Pluggable Authentication Module (PAM) related authentication. See 'man 3 pam' |
|
General networking |
|
Command execution, usually safe, but unsafe when a specific argument passed to the command is controlled by a user. Lower-risk than UNSAFE_COMMAND_EXEC |
|
Unsafe string manipulation, without bounds checking. Source string - and therefore length - is controlled by a user. The bounds of the destination buffer may be overflowed. |
|
Unsafe string manipulation with bounds checking. Unsafe when the length field is controlled by user input. |
|
Unsafe command execution when any part of the buffer passed to the command execution string is controlled by a user |
Example
"CRYPTO"
ELFDetails
Fields
Field Name | Description |
---|---|
symbols - [ELFSymbol!]!
|
Example
{"symbols": [ELFSymbol]}
ELFInfo
Description
ELF specific file information.
Fields
Field Name | Description |
---|---|
machine - String!
|
Machine information |
bits - BitLength!
|
Bits of the architecture 8/16/32/64 |
canary - Boolean!
|
Stack canary compile time flag |
compiler - String
|
Compiler used |
endian - Endian!
|
Endianness of the file |
interpreter - String
|
Interpreter for the binary |
nx - Boolean!
|
Non-executable stack |
pic - Boolean!
|
Position-independent code (PIC) or position-independent executable (PIE), enables Address space layout randomization (ASLR) |
relro - ELFRelRO!
|
Relocation Read-Only |
rpath - String
|
Run-time search path (Rpath) |
static - Boolean!
|
Statically linked |
stripped - Boolean!
|
Debug symbols are stripped |
cpuFamily - String
|
Determines the processor architecture together with machine, endian and bits (like ARM version or presence of hardware float support) |
loadAddress - BigInt
|
The address, where the binary is loaded at run-time |
categories - [ELFCategory!]!
|
ELF category based on imported functions |
neededLibraries - [String!]!
|
Example
{
"machine": "xyz789",
"bits": BitLength,
"canary": false,
"compiler": "abc123",
"endian": "LITTLE",
"interpreter": "abc123",
"nx": false,
"pic": false,
"relro": "FULL",
"rpath": "xyz789",
"static": false,
"stripped": false,
"cpuFamily": "abc123",
"loadAddress": {},
"categories": ["CRYPTO"],
"neededLibraries": ["xyz789"]
}
ELFMissingCanaryIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
Example
{
"id": "4",
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE"
}
ELFMissingFullRelROIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
Example
{
"id": 4,
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE"
}
ELFMissingNXIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
Example
{
"id": 4,
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE"
}
ELFNonPICIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
Example
{
"id": "4",
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE"
}
ELFNonStrippedIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
Example
{
"id": 4,
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE"
}
ELFRelRO
Values
Enum Value | Description |
---|---|
|
Full Relocation Read-Only (RELRO), Global Offset Table (GOT) is read-only |
|
Partial Relocation Read-Only (RELRO), non Procedure Linkage Table (PLT) part of Global Offset Table (GOT) is read-only. PLT part is writeable. |
|
No Relocation Read-Only (RELRO), Global Offset Table (GOT) is writeable. |
Example
"FULL"
ELFSymbol
Example
{
"name": "xyz789",
"exported": true,
"imported": true,
"function": false,
"static": false,
"variable": true,
"compiledUnits": [CompiledUnit],
"offset": {},
"size": {}
}
Endian
Values
Enum Value | Description |
---|---|
|
|
|
Example
"LITTLE"
Entropy
Error
ExtractionProblem
Possible Types
ExtractionProblem Types |
---|
Example
{"critical": false, "description": "abc123"}
File
Fields
Field Name | Description |
---|---|
path - String!
|
|
name - String!
|
|
firmware - Firmware!
|
|
parentBlob - Blob
|
|
stableKey - String!
|
|
blobRelativePath - String!
|
|
multiFile - MultiFile
|
Possible Types
File Types |
---|
Example
{
"path": "xyz789",
"name": "abc123",
"firmware": Firmware,
"parentBlob": Blob,
"stableKey": "abc123",
"blobRelativePath": "xyz789",
"multiFile": MultiFile
}
FileAnalysisError
Fields
Field Name | Description |
---|---|
step - String!
|
|
type - FileAnalysisErrorType!
|
|
description - String
|
Example
{
"step": "xyz789",
"type": "PROCESSING_FAILED",
"description": "xyz789"
}
FileAnalysisErrorType
Values
Enum Value | Description |
---|---|
|
|
|
Example
"PROCESSING_FAILED"
FileContentResult
Fields
Field Name | Description |
---|---|
match - String!
|
The full content that was matched by the query |
file - RegularFile!
|
Example
{
"match": "abc123",
"file": RegularFile
}
FileExtractionProblem
FileInclusionIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
problem - Statement!
|
|
source - Statement!
|
|
propagators - [Statement!]!
|
Example
{
"id": 4,
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"problem": Statement,
"source": Statement,
"propagators": [Statement]
}
FileTag
Values
Enum Value | Description |
---|---|
|
Flags the file if it contains dangerous function call that could lead to a vulnerability if not used properly. The analysis checks these function calls to identify issues. |
|
Example
"POTENTIALLY_VULNERABLE"
FileTagFilter
Fields
Input Field | Description |
---|---|
include - [FileTag!]
|
Include files with any of these tags set |
Example
{"include": ["POTENTIALLY_VULNERABLE"]}
FilesFilter
Fields
Input Field | Description |
---|---|
name - StringFilter
|
When both are specified name AND path will also match. |
path - PathFilter
|
|
category - StringFilter
|
|
parentBlob - BlobFilter
|
|
size - IntFilter
|
|
tag - FileTagFilter
|
Example
{
"name": StringFilter,
"path": PathFilter,
"category": StringFilter,
"parentBlob": BlobFilter,
"size": IntFilter,
"tag": FileTagFilter
}
FindingType
Values
Enum Value | Description |
---|---|
|
|
|
Example
"ISSUE"
Firmware
Fields
Field Name | Description |
---|---|
id - ID!
|
|
name - String!
|
|
uploadTime - Datetime!
|
|
version - String
|
|
notes - String
|
|
totalSize - BigInt
|
|
binary - FirmwareBinary
|
|
sbom - FirmwareSBOM
|
|
analysisConfiguration - AnalysisConfiguration!
|
|
analyses - [Analysis!]!
|
|
Arguments
|
|
latestAnalysisTime - Datetime
|
|
latestAnalysis - Analysis
|
|
fileCount - Int
|
|
Arguments
|
|
files - [File!]!
|
|
Arguments
|
|
blobs - [Blob!]!
|
|
Arguments
|
|
processing - Processing!
|
|
monitoring - Boolean!
|
|
uploader - String!
|
|
componentCount - Int
|
|
Arguments
|
|
components - [Component!]!
|
|
Arguments
|
|
certificates - [Certificate!]!
|
|
privateKeys - [PrivateKey!]!
|
|
latestIssues - [Issue!]!
|
|
Arguments
|
|
fileContent - [FileContentResult!]!
|
Search in the content of the files. Result is limited to 100 matches |
Arguments
|
|
releaseDate - Date
|
|
product - Product!
|
|
complianceItems - [ComplianceItem!]!
|
|
Arguments
|
|
complianceExtraItems - [ComplianceExtraItem!]!
|
|
Arguments
|
|
elfDetails - ELFDetails
|
|
Arguments
|
|
managementProtocols - [ManagementProtocol!]!
|
|
downloadUrl - String!
|
|
spriteSheets - [SpriteSheet!]!
|
|
cveMatches - [CVEMatch!]!
|
|
Arguments
|
|
compareAnalyses - AnalysesComparison!
|
Compare two analyses (by ID) on a given firmware |
extractionProblems - [ExtractionProblem!]!
|
|
labels - [String!]!
|
|
properties - [Property!]!
|
|
supportingFiles - [SupportingFile!]!
|
|
complianceBundles - [ComplianceBundle!]!
|
|
Arguments
|
|
auditTrail - [AuditRecord!]!
|
|
Arguments
|
|
uris - [URI!]!
|
|
uriCount - Int
|
|
linkedLibraries - [LinkedLibrary!]!
|
Example
{
"id": "4",
"name": "xyz789",
"uploadTime": Datetime,
"version": "abc123",
"notes": "xyz789",
"totalSize": {},
"binary": FirmwareBinary,
"sbom": FirmwareSBOM,
"analysisConfiguration": AnalysisConfiguration,
"analyses": [Analysis],
"latestAnalysisTime": Datetime,
"latestAnalysis": Analysis,
"fileCount": 987,
"files": [File],
"blobs": [Blob],
"processing": ProcessingInProgress,
"monitoring": true,
"uploader": "abc123",
"componentCount": 987,
"components": [Component],
"certificates": [Certificate],
"privateKeys": [PrivateKey],
"latestIssues": [Issue],
"fileContent": [FileContentResult],
"releaseDate": "2007-12-03",
"product": Product,
"complianceItems": [ComplianceItem],
"complianceExtraItems": [ComplianceExtraItem],
"elfDetails": ELFDetails,
"managementProtocols": [ManagementProtocol],
"downloadUrl": "xyz789",
"spriteSheets": [SpriteSheet],
"cveMatches": [CVEMatch],
"compareAnalyses": AnalysesComparison,
"extractionProblems": [ExtractionProblem],
"labels": ["xyz789"],
"properties": [Property],
"supportingFiles": [SupportingFile],
"complianceBundles": [ComplianceBundle],
"auditTrail": [AuditRecord],
"uris": [URI],
"uriCount": 987,
"linkedLibraries": [LinkedLibrary]
}
FirmwareAddComponentInput
Example
{
"firmwareId": 4,
"name": "abc123",
"version": "abc123",
"update": "xyz789",
"vendor": "xyz789",
"product": "xyz789",
"licenses": ["xyz789"],
"licenseExplanation": "abc123",
"tags": ["CRYPTOGRAPHY"]
}
FirmwareBinary
FirmwareComponentEditResult
Types
Union Types |
---|
Example
Component
FirmwareDeleteComponentInput
FirmwareFilter
Fields
Input Field | Description |
---|---|
uploadTime - DatetimeRange
|
Example
{"uploadTime": DatetimeRange}
FirmwareProcessingUpdate
Fields
Field Name | Description |
---|---|
firmwareID - ID!
|
|
name - String!
|
|
processing - Processing!
|
Example
{
"firmwareID": "4",
"name": "xyz789",
"processing": ProcessingInProgress
}
FirmwareReviewInput
FirmwareSBOM
FirmwareSupportingFileDeleteInput
FirmwareTimelineItem
Fields
Field Name | Description |
---|---|
firmware - Firmware!
|
|
previousComparison - AnalysesComparison
|
Example
{
"firmware": Firmware,
"previousComparison": AnalysesComparison
}
FirmwareUpdateComponentInput
Fields
Input Field | Description |
---|---|
firmwareId - ID!
|
|
componentKey - String!
|
|
name - String
|
|
version - String
|
|
update - String
|
|
vendor - String
|
Fields "vendor" and "product" are interdependent and must be updated together |
product - String
|
|
licenses - [String!]
|
Must be valid SPDX identifier or "proprietary" |
licenseExplanation - String
|
|
tags - [ComponentTag!]
|
Example
{
"firmwareId": "4",
"componentKey": "xyz789",
"name": "xyz789",
"version": "abc123",
"update": "abc123",
"vendor": "xyz789",
"product": "xyz789",
"licenses": ["abc123"],
"licenseExplanation": "abc123",
"tags": ["CRYPTOGRAPHY"]
}
FirmwareUpdateInput
Fields
Input Field | Description |
---|---|
id - ID!
|
|
firmware - FirmwareUpdateMetadataInput
|
|
product - ProductUpdateInput
|
Example
{
"id": "4",
"firmware": FirmwareUpdateMetadataInput,
"product": ProductUpdateInput
}
FirmwareUpdateMetadataInput
Example
{
"name": "xyz789",
"version": "xyz789",
"releaseDate": "2007-12-03",
"notes": "abc123",
"labels": ["abc123"],
"properties": [PropertyInput],
"analysisConfigurationId": "4"
}
FirmwareUpdateResult
Types
Union Types |
---|
Example
Firmware
FirmwareUploadInput
Fields
Input Field | Description |
---|---|
firmware - FirmwareUploadMetadataInput!
|
|
product - ProductInput!
|
|
productGroup - IDInput!
|
Example
{
"firmware": FirmwareUploadMetadataInput,
"product": ProductInput,
"productGroup": IDInput
}
FirmwareUploadMetadata
FirmwareUploadMetadataInput
Fields
Input Field | Description |
---|---|
name - String!
|
Human Readable name of the Firmware |
version - String
|
|
releaseDate - Date
|
|
notes - String
|
Any kind of free-text notes for the uploaded firmware |
enableMonitoring - Boolean
|
Enable regular (daily) monitoring of this firmware |
labels - [String!]
|
|
properties - [PropertyInput!]
|
|
analysisConfigurationId - ID
|
When set omitted (or set to null), the Default analysis configuration will be used |
Example
{
"name": "xyz789",
"version": "xyz789",
"releaseDate": "2007-12-03",
"notes": "xyz789",
"enableMonitoring": false,
"labels": ["xyz789"],
"properties": [PropertyInput],
"analysisConfigurationId": "4"
}
FirmwareUploadResult
Types
Union Types |
---|
Example
FirmwareUploadMetadata
Float
Description
The Float
scalar type represents signed double-precision fractional values as specified by IEEE 754.
Example
123.45
FormatStringIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
problem - Statement!
|
|
source - Statement!
|
|
propagators - [Statement!]!
|
Example
{
"id": 4,
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"problem": Statement,
"source": Statement,
"propagators": [Statement]
}
GenerateReportInput
Example
{
"reportConfigurationId": 4,
"firmwareIds": [4],
"title": "xyz789",
"classification": "xyz789",
"project": "xyz789"
}
GenerateReportResult
Types
Union Types |
---|
Example
Report
GenerationState
Values
Enum Value | Description |
---|---|
|
|
|
|
|
Example
"GENERATING"
HardcodedAccountPassword
Values
Enum Value | Description |
---|---|
|
|
|
|
|
|
|
Example
"EMPTY_PASSWORD"
HardcodedAccountPasswordIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
line - String!
|
|
user - String
|
|
password - String
|
|
hash - String
|
|
hashType - HardcodedHashType
|
|
passwordType - HardcodedAccountPassword!
|
Example
{
"id": "4",
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"line": "abc123",
"user": "abc123",
"password": "xyz789",
"hash": "xyz789",
"hashType": "DES_CRYPT",
"passwordType": "EMPTY_PASSWORD"
}
HardcodedCredentialIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
user - String
|
|
password - String!
|
|
line - String!
|
|
credentialType - HardcodedCredentialType!
|
Example
{
"id": "4",
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"user": "xyz789",
"password": "xyz789",
"line": "abc123",
"credentialType": "AWS_CREDENTIALS"
}
HardcodedCredentialType
Values
Enum Value | Description |
---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Example
"AWS_CREDENTIALS"
HardcodedHashType
Values
Enum Value | Description |
---|---|
|
|
|
|
|
|
|
|
|
Example
"DES_CRYPT"
HardcodedPrivateKeyCertificateIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
certificate - Certificate!
|
|
privateKey - PrivateKey!
|
Example
{
"id": "4",
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"certificate": Certificate,
"privateKey": PrivateKey
}
HardcodedSSHHostKeyIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
privateKey - PrivateKey!
|
Example
{
"id": 4,
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"privateKey": PrivateKey
}
Hash
HeaderInjectionIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
problem - Statement!
|
|
source - Statement!
|
|
propagators - [Statement!]!
|
Example
{
"id": 4,
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"problem": Statement,
"source": Statement,
"propagators": [Statement]
}
ID
Description
The ID
scalar type represents a unique identifier, often used to refetch an object or as key for a cache. The ID type appears in a JSON response as a String; however, it is not intended to be human-readable. When expected as an input type, any string (such as "4"
) or integer (such as 4
) input value will be accepted as an ID.
Example
"4"
IDInput
Fields
Input Field | Description |
---|---|
id - ID!
|
Example
{"id": 4}
InformationLeakageDSStoreIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
entries - [String!]!
|
Example
{
"id": "4",
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"entries": ["abc123"]
}
InformationLeakagePHPInfoIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
problem - Statement!
|
Example
{
"id": "4",
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"problem": Statement
}
InformationLeakageSVNIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
info - String!
|
Example
{
"id": "4",
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"info": "abc123"
}
InformationLeakageVIMSwapIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
user - String!
|
|
host - String!
|
|
originalFilename - String!
|
|
vimVersion - String!
|
Example
{
"id": 4,
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"user": "xyz789",
"host": "xyz789",
"originalFilename": "abc123",
"vimVersion": "xyz789"
}
InsecureDeserializationIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
problem - Statement!
|
|
source - Statement!
|
|
propagators - [Statement!]!
|
Example
{
"id": 4,
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"problem": Statement,
"source": Statement,
"propagators": [Statement]
}
InsecureManagementProtocolIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
name - String!
|
Example
{
"id": 4,
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"name": "abc123"
}
Int
Description
The Int
scalar type represents non-fractional signed whole numeric values. Int can represent values between -(2^31) and 2^31 - 1.
Example
987
IntFilter
InternalError
InvalidCertificateIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
certificate - Certificate!
|
|
error - String!
|
Example
{
"id": "4",
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"certificate": Certificate,
"error": "xyz789"
}
Issue
Description
The base for any issues
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
Possible Types
Issue Types |
---|
Example
{
"id": 4,
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE"
}
IssueDoc
Example
{
"type": "abc123",
"summary": "xyz789",
"description": "xyz789",
"mitigation": "abc123",
"cwes": [CWE],
"references": [Reference]
}
IssuesComparison
IssuesFilter
Fields
Input Field | Description |
---|---|
severity - Severity
|
When multiple criteria are specified, it means AND logic. |
confidence - Confidence
|
|
id - ID
|
|
typename - String
|
|
elf - Boolean
|
Limit to (true) or exclude (false) ELF related issues |
status - StatusFilter
|
|
comment - String
|
Any of the audit trail comments contain the specified string, case insensitive |
Example
{
"severity": "CRITICAL",
"confidence": "HIGH",
"id": 4,
"typename": "xyz789",
"elf": true,
"status": StatusFilter,
"comment": "abc123"
}
IssuesWithUpdatedStatus
Fields
Field Name | Description |
---|---|
issues - [Issue!]!
|
Example
{"issues": [Issue]}
LinkedLibrary
Fields
Field Name | Description |
---|---|
file - RegularFile!
|
|
name - String!
|
|
libraryFiles - [RegularFile!]!
|
Example
{
"file": RegularFile,
"name": "xyz789",
"libraryFiles": [RegularFile]
}
LooseEqualityIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
problem - Statement!
|
Example
{
"id": 4,
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"problem": Statement
}
MaliciousSoftwareIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
name - String!
|
Example
{
"id": "4",
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"name": "xyz789"
}
ManagementProtocol
Fields
Field Name | Description |
---|---|
protocol - String!
|
|
file - RegularFile!
|
|
references - [Reference!]!
|
|
description - String!
|
Example
{
"protocol": "abc123",
"file": RegularFile,
"references": [Reference],
"description": "xyz789"
}
MissingPeerVerificationIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
line - String!
|
Example
{
"id": "4",
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"line": "xyz789"
}
MultiFile
Example
{
"stableKey": "abc123",
"extractedRoot": Directory,
"type": "abc123",
"parentFiles": [File],
"size": {},
"extractedSize": {},
"extractedRootPath": "xyz789",
"extractionProblems": [BlobExtractionProblem]
}
MutationError
NotFoundError
ObjectInstantiationIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
problem - Statement!
|
|
source - Statement!
|
|
propagators - [Statement!]!
|
Example
{
"id": "4",
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"problem": Statement,
"source": Statement,
"propagators": [Statement]
}
ObsoleteProtocolIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
line - String!
|
Example
{
"id": "4",
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"line": "abc123"
}
OpenSSHDaemonOptionIssue
Example
{
"id": "4",
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"name": "xyz789",
"line": "xyz789"
}
OtherFile
Example
{
"path": "abc123",
"name": "abc123",
"firmware": Firmware,
"parentBlob": Blob,
"stableKey": "xyz789",
"blobRelativePath": "xyz789",
"multiFile": MultiFile
}
PathFilter
Example
{
"equals": "abc123",
"contains": "xyz789",
"startsWith": "xyz789",
"parentDirectory": "abc123",
"caseSensitive": true
}
PathTraversalIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
problem - Statement!
|
|
source - Statement!
|
|
propagators - [Statement!]!
|
Example
{
"id": "4",
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"problem": Statement,
"source": Statement,
"propagators": [Statement]
}
Permission
Values
Enum Value | Description |
---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Example
"VIEW_TENANT"
PlaintextCommunicationIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
line - String!
|
Example
{
"id": 4,
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"line": "xyz789"
}
PrivateKey
Fields
Field Name | Description |
---|---|
id - ID!
|
|
key - String!
|
PEM encoded private key |
keySize - Int
|
|
keyType - String
|
|
publicKey - String
|
|
fingerprintMd5 - String
|
|
fingerprintSha256 - String
|
|
file - RegularFile!
|
|
shodanSsHostKeyCount - Int
|
|
certificates - [Certificate!]!
|
Example
{
"id": 4,
"key": "xyz789",
"keySize": 123,
"keyType": "xyz789",
"publicKey": "xyz789",
"fingerprintMd5": "xyz789",
"fingerprintSha256": "xyz789",
"file": RegularFile,
"shodanSsHostKeyCount": 123,
"certificates": [Certificate]
}
PrivateKeyIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
privateKey - PrivateKey!
|
Example
{
"id": 4,
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"privateKey": PrivateKey
}
PrivilegeEscalationIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
users - [String!]!
|
|
target_users - [String!]!
|
|
hosts - [String!]!
|
|
commands - [String!]!
|
Example
{
"id": "4",
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"users": ["xyz789"],
"target_users": ["abc123"],
"hosts": ["abc123"],
"commands": ["xyz789"]
}
Processing
Types
Union Types |
---|
Example
ProcessingInProgress
ProcessingFailed
ProcessingFinished
Fields
Field Name | Description |
---|---|
finishTime - Datetime!
|
Example
{"finishTime": Datetime}
ProcessingInProgress
Fields
Field Name | Description |
---|---|
state - State!
|
Example
{"state": "WAITING"}
Product
Fields
Field Name | Description |
---|---|
id - ID!
|
|
name - String!
|
|
vendor - String!
|
|
category - String
|
|
firmwareTimeline - [FirmwareTimelineItem!]
|
Firmwares ordered by upload time |
Arguments
|
|
productGroups - [ProductGroup!]!
|
Example
{
"id": "4",
"name": "xyz789",
"vendor": "xyz789",
"category": "abc123",
"firmwareTimeline": [FirmwareTimelineItem],
"productGroups": [ProductGroup]
}
ProductGroup
Description
Users with access to the ProductGroup can add new products to the group.
Fields
Field Name | Description |
---|---|
id - ID!
|
|
name - String!
|
|
description - String
|
|
products - [Product!]!
|
Example
{
"id": 4,
"name": "xyz789",
"description": "abc123",
"products": [Product]
}
ProductGroupCreateInput
ProductGroupDeleteInput
Fields
Input Field | Description |
---|---|
id - ID!
|
Example
{"id": "4"}
ProductGroupResult
Types
Union Types |
---|
Example
ProductGroup
ProductGroupUpdateInput
ProductInput
ProductUpdateInput
Property
PropertyInput
Reference
RegularFile
Description
A file object in a firmware
Fields
Field Name | Description |
---|---|
path - String!
|
|
name - String!
|
|
firmware - Firmware!
|
|
parentBlob - Blob
|
|
stableKey - String!
|
|
blobRelativePath - String!
|
|
multiFile - MultiFile
|
|
chunks - [Chunk!]!
|
|
elf - ELFInfo
|
|
category - String!
|
|
magic - String!
|
|
magicMime - String!
|
|
size - BigInt!
|
|
hash - Hash!
|
|
downloadUrl - String!
|
|
downloadDecompiledSourcesUrl - String
|
|
meanEntropy - Float
|
|
entropy - Entropy
|
|
extractionProblems - [FileExtractionProblem!]!
|
|
certificates - [Certificate!]!
|
|
privateKeys - [PrivateKey!]!
|
|
uris - [URI!]!
|
|
uriCount - Int!
|
|
analysisErrors - [FileAnalysisError!]!
|
|
tags - [FileTag!]!
|
Example
{
"path": "abc123",
"name": "abc123",
"firmware": Firmware,
"parentBlob": Blob,
"stableKey": "xyz789",
"blobRelativePath": "abc123",
"multiFile": MultiFile,
"chunks": [Chunk],
"elf": ELFInfo,
"category": "xyz789",
"magic": "abc123",
"magicMime": "xyz789",
"size": {},
"hash": Hash,
"downloadUrl": "abc123",
"downloadDecompiledSourcesUrl": "abc123",
"meanEntropy": 123.45,
"entropy": Entropy,
"extractionProblems": [FileExtractionProblem],
"certificates": [Certificate],
"privateKeys": [PrivateKey],
"uris": [URI],
"uriCount": 987,
"analysisErrors": [FileAnalysisError],
"tags": ["POTENTIALLY_VULNERABLE"]
}
Report
Fields
Field Name | Description |
---|---|
id - ID!
|
|
title - String!
|
|
classification - String!
|
|
generatedTime - Datetime!
|
|
reportConfiguration - ReportConfiguration
|
|
firmwares - [Firmware!]!
|
|
downloadUrl - String
|
URL where the report can be donwloaded from, when null report generation is still in progress |
size - Int
|
when null report generation is still in progress |
state - ReportGenerationState!
|
|
links - [ReportLink!]!
|
Example
{
"id": "4",
"title": "xyz789",
"classification": "xyz789",
"generatedTime": Datetime,
"reportConfiguration": ReportConfiguration,
"firmwares": [Firmware],
"downloadUrl": "xyz789",
"size": 987,
"state": "GENERATING",
"links": [ReportLink]
}
ReportConfiguration
Fields
Field Name | Description |
---|---|
id - ID!
|
|
name - String!
|
|
issueSeverities - [Severity!]!
|
|
analysisTechniqueDetails - Boolean!
|
Include description on the analysis techniques in the report |
complianceGuidelines - [ComplianceGuideline!]!
|
|
includeComments - Boolean!
|
|
includedStatuses - [Status!]!
|
Include issues/cves with any of these status set |
excludedStatuses - [Status!]!
|
Exclude issues/cves with any of these status set |
Example
{
"id": "4",
"name": "xyz789",
"issueSeverities": ["CRITICAL"],
"analysisTechniqueDetails": true,
"complianceGuidelines": [ComplianceGuideline],
"includeComments": false,
"includedStatuses": ["NONE"],
"excludedStatuses": ["NONE"]
}
ReportConfigurationCreateInput
Fields
Input Field | Description |
---|---|
name - String!
|
|
issueSeverities - [Severity!]
|
|
analysisTechniqueDetails - Boolean!
|
Include description on the analysis techniques in the report |
complianceGuidelineIds - [ID!]
|
|
includeComments - Boolean!
|
|
status - StatusFilter
|
Example
{
"name": "abc123",
"issueSeverities": ["CRITICAL"],
"analysisTechniqueDetails": false,
"complianceGuidelineIds": [4],
"includeComments": true,
"status": StatusFilter
}
ReportConfigurationDeleteInput
Fields
Input Field | Description |
---|---|
id - ID!
|
Example
{"id": "4"}
ReportConfigurationResult
Types
Union Types |
---|
Example
ReportConfiguration
ReportConfigurationUpdateInput
Fields
Input Field | Description |
---|---|
id - ID!
|
|
name - String
|
|
issueSeverities - [Severity!]
|
|
analysisTechniqueDetails - Boolean
|
Include description on the analysis techniques in the report |
complianceGuidelineIds - [ID!]
|
|
includeComments - Boolean
|
|
status - StatusFilter
|
Example
{
"id": "4",
"name": "xyz789",
"issueSeverities": ["CRITICAL"],
"analysisTechniqueDetails": true,
"complianceGuidelineIds": ["4"],
"includeComments": true,
"status": StatusFilter
}
ReportFilter
Fields
Input Field | Description |
---|---|
state - ReportGenerationState
|
Example
{"state": "GENERATING"}
ReportGenerationState
Values
Enum Value | Description |
---|---|
|
|
|
|
|
Example
"GENERATING"
ReportLink
ReportLinkResult
Types
Union Types |
---|
Example
CreatedReportLink
Role
Values
Enum Value | Description |
---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Example
"ADMIN"
SQLInjectionIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
problem - Statement!
|
|
source - Statement!
|
|
propagators - [Statement!]!
|
Example
{
"id": 4,
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"problem": Statement,
"source": Statement,
"propagators": [Statement]
}
ScriptMissingPeerVerificationIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
problem - Statement!
|
Example
{
"id": "4",
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"problem": Statement
}
ScriptPlaintextCommunicationIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
problem - Statement!
|
Example
{
"id": "4",
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"problem": Statement
}
Severity
Values
Enum Value | Description |
---|---|
|
|
|
|
|
|
|
|
|
Example
"CRITICAL"
SeverityCounts
Sprite
SpriteSheet
Fields
Field Name | Description |
---|---|
imageUrl - String!
|
|
sprites - [Sprite!]!
|
Example
{
"imageUrl": "abc123",
"sprites": [Sprite]
}
StackBufferOverflowIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
problem - Statement!
|
|
source - Statement!
|
|
propagators - [Statement!]!
|
Example
{
"id": "4",
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"problem": Statement,
"source": Statement,
"propagators": [Statement]
}
StartDangerousServiceIssue
Example
{
"id": "4",
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"name": "abc123",
"line": "xyz789"
}
State
Values
Enum Value | Description |
---|---|
|
|
|
Example
"WAITING"
Statement
Status
Values
Enum Value | Description |
---|---|
|
|
|
|
|
|
|
|
|
|
|
Example
"NONE"
StatusFilter
String
Description
The String
scalar type represents textual data, represented as UTF-8 character sequences. The String type is most often used by GraphQL to represent free-form human-readable text.
Example
"xyz789"
StringFilter
Example
{
"equals": "abc123",
"contains": "abc123",
"startsWith": "abc123",
"caseSensitive": false
}
SupportingFile
Example
{
"id": "4",
"originalFilename": "xyz789",
"mimeType": "xyz789",
"size": {},
"sha256": "abc123",
"downloadUrl": "abc123",
"uploader": "abc123",
"uploadTime": Datetime
}
Symlink
Example
{
"path": "abc123",
"name": "abc123",
"firmware": Firmware,
"parentBlob": Blob,
"stableKey": "abc123",
"blobRelativePath": "xyz789",
"multiFile": MultiFile,
"target": "xyz789"
}
Tenant
Fields
Field Name | Description |
---|---|
name - String!
|
|
activationDate - Date!
|
|
supportContacts - [String!]!
|
Example
{
"name": "xyz789",
"activationDate": "2007-12-03",
"supportContacts": ["xyz789"]
}
TriggerAnalysisResult
Types
Union Types |
---|
Example
TriggeredAnalysis
TriggeredAnalysis
Fields
Field Name | Description |
---|---|
id - ID!
|
Example
{"id": "4"}
TrustedCAMissmatch
Values
Enum Value | Description |
---|---|
|
|
|
|
|
|
|
Example
"RENEWED"
URI
Fields
Field Name | Description |
---|---|
id - ID!
|
|
uri - String!
|
|
scheme - String!
|
|
hostname - String!
|
|
username - String
|
|
password - String
|
|
ipAddresses - [String!]!
|
|
file - RegularFile!
|
Example
{
"id": 4,
"uri": "xyz789",
"scheme": "xyz789",
"hostname": "abc123",
"username": "xyz789",
"password": "abc123",
"ipAddresses": ["xyz789"],
"file": RegularFile
}
UnwantedSoftwareIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
name - String!
|
|
references - [Reference!]!
|
|
description - String!
|
Example
{
"id": 4,
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"name": "abc123",
"references": [Reference],
"description": "xyz789"
}
UpdateCVEStatusInput
UpdateCVEStatusResult
Types
Union Types |
---|
Example
CVEMatchesWithUpdatedStatus
UpdateGlobalAnalysisProfileResult
Types
Union Types |
---|
Example
AnalysisProfile
UpdateIssueStatusInput
UpdateIssueStatusResult
Types
Union Types |
---|
Example
IssuesWithUpdatedStatus
User
Fields
Field Name | Description |
---|---|
email - String!
|
|
created - Datetime!
|
|
userGroups - [UserGroup!]!
|
|
roles - [Role!]!
|
Example
{
"email": "xyz789",
"created": Datetime,
"userGroups": [UserGroup],
"roles": ["ADMIN"]
}
UserCreateInput
UserDeleteInput
Fields
Input Field | Description |
---|---|
email - String!
|
Example
{"email": "xyz789"}
UserGroup
UserGroupCreateInput
UserGroupResult
Types
Union Types |
---|
Example
UserGroup
UserGroupUpdateInput
UserResult
Types
Union Types |
---|
Example
User
UserUpdateInput
ValidationError
VulnerabilityPatternIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
name - String!
|
|
references - [Reference!]!
|
Example
{
"id": "4",
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "abc123",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"name": "xyz789",
"references": [Reference]
}
WeakCipherIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
line - String!
|
Example
{
"id": "4",
"stableKey": "abc123",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"line": "xyz789"
}
WeakCryptoIssue
Fields
Field Name | Description |
---|---|
id - ID!
|
|
stableKey - String!
|
|
severity - Severity!
|
|
confidence - Confidence!
|
|
type - String!
|
Human readable identifier of the issue. |
file - File!
|
|
doc - IssueDoc!
|
|
auditTrail - [AuditRecord!]!
|
|
status - Status!
|
|
problem - Statement!
|
Example
{
"id": 4,
"stableKey": "xyz789",
"severity": "CRITICAL",
"confidence": "HIGH",
"type": "xyz789",
"file": File,
"doc": IssueDoc,
"auditTrail": [AuditRecord],
"status": "NONE",
"problem": Statement
}