Add Sandbox Scan Result
x-prisma-cloud-target-env: {"permission":"sandbox","saas":true,"self-hosted":true}
x-public: true
AddSandboxScanResult adds a sandbox scan result, the scan is augmented with geolocation data and returned to the client
- application/json
Request Body
- _id string
ID is a unique scan identifier.
- collections string[]
Collections to which this result applies.
connection object[]
Connection is a list of connection events detected during this scan.
Array [countryCode stringCountryCode is the country code for the network IP.
ip stringIP is the network IP.
port integerPort is the network port.
process object
ProcessEvent represents a process event during sandbox scan
command stringCommand is the command line.
md5 stringMD5 is the md5 hash for the process binary.
parent object
ProcessInfo holds process information
command stringCommand is the command line.
md5 stringMD5 is the md5 hash for the process binary.
path stringPath is the binary path.
time date-timeTime is the process start time.
user stringUser is the username/id.
path stringPath is the binary path.
time date-timeTime is the process start time.
user stringUser is the username/id.
protocol stringProtocol is the transport layer protocol (UDP / TCP).
time date-timeTime is the event time.
]dns object[]
DNS is a list of DNS queries detected during this scan.
Array [countryCode stringCountryCode is the country code for the network IP.
domainName stringDomainName is the domain name for a DNS query.
domainType stringDomainType is the domain type for a DNS query.
ip stringIP is the network IP.
process object
ProcessEvent represents a process event during sandbox scan
command stringCommand is the command line.
md5 stringMD5 is the md5 hash for the process binary.
parent object
ProcessInfo holds process information
command stringCommand is the command line.
md5 stringMD5 is the md5 hash for the process binary.
path stringPath is the binary path.
time date-timeTime is the process start time.
user stringUser is the username/id.
path stringPath is the binary path.
time date-timeTime is the process start time.
user stringUser is the username/id.
time date-timeTime is the event time.
]- entrypoint string
Entrypoint is the command executed in the sandbox scan.
filesystem object[]
Filesystem is a list of filesystem events detected during this scan.
Array [accessType sandbox.FilesystemAccessTypePossible values: [
open,modify,create
]FilesystemAccessType represents a type of accessing a file
path stringPath is the file path.
process object
ProcessEvent represents a process event during sandbox scan
command stringCommand is the command line.
md5 stringMD5 is the md5 hash for the process binary.
parent object
ProcessInfo holds process information
command stringCommand is the command line.
md5 stringMD5 is the md5 hash for the process binary.
path stringPath is the binary path.
time date-timeTime is the process start time.
user stringUser is the username/id.
path stringPath is the binary path.
time date-timeTime is the process start time.
user stringUser is the username/id.
time date-timeTime is the event time.
]findings object[]
Findings are the detected findings during scan.
Array [description stringDescription is the finding description.
events object[]
Events are the events that lead to the finding detection.
Array [description stringDescription describes what happened in the event.
time date-timeTime is the time of event detection.
]severity sandbox.FindingSeverityPossible values: [
critical,high,medium,low
]FindingSeverity represents a finding severity level
time date-timeTime is the detection time (time of triggering event).
type sandbox.FindingTypePossible values: [
dropper,modifiedBinary,executableCreation,filelessExecutableCreation,wildFireMalware,verticalPortScan,cryptoMiner,suspiciousELFHeader,kernelModule,modifiedBinaryExecution,filelessExecution
]FindingType represents a unique sandbox-detected finding type
]image object
ImageInfo contains image information collected during image scan
Secrets string[]Secrets are paths to embedded secrets inside the image Note: capital letter JSON annotation is kept to avoid converting all images for backward-compatibility support.
allCompliance object
AllCompliance contains data regarding passed compliance checks
compliance object[]
Compliance are all the passed compliance checks.
Array [applicableRules string[]Rules applied on the package.
binaryPkgs string[]Names of the distro binary package names (packages which are built from the source of the package).
block booleanIndicates if the vulnerability has a block effect (true) or not (false).
cause stringAdditional information regarding the root cause for the vulnerability.
cri booleanIndicates if this is a CRI-specific vulnerability (true) or not (false).
custom booleanIndicates if the vulnerability is a custom vulnerability (e.g., openscap, sandbox) (true) or not (false).
cve stringCVE ID of the vulnerability (if applied).
cvss floatCVSS score of the vulnerability.
description stringDescription of the vulnerability.
discovered date-timeSpecifies the time of discovery for the vulnerability.
exploit vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
exploits object[]
Exploits represents the exploits data found for a CVE
Array [kind vuln.ExploitKindPossible values: [
poc,in-the-wild
]ExploitKind represents the kind of the exploit
link stringLink is a link to information about the exploit.
source vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
]fixDate int64Date/time when the vulnerability was fixed (in Unix time).
fixLink stringLink to the vendor's fixed-version information.
functionLayer stringSpecifies the serverless layer ID in which the vulnerability was discovered.
gracePeriodDays integerNumber of grace days left for a vulnerability, based on the configured grace period. Nil if no block vulnerability rule applies.
id integerID of the violation.
layerTime int64Date/time of the image layer to which the CVE belongs.
link stringVendor link to the CVE.
packageName stringName of the package that caused the vulnerability.
packageVersion stringVersion of the package that caused the vulnerability (or null).
published int64Date/time when the vulnerability was published (in Unix time).
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
property name*
stringseverity stringTextual representation of the vulnerability's severity.
status stringVendor status for the vulnerability.
templates vuln.ComplianceTemplate[]Possible values: [
PCI,HIPAA,NIST SP 800-190,GDPR,DISA STIG
]List of templates with which the vulnerability is associated.
text stringDescription of the violation.
title stringCompliance title.
twistlock booleanIndicates if this is a Twistlock-specific vulnerability (true) or not (false).
type vuln.TypePossible values: [
container,image,host_config,daemon_config,daemon_config_files,security_operations,k8s_master,k8s_worker,k8s_federation,linux,windows,istio,serverless,custom,docker_stig,openshift_master,openshift_worker,application_control_linux
]Type represents the vulnerability type
vecStr stringTextual representation of the metric values used to score the vulnerability.
vulnTagInfos object[]
Tag information for the vulnerability.
Array [color common.ColorColor is a hexadecimal representation of color code value
comment stringTag comment in a specific vulnerability context.
name stringName of the tag.
]]enabled booleanEnabled indicates whether passed compliance checks is enabled by policy.
applications object[]
Products in the image.
Array [installedFromPackage booleanIndicates that the app was installed as an OS package.
knownVulnerabilities integerTotal number of vulnerabilities for this application.
layerTime int64Image layer to which the application belongs - layer creation time.
name stringName of the application.
path stringPath of the detected application.
service booleanService indicates whether the application is installed as a service.
version stringVersion of the application.
]baseImage stringImage’s base image name. Used when filtering the vulnerabilities by base images.
binaries object[]
Binaries in the image.
Array [altered booleanIndicates if the binary was installed from a package manager and modified/replaced (true) or not (false).
cveCount integerTotal number of CVEs for this specific binary.
deps string[]Third-party package files which are used by the binary.
functionLayer stringID of the serverless layer in which the package was discovered.
md5 stringMd5 hashset of the binary.
missingPkg booleanIndicates if this binary is not related to any package (true) or not (false).
name stringName of the binary.
path stringRelative path of the binary inside the container.
pkgRootDir stringPath for searching packages used by the binary.
services string[]Names of services which use the binary.
version stringVersion of the binary.
]cloudMetadata object
CloudMetadata is the metadata for an instance running in a cloud provider (AWS/GCP/Azure)
accountID stringCloud account ID.
awsExecutionEnv stringAWS execution environment (e.g. EC2/Fargate).
image stringImage name.
labels object[]
Cloud provider metadata labels.
Array [key stringLabel key.
sourceName stringSource name (e.g., for a namespace, the source name can be 'twistlock').
sourceType common.ExternalLabelSourceTypePossible values: [
namespace,deployment,aws,azure,gcp,oci
]ExternalLabelSourceType indicates the source of the labels
timestamp date-timeTime when the label was fetched.
value stringValue of the label.
]name stringInstance name.
provider common.CloudProviderPossible values: [
aws,azure,gcp,alibaba,oci,others
]CloudProvider specifies the cloud provider name
region stringInstance region.
resourceID stringUnique ID of the resource.
resourceURL stringServer-defined URL for the resource.
type stringInstance type.
vmID stringAzure unique vm ID.
vmImageID stringVMImageID holds the VM image ID.
clusterType common.ClusterTypePossible values: [
AKS,ECS,EKS,GKE,Kubernetes
]ClusterType is the cluster type
clusters string[]Cluster names.
complianceDistribution object
Distribution counts the number of vulnerabilities per type
critical integer.
high integer.
low integer.
medium integer.
total integer.
complianceIssues object[]
All the compliance issues.
Array [applicableRules string[]Rules applied on the package.
binaryPkgs string[]Names of the distro binary package names (packages which are built from the source of the package).
block booleanIndicates if the vulnerability has a block effect (true) or not (false).
cause stringAdditional information regarding the root cause for the vulnerability.
cri booleanIndicates if this is a CRI-specific vulnerability (true) or not (false).
custom booleanIndicates if the vulnerability is a custom vulnerability (e.g., openscap, sandbox) (true) or not (false).
cve stringCVE ID of the vulnerability (if applied).
cvss floatCVSS score of the vulnerability.
description stringDescription of the vulnerability.
discovered date-timeSpecifies the time of discovery for the vulnerability.
exploit vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
exploits object[]
Exploits represents the exploits data found for a CVE
Array [kind vuln.ExploitKindPossible values: [
poc,in-the-wild
]ExploitKind represents the kind of the exploit
link stringLink is a link to information about the exploit.
source vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
]fixDate int64Date/time when the vulnerability was fixed (in Unix time).
fixLink stringLink to the vendor's fixed-version information.
functionLayer stringSpecifies the serverless layer ID in which the vulnerability was discovered.
gracePeriodDays integerNumber of grace days left for a vulnerability, based on the configured grace period. Nil if no block vulnerability rule applies.
id integerID of the violation.
layerTime int64Date/time of the image layer to which the CVE belongs.
link stringVendor link to the CVE.
packageName stringName of the package that caused the vulnerability.
packageVersion stringVersion of the package that caused the vulnerability (or null).
published int64Date/time when the vulnerability was published (in Unix time).
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
property name*
stringseverity stringTextual representation of the vulnerability's severity.
status stringVendor status for the vulnerability.
templates vuln.ComplianceTemplate[]Possible values: [
PCI,HIPAA,NIST SP 800-190,GDPR,DISA STIG
]List of templates with which the vulnerability is associated.
text stringDescription of the violation.
title stringCompliance title.
twistlock booleanIndicates if this is a Twistlock-specific vulnerability (true) or not (false).
type vuln.TypePossible values: [
container,image,host_config,daemon_config,daemon_config_files,security_operations,k8s_master,k8s_worker,k8s_federation,linux,windows,istio,serverless,custom,docker_stig,openshift_master,openshift_worker,application_control_linux
]Type represents the vulnerability type
vecStr stringTextual representation of the metric values used to score the vulnerability.
vulnTagInfos object[]
Tag information for the vulnerability.
Array [color common.ColorColor is a hexadecimal representation of color code value
comment stringTag comment in a specific vulnerability context.
name stringName of the tag.
]]complianceIssuesCount integerNumber of compliance issues.
complianceRiskScore floatCompliance risk score for the image.
creationTime date-timeSpecifies the time of creation for the latest version of the image.
distro stringFull name of the distribution.
ecsClusterName stringECS cluster name.
externalLabels object[]
Kubernetes external labels of all containers running this image.
Array [key stringLabel key.
sourceName stringSource name (e.g., for a namespace, the source name can be 'twistlock').
sourceType common.ExternalLabelSourceTypePossible values: [
namespace,deployment,aws,azure,gcp,oci
]ExternalLabelSourceType indicates the source of the labels
timestamp date-timeTime when the label was fetched.
value stringValue of the label.
]files object[]
Files in the container.
Array [md5 stringHash sum of the file using md5.
path stringPath of the file.
sha1 stringHash sum of the file using SHA-1.
sha256 stringHash sum of the file using SHA256.
]firstScanTime date-timeSpecifies the time of the scan for the first version of the image. This time is preserved even after the version update.
history object[]
Docker image history.
Array [baseLayer booleanIndicates if this layer originated from the base image (true) or not (false).
created int64Date/time when the image layer was created.
emptyLayer booleanIndicates if this instruction didn't create a separate layer (true) or not (false).
id stringID of the layer.
instruction stringDocker file instruction and arguments used to create this layer.
sizeBytes int64Size of the layer (in bytes).
tags string[]Holds the image tags.
vulnerabilities object[]
Vulnerabilities which originated from this layer.
Array [applicableRules string[]Rules applied on the package.
binaryPkgs string[]Names of the distro binary package names (packages which are built from the source of the package).
block booleanIndicates if the vulnerability has a block effect (true) or not (false).
cause stringAdditional information regarding the root cause for the vulnerability.
cri booleanIndicates if this is a CRI-specific vulnerability (true) or not (false).
custom booleanIndicates if the vulnerability is a custom vulnerability (e.g., openscap, sandbox) (true) or not (false).
cve stringCVE ID of the vulnerability (if applied).
cvss floatCVSS score of the vulnerability.
description stringDescription of the vulnerability.
discovered date-timeSpecifies the time of discovery for the vulnerability.
exploit vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
exploits object[]
Exploits represents the exploits data found for a CVE
Array [kind vuln.ExploitKindPossible values: [
poc,in-the-wild
]ExploitKind represents the kind of the exploit
link stringLink is a link to information about the exploit.
source vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
]fixDate int64Date/time when the vulnerability was fixed (in Unix time).
fixLink stringLink to the vendor's fixed-version information.
functionLayer stringSpecifies the serverless layer ID in which the vulnerability was discovered.
gracePeriodDays integerNumber of grace days left for a vulnerability, based on the configured grace period. Nil if no block vulnerability rule applies.
id integerID of the violation.
layerTime int64Date/time of the image layer to which the CVE belongs.
link stringVendor link to the CVE.
packageName stringName of the package that caused the vulnerability.
packageVersion stringVersion of the package that caused the vulnerability (or null).
published int64Date/time when the vulnerability was published (in Unix time).
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
property name*
stringseverity stringTextual representation of the vulnerability's severity.
status stringVendor status for the vulnerability.
templates vuln.ComplianceTemplate[]Possible values: [
PCI,HIPAA,NIST SP 800-190,GDPR,DISA STIG
]List of templates with which the vulnerability is associated.
text stringDescription of the violation.
title stringCompliance title.
twistlock booleanIndicates if this is a Twistlock-specific vulnerability (true) or not (false).
type vuln.TypePossible values: [
container,image,host_config,daemon_config,daemon_config_files,security_operations,k8s_master,k8s_worker,k8s_federation,linux,windows,istio,serverless,custom,docker_stig,openshift_master,openshift_worker,application_control_linux
]Type represents the vulnerability type
vecStr stringTextual representation of the metric values used to score the vulnerability.
vulnTagInfos object[]
Tag information for the vulnerability.
Array [color common.ColorColor is a hexadecimal representation of color code value
comment stringTag comment in a specific vulnerability context.
name stringName of the tag.
]]]hostDevices object[]
Map from host network device name to IP address.
Array [ip stringNetwork device IPv4 address.
name stringNetwork device name.
]id stringImage ID.
image object
Image represents a container image
created date-timeDate/time when the image was created.
entrypoint string[]Combined entrypoint of the image (entrypoint + CMD).
env string[]Image environment variables.
healthcheck booleanIndicates if health checks are enabled (true) or not (false).
history object[]
Holds the image history.
Array [baseLayer booleanIndicates if this layer originated from the base image (true) or not (false).
created int64Date/time when the image layer was created.
emptyLayer booleanIndicates if this instruction didn't create a separate layer (true) or not (false).
id stringID of the layer.
instruction stringDocker file instruction and arguments used to create this layer.
sizeBytes int64Size of the layer (in bytes).
tags string[]Holds the image tags.
vulnerabilities object[]
Vulnerabilities which originated from this layer.
Array [applicableRules string[]Rules applied on the package.
binaryPkgs string[]Names of the distro binary package names (packages which are built from the source of the package).
block booleanIndicates if the vulnerability has a block effect (true) or not (false).
cause stringAdditional information regarding the root cause for the vulnerability.
cri booleanIndicates if this is a CRI-specific vulnerability (true) or not (false).
custom booleanIndicates if the vulnerability is a custom vulnerability (e.g., openscap, sandbox) (true) or not (false).
cve stringCVE ID of the vulnerability (if applied).
cvss floatCVSS score of the vulnerability.
description stringDescription of the vulnerability.
discovered date-timeSpecifies the time of discovery for the vulnerability.
exploit vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
exploits object[]
Exploits represents the exploits data found for a CVE
Array [kind vuln.ExploitKindPossible values: [
poc,in-the-wild
]ExploitKind represents the kind of the exploit
link stringLink is a link to information about the exploit.
source vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
]fixDate int64Date/time when the vulnerability was fixed (in Unix time).
fixLink stringLink to the vendor's fixed-version information.
functionLayer stringSpecifies the serverless layer ID in which the vulnerability was discovered.
gracePeriodDays integerNumber of grace days left for a vulnerability, based on the configured grace period. Nil if no block vulnerability rule applies.
id integerID of the violation.
layerTime int64Date/time of the image layer to which the CVE belongs.
link stringVendor link to the CVE.
packageName stringName of the package that caused the vulnerability.
packageVersion stringVersion of the package that caused the vulnerability (or null).
published int64Date/time when the vulnerability was published (in Unix time).
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
property name*
stringseverity stringTextual representation of the vulnerability's severity.
status stringVendor status for the vulnerability.
templates vuln.ComplianceTemplate[]Possible values: [
PCI,HIPAA,NIST SP 800-190,GDPR,DISA STIG
]List of templates with which the vulnerability is associated.
text stringDescription of the violation.
title stringCompliance title.
twistlock booleanIndicates if this is a Twistlock-specific vulnerability (true) or not (false).
type vuln.TypePossible values: [
container,image,host_config,daemon_config,daemon_config_files,security_operations,k8s_master,k8s_worker,k8s_federation,linux,windows,istio,serverless,custom,docker_stig,openshift_master,openshift_worker,application_control_linux
]Type represents the vulnerability type
vecStr stringTextual representation of the metric values used to score the vulnerability.
vulnTagInfos object[]
Tag information for the vulnerability.
Array [color common.ColorColor is a hexadecimal representation of color code value
comment stringTag comment in a specific vulnerability context.
name stringName of the tag.
]]]id stringID of the image.
labels object
Image labels.
property name*
stringlayers string[]Image filesystem layers.
os stringImage os type.
repoDigest string[]Image repo digests.
repoTags string[]Image repo tags.
user stringImage user.
workingDir stringBase working directory of the image.
installedProducts object
InstalledProducts contains data regarding products running in environment TODO #34713: Swarm support was deprecated in Joule, remove swarm node/manager boolean (and related compliance) in Lagrange
agentless booleanAgentless indicates whether the scan was performed with agentless approach.
apache stringApache indicates the apache server version, empty in case apache not running.
awsCloud booleanAWSCloud indicates whether AWS cloud is used.
crio booleanCRI indicates whether the container runtime is CRI (and not docker).
docker stringDocker represents the docker daemon version.
dockerEnterprise booleanDockerEnterprise indicates whether the enterprise version of Docker is installed.
hasPackageManager booleanHasPackageManager indicates whether package manager is installed on the OS.
k8sApiServer booleanK8sAPIServer indicates whether a kubernetes API server is running.
k8sControllerManager booleanK8sControllerManager indicates whether a kubernetes controller manager is running.
k8sEtcd booleanK8sEtcd indicates whether etcd is running.
k8sFederationApiServer booleanK8sFederationAPIServer indicates whether a federation API server is running.
k8sFederationControllerManager booleanK8sFederationControllerManager indicates whether a federation controller manager is running.
k8sKubelet booleanK8sKubelet indicates whether kubelet is running.
k8sProxy booleanK8sProxy indicates whether a kubernetes proxy is running.
k8sScheduler booleanK8sScheduler indicates whether the kubernetes scheduler is running.
kubernetes stringKubernetes represents the kubernetes version.
openshift booleanOpenshift indicates whether openshift is deployed.
openshiftVersion stringOpenshiftVersion represents the running openshift version.
osDistro stringOSDistro specifies the os distribution.
serverless booleanServerless indicates whether evaluated on a serverless environment.
swarmManager booleanSwarmManager indicates whether a swarm manager is running.
swarmNode booleanSwarmNode indicates whether the node is part of an active swarm.
isARM64 booleanIsARM64 indicates if the architecture of the image is aarch64.
k8sClusterAddr stringEndpoint of the Kubernetes API server.
labels string[]Image labels.
layers string[]Image's filesystem layers. Each layer is a SHA256 digest of the filesystem diff See: https://windsock.io/explaining-docker-image-ids/.
missingDistroVulnCoverage booleanIndicates if the image OS is covered in the IS (true) or not (false).
namespaces string[]k8s namespaces of all the containers running this image.
osDistro stringName of the OS distribution.
osDistroRelease stringOS distribution release.
osDistroVersion stringOS distribution version.
packageCorrelationDone booleanPackageCorrelationDone indicates that the correlation to OS packages has been done.
packageManager booleanIndicates if the package manager is installed for the OS.
packages object[]
Packages which exist in the image.
Array [pkgs object[]
List of packages.
Array [binaryIdx int16[]Indexes of the top binaries which use the package.
binaryPkgs string[]Names of the distro binary packages (packages which are built on the source of the package).
cveCount integerTotal number of CVEs for this specific package.
defaultGem booleanDefaultGem indicates this is a gem default package (and not a bundled package).
files object[]
List of package-related files and their hashes. Only included when the appropriate scan option is set.
Array [md5 stringHash sum of the file using md5.
path stringPath of the file.
sha1 stringHash sum of the file using SHA-1.
sha256 stringHash sum of the file using SHA256.
]functionLayer stringID of the serverless layer in which the package was discovered.
goPkg booleanGoPkg indicates this is a Go package (and not module).
jarIdentifier stringJarIdentifier holds an additional identification detail of a JAR package.
layerTime int64Image layer to which the package belongs (layer creation time).
license stringLicense information for the package.
name stringName of the package.
osPackage booleanOSPackage indicates that a python/java package was installed as an OS package.
path stringFull package path (e.g., JAR or Node.js package path).
version stringPackage version.
]pkgsType vuln.PackageTypePossible values: [
nodejs,gem,python,jar,package,windows,binary,nuget,go
]PackageType describes the package type
]pushTime date-timePushTime is the image push time to the registry.
registryNamespace stringIBM cloud namespace to which the image belongs.
registryType stringRegistryType indicates the registry type where the image is stored.
repoDigests string[]Digests of the image. Used for content trust (notary). Has one digest per tag.
repoTag object
ImageTag represents an image repository and its associated tag or registry digest
digest stringImage digest (requires V2 or later registry).
id stringID of the image.
registry stringRegistry name to which the image belongs.
repo stringRepository name to which the image belongs.
tag stringImage tag.
rhelRepos string[]RhelRepositories are the (RPM) repositories IDs from which the packages in this image were installed Used for matching vulnerabilities by Red Hat CPEs.
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
property name*
stringscanBuildDate stringScanner build date that published the image.
scanVersion stringScanner version that published the image.
startupBinaries object[]
Binaries which are expected to run when the container is created from this image.
Array [altered booleanIndicates if the binary was installed from a package manager and modified/replaced (true) or not (false).
cveCount integerTotal number of CVEs for this specific binary.
deps string[]Third-party package files which are used by the binary.
functionLayer stringID of the serverless layer in which the package was discovered.
md5 stringMd5 hashset of the binary.
missingPkg booleanIndicates if this binary is not related to any package (true) or not (false).
name stringName of the binary.
path stringRelative path of the binary inside the container.
pkgRootDir stringPath for searching packages used by the binary.
services string[]Names of services which use the binary.
version stringVersion of the binary.
]tags object[]
Tags associated with the given image.
Array [digest stringImage digest (requires V2 or later registry).
id stringID of the image.
registry stringRegistry name to which the image belongs.
repo stringRepository name to which the image belongs.
tag stringImage tag.
]topLayer stringSHA256 of the image's last layer that is the last element of the Layers field.
twistlockImage booleanIndicates if the image is a Twistlock image (true) or not (false).
vulnerabilities object[]
CVE vulnerabilities of the image.
Array [applicableRules string[]Rules applied on the package.
binaryPkgs string[]Names of the distro binary package names (packages which are built from the source of the package).
block booleanIndicates if the vulnerability has a block effect (true) or not (false).
cause stringAdditional information regarding the root cause for the vulnerability.
cri booleanIndicates if this is a CRI-specific vulnerability (true) or not (false).
custom booleanIndicates if the vulnerability is a custom vulnerability (e.g., openscap, sandbox) (true) or not (false).
cve stringCVE ID of the vulnerability (if applied).
cvss floatCVSS score of the vulnerability.
description stringDescription of the vulnerability.
discovered date-timeSpecifies the time of discovery for the vulnerability.
exploit vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
exploits object[]
Exploits represents the exploits data found for a CVE
Array [kind vuln.ExploitKindPossible values: [
poc,in-the-wild
]ExploitKind represents the kind of the exploit
link stringLink is a link to information about the exploit.
source vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
]fixDate int64Date/time when the vulnerability was fixed (in Unix time).
fixLink stringLink to the vendor's fixed-version information.
functionLayer stringSpecifies the serverless layer ID in which the vulnerability was discovered.
gracePeriodDays integerNumber of grace days left for a vulnerability, based on the configured grace period. Nil if no block vulnerability rule applies.
id integerID of the violation.
layerTime int64Date/time of the image layer to which the CVE belongs.
link stringVendor link to the CVE.
packageName stringName of the package that caused the vulnerability.
packageVersion stringVersion of the package that caused the vulnerability (or null).
published int64Date/time when the vulnerability was published (in Unix time).
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
property name*
stringseverity stringTextual representation of the vulnerability's severity.
status stringVendor status for the vulnerability.
templates vuln.ComplianceTemplate[]Possible values: [
PCI,HIPAA,NIST SP 800-190,GDPR,DISA STIG
]List of templates with which the vulnerability is associated.
text stringDescription of the violation.
title stringCompliance title.
twistlock booleanIndicates if this is a Twistlock-specific vulnerability (true) or not (false).
type vuln.TypePossible values: [
container,image,host_config,daemon_config,daemon_config_files,security_operations,k8s_master,k8s_worker,k8s_federation,linux,windows,istio,serverless,custom,docker_stig,openshift_master,openshift_worker,application_control_linux
]Type represents the vulnerability type
vecStr stringTextual representation of the metric values used to score the vulnerability.
vulnTagInfos object[]
Tag information for the vulnerability.
Array [color common.ColorColor is a hexadecimal representation of color code value
comment stringTag comment in a specific vulnerability context.
name stringName of the tag.
]]vulnerabilitiesCount integerTotal number of vulnerabilities.
vulnerabilityDistribution object
Distribution counts the number of vulnerabilities per type
critical integer.
high integer.
low integer.
medium integer.
total integer.
vulnerabilityRiskScore floatImage's CVE risk score.
- imageName string
ImageName is the image name (e.g. registry/repo:tag).
listening object[]
Listening is a list of listening events detected during this scan.
Array [port integerPort is the network port.
process object
ProcessEvent represents a process event during sandbox scan
command stringCommand is the command line.
md5 stringMD5 is the md5 hash for the process binary.
parent object
ProcessInfo holds process information
command stringCommand is the command line.
md5 stringMD5 is the md5 hash for the process binary.
path stringPath is the binary path.
time date-timeTime is the process start time.
user stringUser is the username/id.
path stringPath is the binary path.
time date-timeTime is the process start time.
user stringUser is the username/id.
time date-timeTime is the event time.
]- pass boolean
Pass indicates if the scan passed or failed.
procs object[]
Procs are the different detected process during this scan.
Array [command stringCommand is the command line.
md5 stringMD5 is the md5 hash for the process binary.
parent object
ProcessInfo holds process information
command stringCommand is the command line.
md5 stringMD5 is the md5 hash for the process binary.
path stringPath is the binary path.
time date-timeTime is the process start time.
user stringUser is the username/id.
path stringPath is the binary path.
time date-timeTime is the process start time.
user stringUser is the username/id.
]- riskScore double
RiskScore is the weighted total risk score.
- scanDuration int64
ScanDuration is the provided scan duration in nanoseconds.
- scanTime date-time
Start is the scan start time.
suspiciousFiles object[]
SuspiciousFiles are suspicious files detected during scan.
Array [containerPath stringContainerPath is the path of the file in the running container.
created booleanCreated indicates if the file was created during runtime.
md5 stringMD5 is the file MD5 hash.
path stringPath is the path to the copy of the file.
]
- 200
- default
ScanResult represents sandbox scan results
- application/json
- Schema
- Example (from schema)
Schema
- _id string
ID is a unique scan identifier.
- collections string[]
Collections to which this result applies.
connection object[]
Connection is a list of connection events detected during this scan.
Array [countryCode stringCountryCode is the country code for the network IP.
ip stringIP is the network IP.
port integerPort is the network port.
process object
ProcessEvent represents a process event during sandbox scan
command stringCommand is the command line.
md5 stringMD5 is the md5 hash for the process binary.
parent object
ProcessInfo holds process information
command stringCommand is the command line.
md5 stringMD5 is the md5 hash for the process binary.
path stringPath is the binary path.
time date-timeTime is the process start time.
user stringUser is the username/id.
path stringPath is the binary path.
time date-timeTime is the process start time.
user stringUser is the username/id.
protocol stringProtocol is the transport layer protocol (UDP / TCP).
time date-timeTime is the event time.
]dns object[]
DNS is a list of DNS queries detected during this scan.
Array [countryCode stringCountryCode is the country code for the network IP.
domainName stringDomainName is the domain name for a DNS query.
domainType stringDomainType is the domain type for a DNS query.
ip stringIP is the network IP.
process object
ProcessEvent represents a process event during sandbox scan
command stringCommand is the command line.
md5 stringMD5 is the md5 hash for the process binary.
parent object
ProcessInfo holds process information
command stringCommand is the command line.
md5 stringMD5 is the md5 hash for the process binary.
path stringPath is the binary path.
time date-timeTime is the process start time.
user stringUser is the username/id.
path stringPath is the binary path.
time date-timeTime is the process start time.
user stringUser is the username/id.
time date-timeTime is the event time.
]- entrypoint string
Entrypoint is the command executed in the sandbox scan.
filesystem object[]
Filesystem is a list of filesystem events detected during this scan.
Array [accessType sandbox.FilesystemAccessTypePossible values: [
open,modify,create
]FilesystemAccessType represents a type of accessing a file
path stringPath is the file path.
process object
ProcessEvent represents a process event during sandbox scan
command stringCommand is the command line.
md5 stringMD5 is the md5 hash for the process binary.
parent object
ProcessInfo holds process information
command stringCommand is the command line.
md5 stringMD5 is the md5 hash for the process binary.
path stringPath is the binary path.
time date-timeTime is the process start time.
user stringUser is the username/id.
path stringPath is the binary path.
time date-timeTime is the process start time.
user stringUser is the username/id.
time date-timeTime is the event time.
]findings object[]
Findings are the detected findings during scan.
Array [description stringDescription is the finding description.
events object[]
Events are the events that lead to the finding detection.
Array [description stringDescription describes what happened in the event.
time date-timeTime is the time of event detection.
]severity sandbox.FindingSeverityPossible values: [
critical,high,medium,low
]FindingSeverity represents a finding severity level
time date-timeTime is the detection time (time of triggering event).
type sandbox.FindingTypePossible values: [
dropper,modifiedBinary,executableCreation,filelessExecutableCreation,wildFireMalware,verticalPortScan,cryptoMiner,suspiciousELFHeader,kernelModule,modifiedBinaryExecution,filelessExecution
]FindingType represents a unique sandbox-detected finding type
]image object
ImageInfo contains image information collected during image scan
Secrets string[]Secrets are paths to embedded secrets inside the image Note: capital letter JSON annotation is kept to avoid converting all images for backward-compatibility support.
allCompliance object
AllCompliance contains data regarding passed compliance checks
compliance object[]
Compliance are all the passed compliance checks.
Array [applicableRules string[]Rules applied on the package.
binaryPkgs string[]Names of the distro binary package names (packages which are built from the source of the package).
block booleanIndicates if the vulnerability has a block effect (true) or not (false).
cause stringAdditional information regarding the root cause for the vulnerability.
cri booleanIndicates if this is a CRI-specific vulnerability (true) or not (false).
custom booleanIndicates if the vulnerability is a custom vulnerability (e.g., openscap, sandbox) (true) or not (false).
cve stringCVE ID of the vulnerability (if applied).
cvss floatCVSS score of the vulnerability.
description stringDescription of the vulnerability.
discovered date-timeSpecifies the time of discovery for the vulnerability.
exploit vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
exploits object[]
Exploits represents the exploits data found for a CVE
Array [kind vuln.ExploitKindPossible values: [
poc,in-the-wild
]ExploitKind represents the kind of the exploit
link stringLink is a link to information about the exploit.
source vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
]fixDate int64Date/time when the vulnerability was fixed (in Unix time).
fixLink stringLink to the vendor's fixed-version information.
functionLayer stringSpecifies the serverless layer ID in which the vulnerability was discovered.
gracePeriodDays integerNumber of grace days left for a vulnerability, based on the configured grace period. Nil if no block vulnerability rule applies.
id integerID of the violation.
layerTime int64Date/time of the image layer to which the CVE belongs.
link stringVendor link to the CVE.
packageName stringName of the package that caused the vulnerability.
packageVersion stringVersion of the package that caused the vulnerability (or null).
published int64Date/time when the vulnerability was published (in Unix time).
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
property name*
stringseverity stringTextual representation of the vulnerability's severity.
status stringVendor status for the vulnerability.
templates vuln.ComplianceTemplate[]Possible values: [
PCI,HIPAA,NIST SP 800-190,GDPR,DISA STIG
]List of templates with which the vulnerability is associated.
text stringDescription of the violation.
title stringCompliance title.
twistlock booleanIndicates if this is a Twistlock-specific vulnerability (true) or not (false).
type vuln.TypePossible values: [
container,image,host_config,daemon_config,daemon_config_files,security_operations,k8s_master,k8s_worker,k8s_federation,linux,windows,istio,serverless,custom,docker_stig,openshift_master,openshift_worker,application_control_linux
]Type represents the vulnerability type
vecStr stringTextual representation of the metric values used to score the vulnerability.
vulnTagInfos object[]
Tag information for the vulnerability.
Array [color common.ColorColor is a hexadecimal representation of color code value
comment stringTag comment in a specific vulnerability context.
name stringName of the tag.
]]enabled booleanEnabled indicates whether passed compliance checks is enabled by policy.
applications object[]
Products in the image.
Array [installedFromPackage booleanIndicates that the app was installed as an OS package.
knownVulnerabilities integerTotal number of vulnerabilities for this application.
layerTime int64Image layer to which the application belongs - layer creation time.
name stringName of the application.
path stringPath of the detected application.
service booleanService indicates whether the application is installed as a service.
version stringVersion of the application.
]baseImage stringImage’s base image name. Used when filtering the vulnerabilities by base images.
binaries object[]
Binaries in the image.
Array [altered booleanIndicates if the binary was installed from a package manager and modified/replaced (true) or not (false).
cveCount integerTotal number of CVEs for this specific binary.
deps string[]Third-party package files which are used by the binary.
functionLayer stringID of the serverless layer in which the package was discovered.
md5 stringMd5 hashset of the binary.
missingPkg booleanIndicates if this binary is not related to any package (true) or not (false).
name stringName of the binary.
path stringRelative path of the binary inside the container.
pkgRootDir stringPath for searching packages used by the binary.
services string[]Names of services which use the binary.
version stringVersion of the binary.
]cloudMetadata object
CloudMetadata is the metadata for an instance running in a cloud provider (AWS/GCP/Azure)
accountID stringCloud account ID.
awsExecutionEnv stringAWS execution environment (e.g. EC2/Fargate).
image stringImage name.
labels object[]
Cloud provider metadata labels.
Array [key stringLabel key.
sourceName stringSource name (e.g., for a namespace, the source name can be 'twistlock').
sourceType common.ExternalLabelSourceTypePossible values: [
namespace,deployment,aws,azure,gcp,oci
]ExternalLabelSourceType indicates the source of the labels
timestamp date-timeTime when the label was fetched.
value stringValue of the label.
]name stringInstance name.
provider common.CloudProviderPossible values: [
aws,azure,gcp,alibaba,oci,others
]CloudProvider specifies the cloud provider name
region stringInstance region.
resourceID stringUnique ID of the resource.
resourceURL stringServer-defined URL for the resource.
type stringInstance type.
vmID stringAzure unique vm ID.
vmImageID stringVMImageID holds the VM image ID.
clusterType common.ClusterTypePossible values: [
AKS,ECS,EKS,GKE,Kubernetes
]ClusterType is the cluster type
clusters string[]Cluster names.
complianceDistribution object
Distribution counts the number of vulnerabilities per type
critical integer.
high integer.
low integer.
medium integer.
total integer.
complianceIssues object[]
All the compliance issues.
Array [applicableRules string[]Rules applied on the package.
binaryPkgs string[]Names of the distro binary package names (packages which are built from the source of the package).
block booleanIndicates if the vulnerability has a block effect (true) or not (false).
cause stringAdditional information regarding the root cause for the vulnerability.
cri booleanIndicates if this is a CRI-specific vulnerability (true) or not (false).
custom booleanIndicates if the vulnerability is a custom vulnerability (e.g., openscap, sandbox) (true) or not (false).
cve stringCVE ID of the vulnerability (if applied).
cvss floatCVSS score of the vulnerability.
description stringDescription of the vulnerability.
discovered date-timeSpecifies the time of discovery for the vulnerability.
exploit vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
exploits object[]
Exploits represents the exploits data found for a CVE
Array [kind vuln.ExploitKindPossible values: [
poc,in-the-wild
]ExploitKind represents the kind of the exploit
link stringLink is a link to information about the exploit.
source vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
]fixDate int64Date/time when the vulnerability was fixed (in Unix time).
fixLink stringLink to the vendor's fixed-version information.
functionLayer stringSpecifies the serverless layer ID in which the vulnerability was discovered.
gracePeriodDays integerNumber of grace days left for a vulnerability, based on the configured grace period. Nil if no block vulnerability rule applies.
id integerID of the violation.
layerTime int64Date/time of the image layer to which the CVE belongs.
link stringVendor link to the CVE.
packageName stringName of the package that caused the vulnerability.
packageVersion stringVersion of the package that caused the vulnerability (or null).
published int64Date/time when the vulnerability was published (in Unix time).
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
property name*
stringseverity stringTextual representation of the vulnerability's severity.
status stringVendor status for the vulnerability.
templates vuln.ComplianceTemplate[]Possible values: [
PCI,HIPAA,NIST SP 800-190,GDPR,DISA STIG
]List of templates with which the vulnerability is associated.
text stringDescription of the violation.
title stringCompliance title.
twistlock booleanIndicates if this is a Twistlock-specific vulnerability (true) or not (false).
type vuln.TypePossible values: [
container,image,host_config,daemon_config,daemon_config_files,security_operations,k8s_master,k8s_worker,k8s_federation,linux,windows,istio,serverless,custom,docker_stig,openshift_master,openshift_worker,application_control_linux
]Type represents the vulnerability type
vecStr stringTextual representation of the metric values used to score the vulnerability.
vulnTagInfos object[]
Tag information for the vulnerability.
Array [color common.ColorColor is a hexadecimal representation of color code value
comment stringTag comment in a specific vulnerability context.
name stringName of the tag.
]]complianceIssuesCount integerNumber of compliance issues.
complianceRiskScore floatCompliance risk score for the image.
creationTime date-timeSpecifies the time of creation for the latest version of the image.
distro stringFull name of the distribution.
ecsClusterName stringECS cluster name.
externalLabels object[]
Kubernetes external labels of all containers running this image.
Array [key stringLabel key.
sourceName stringSource name (e.g., for a namespace, the source name can be 'twistlock').
sourceType common.ExternalLabelSourceTypePossible values: [
namespace,deployment,aws,azure,gcp,oci
]ExternalLabelSourceType indicates the source of the labels
timestamp date-timeTime when the label was fetched.
value stringValue of the label.
]files object[]
Files in the container.
Array [md5 stringHash sum of the file using md5.
path stringPath of the file.
sha1 stringHash sum of the file using SHA-1.
sha256 stringHash sum of the file using SHA256.
]firstScanTime date-timeSpecifies the time of the scan for the first version of the image. This time is preserved even after the version update.
history object[]
Docker image history.
Array [baseLayer booleanIndicates if this layer originated from the base image (true) or not (false).
created int64Date/time when the image layer was created.
emptyLayer booleanIndicates if this instruction didn't create a separate layer (true) or not (false).
id stringID of the layer.
instruction stringDocker file instruction and arguments used to create this layer.
sizeBytes int64Size of the layer (in bytes).
tags string[]Holds the image tags.
vulnerabilities object[]
Vulnerabilities which originated from this layer.
Array [applicableRules string[]Rules applied on the package.
binaryPkgs string[]Names of the distro binary package names (packages which are built from the source of the package).
block booleanIndicates if the vulnerability has a block effect (true) or not (false).
cause stringAdditional information regarding the root cause for the vulnerability.
cri booleanIndicates if this is a CRI-specific vulnerability (true) or not (false).
custom booleanIndicates if the vulnerability is a custom vulnerability (e.g., openscap, sandbox) (true) or not (false).
cve stringCVE ID of the vulnerability (if applied).
cvss floatCVSS score of the vulnerability.
description stringDescription of the vulnerability.
discovered date-timeSpecifies the time of discovery for the vulnerability.
exploit vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
exploits object[]
Exploits represents the exploits data found for a CVE
Array [kind vuln.ExploitKindPossible values: [
poc,in-the-wild
]ExploitKind represents the kind of the exploit
link stringLink is a link to information about the exploit.
source vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
]fixDate int64Date/time when the vulnerability was fixed (in Unix time).
fixLink stringLink to the vendor's fixed-version information.
functionLayer stringSpecifies the serverless layer ID in which the vulnerability was discovered.
gracePeriodDays integerNumber of grace days left for a vulnerability, based on the configured grace period. Nil if no block vulnerability rule applies.
id integerID of the violation.
layerTime int64Date/time of the image layer to which the CVE belongs.
link stringVendor link to the CVE.
packageName stringName of the package that caused the vulnerability.
packageVersion stringVersion of the package that caused the vulnerability (or null).
published int64Date/time when the vulnerability was published (in Unix time).
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
property name*
stringseverity stringTextual representation of the vulnerability's severity.
status stringVendor status for the vulnerability.
templates vuln.ComplianceTemplate[]Possible values: [
PCI,HIPAA,NIST SP 800-190,GDPR,DISA STIG
]List of templates with which the vulnerability is associated.
text stringDescription of the violation.
title stringCompliance title.
twistlock booleanIndicates if this is a Twistlock-specific vulnerability (true) or not (false).
type vuln.TypePossible values: [
container,image,host_config,daemon_config,daemon_config_files,security_operations,k8s_master,k8s_worker,k8s_federation,linux,windows,istio,serverless,custom,docker_stig,openshift_master,openshift_worker,application_control_linux
]Type represents the vulnerability type
vecStr stringTextual representation of the metric values used to score the vulnerability.
vulnTagInfos object[]
Tag information for the vulnerability.
Array [color common.ColorColor is a hexadecimal representation of color code value
comment stringTag comment in a specific vulnerability context.
name stringName of the tag.
]]]hostDevices object[]
Map from host network device name to IP address.
Array [ip stringNetwork device IPv4 address.
name stringNetwork device name.
]id stringImage ID.
image object
Image represents a container image
created date-timeDate/time when the image was created.
entrypoint string[]Combined entrypoint of the image (entrypoint + CMD).
env string[]Image environment variables.
healthcheck booleanIndicates if health checks are enabled (true) or not (false).
history object[]
Holds the image history.
Array [baseLayer booleanIndicates if this layer originated from the base image (true) or not (false).
created int64Date/time when the image layer was created.
emptyLayer booleanIndicates if this instruction didn't create a separate layer (true) or not (false).
id stringID of the layer.
instruction stringDocker file instruction and arguments used to create this layer.
sizeBytes int64Size of the layer (in bytes).
tags string[]Holds the image tags.
vulnerabilities object[]
Vulnerabilities which originated from this layer.
Array [applicableRules string[]Rules applied on the package.
binaryPkgs string[]Names of the distro binary package names (packages which are built from the source of the package).
block booleanIndicates if the vulnerability has a block effect (true) or not (false).
cause stringAdditional information regarding the root cause for the vulnerability.
cri booleanIndicates if this is a CRI-specific vulnerability (true) or not (false).
custom booleanIndicates if the vulnerability is a custom vulnerability (e.g., openscap, sandbox) (true) or not (false).
cve stringCVE ID of the vulnerability (if applied).
cvss floatCVSS score of the vulnerability.
description stringDescription of the vulnerability.
discovered date-timeSpecifies the time of discovery for the vulnerability.
exploit vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
exploits object[]
Exploits represents the exploits data found for a CVE
Array [kind vuln.ExploitKindPossible values: [
poc,in-the-wild
]ExploitKind represents the kind of the exploit
link stringLink is a link to information about the exploit.
source vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
]fixDate int64Date/time when the vulnerability was fixed (in Unix time).
fixLink stringLink to the vendor's fixed-version information.
functionLayer stringSpecifies the serverless layer ID in which the vulnerability was discovered.
gracePeriodDays integerNumber of grace days left for a vulnerability, based on the configured grace period. Nil if no block vulnerability rule applies.
id integerID of the violation.
layerTime int64Date/time of the image layer to which the CVE belongs.
link stringVendor link to the CVE.
packageName stringName of the package that caused the vulnerability.
packageVersion stringVersion of the package that caused the vulnerability (or null).
published int64Date/time when the vulnerability was published (in Unix time).
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
property name*
stringseverity stringTextual representation of the vulnerability's severity.
status stringVendor status for the vulnerability.
templates vuln.ComplianceTemplate[]Possible values: [
PCI,HIPAA,NIST SP 800-190,GDPR,DISA STIG
]List of templates with which the vulnerability is associated.
text stringDescription of the violation.
title stringCompliance title.
twistlock booleanIndicates if this is a Twistlock-specific vulnerability (true) or not (false).
type vuln.TypePossible values: [
container,image,host_config,daemon_config,daemon_config_files,security_operations,k8s_master,k8s_worker,k8s_federation,linux,windows,istio,serverless,custom,docker_stig,openshift_master,openshift_worker,application_control_linux
]Type represents the vulnerability type
vecStr stringTextual representation of the metric values used to score the vulnerability.
vulnTagInfos object[]
Tag information for the vulnerability.
Array [color common.ColorColor is a hexadecimal representation of color code value
comment stringTag comment in a specific vulnerability context.
name stringName of the tag.
]]]id stringID of the image.
labels object
Image labels.
property name*
stringlayers string[]Image filesystem layers.
os stringImage os type.
repoDigest string[]Image repo digests.
repoTags string[]Image repo tags.
user stringImage user.
workingDir stringBase working directory of the image.
installedProducts object
InstalledProducts contains data regarding products running in environment TODO #34713: Swarm support was deprecated in Joule, remove swarm node/manager boolean (and related compliance) in Lagrange
agentless booleanAgentless indicates whether the scan was performed with agentless approach.
apache stringApache indicates the apache server version, empty in case apache not running.
awsCloud booleanAWSCloud indicates whether AWS cloud is used.
crio booleanCRI indicates whether the container runtime is CRI (and not docker).
docker stringDocker represents the docker daemon version.
dockerEnterprise booleanDockerEnterprise indicates whether the enterprise version of Docker is installed.
hasPackageManager booleanHasPackageManager indicates whether package manager is installed on the OS.
k8sApiServer booleanK8sAPIServer indicates whether a kubernetes API server is running.
k8sControllerManager booleanK8sControllerManager indicates whether a kubernetes controller manager is running.
k8sEtcd booleanK8sEtcd indicates whether etcd is running.
k8sFederationApiServer booleanK8sFederationAPIServer indicates whether a federation API server is running.
k8sFederationControllerManager booleanK8sFederationControllerManager indicates whether a federation controller manager is running.
k8sKubelet booleanK8sKubelet indicates whether kubelet is running.
k8sProxy booleanK8sProxy indicates whether a kubernetes proxy is running.
k8sScheduler booleanK8sScheduler indicates whether the kubernetes scheduler is running.
kubernetes stringKubernetes represents the kubernetes version.
openshift booleanOpenshift indicates whether openshift is deployed.
openshiftVersion stringOpenshiftVersion represents the running openshift version.
osDistro stringOSDistro specifies the os distribution.
serverless booleanServerless indicates whether evaluated on a serverless environment.
swarmManager booleanSwarmManager indicates whether a swarm manager is running.
swarmNode booleanSwarmNode indicates whether the node is part of an active swarm.
isARM64 booleanIsARM64 indicates if the architecture of the image is aarch64.
k8sClusterAddr stringEndpoint of the Kubernetes API server.
labels string[]Image labels.
layers string[]Image's filesystem layers. Each layer is a SHA256 digest of the filesystem diff See: https://windsock.io/explaining-docker-image-ids/.
missingDistroVulnCoverage booleanIndicates if the image OS is covered in the IS (true) or not (false).
namespaces string[]k8s namespaces of all the containers running this image.
osDistro stringName of the OS distribution.
osDistroRelease stringOS distribution release.
osDistroVersion stringOS distribution version.
packageCorrelationDone booleanPackageCorrelationDone indicates that the correlation to OS packages has been done.
packageManager booleanIndicates if the package manager is installed for the OS.
packages object[]
Packages which exist in the image.
Array [pkgs object[]
List of packages.
Array [binaryIdx int16[]Indexes of the top binaries which use the package.
binaryPkgs string[]Names of the distro binary packages (packages which are built on the source of the package).
cveCount integerTotal number of CVEs for this specific package.
defaultGem booleanDefaultGem indicates this is a gem default package (and not a bundled package).
files object[]
List of package-related files and their hashes. Only included when the appropriate scan option is set.
Array [md5 stringHash sum of the file using md5.
path stringPath of the file.
sha1 stringHash sum of the file using SHA-1.
sha256 stringHash sum of the file using SHA256.
]functionLayer stringID of the serverless layer in which the package was discovered.
goPkg booleanGoPkg indicates this is a Go package (and not module).
jarIdentifier stringJarIdentifier holds an additional identification detail of a JAR package.
layerTime int64Image layer to which the package belongs (layer creation time).
license stringLicense information for the package.
name stringName of the package.
osPackage booleanOSPackage indicates that a python/java package was installed as an OS package.
path stringFull package path (e.g., JAR or Node.js package path).
version stringPackage version.
]pkgsType vuln.PackageTypePossible values: [
nodejs,gem,python,jar,package,windows,binary,nuget,go
]PackageType describes the package type
]pushTime date-timePushTime is the image push time to the registry.
registryNamespace stringIBM cloud namespace to which the image belongs.
registryType stringRegistryType indicates the registry type where the image is stored.
repoDigests string[]Digests of the image. Used for content trust (notary). Has one digest per tag.
repoTag object
ImageTag represents an image repository and its associated tag or registry digest
digest stringImage digest (requires V2 or later registry).
id stringID of the image.
registry stringRegistry name to which the image belongs.
repo stringRepository name to which the image belongs.
tag stringImage tag.
rhelRepos string[]RhelRepositories are the (RPM) repositories IDs from which the packages in this image were installed Used for matching vulnerabilities by Red Hat CPEs.
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
property name*
stringscanBuildDate stringScanner build date that published the image.
scanVersion stringScanner version that published the image.
startupBinaries object[]
Binaries which are expected to run when the container is created from this image.
Array [altered booleanIndicates if the binary was installed from a package manager and modified/replaced (true) or not (false).
cveCount integerTotal number of CVEs for this specific binary.
deps string[]Third-party package files which are used by the binary.
functionLayer stringID of the serverless layer in which the package was discovered.
md5 stringMd5 hashset of the binary.
missingPkg booleanIndicates if this binary is not related to any package (true) or not (false).
name stringName of the binary.
path stringRelative path of the binary inside the container.
pkgRootDir stringPath for searching packages used by the binary.
services string[]Names of services which use the binary.
version stringVersion of the binary.
]tags object[]
Tags associated with the given image.
Array [digest stringImage digest (requires V2 or later registry).
id stringID of the image.
registry stringRegistry name to which the image belongs.
repo stringRepository name to which the image belongs.
tag stringImage tag.
]topLayer stringSHA256 of the image's last layer that is the last element of the Layers field.
twistlockImage booleanIndicates if the image is a Twistlock image (true) or not (false).
vulnerabilities object[]
CVE vulnerabilities of the image.
Array [applicableRules string[]Rules applied on the package.
binaryPkgs string[]Names of the distro binary package names (packages which are built from the source of the package).
block booleanIndicates if the vulnerability has a block effect (true) or not (false).
cause stringAdditional information regarding the root cause for the vulnerability.
cri booleanIndicates if this is a CRI-specific vulnerability (true) or not (false).
custom booleanIndicates if the vulnerability is a custom vulnerability (e.g., openscap, sandbox) (true) or not (false).
cve stringCVE ID of the vulnerability (if applied).
cvss floatCVSS score of the vulnerability.
description stringDescription of the vulnerability.
discovered date-timeSpecifies the time of discovery for the vulnerability.
exploit vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
exploits object[]
Exploits represents the exploits data found for a CVE
Array [kind vuln.ExploitKindPossible values: [
poc,in-the-wild
]ExploitKind represents the kind of the exploit
link stringLink is a link to information about the exploit.
source vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
]fixDate int64Date/time when the vulnerability was fixed (in Unix time).
fixLink stringLink to the vendor's fixed-version information.
functionLayer stringSpecifies the serverless layer ID in which the vulnerability was discovered.
gracePeriodDays integerNumber of grace days left for a vulnerability, based on the configured grace period. Nil if no block vulnerability rule applies.
id integerID of the violation.
layerTime int64Date/time of the image layer to which the CVE belongs.
link stringVendor link to the CVE.
packageName stringName of the package that caused the vulnerability.
packageVersion stringVersion of the package that caused the vulnerability (or null).
published int64Date/time when the vulnerability was published (in Unix time).
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
property name*
stringseverity stringTextual representation of the vulnerability's severity.
status stringVendor status for the vulnerability.
templates vuln.ComplianceTemplate[]Possible values: [
PCI,HIPAA,NIST SP 800-190,GDPR,DISA STIG
]List of templates with which the vulnerability is associated.
text stringDescription of the violation.
title stringCompliance title.
twistlock booleanIndicates if this is a Twistlock-specific vulnerability (true) or not (false).
type vuln.TypePossible values: [
container,image,host_config,daemon_config,daemon_config_files,security_operations,k8s_master,k8s_worker,k8s_federation,linux,windows,istio,serverless,custom,docker_stig,openshift_master,openshift_worker,application_control_linux
]Type represents the vulnerability type
vecStr stringTextual representation of the metric values used to score the vulnerability.
vulnTagInfos object[]
Tag information for the vulnerability.
Array [color common.ColorColor is a hexadecimal representation of color code value
comment stringTag comment in a specific vulnerability context.
name stringName of the tag.
]]vulnerabilitiesCount integerTotal number of vulnerabilities.
vulnerabilityDistribution object
Distribution counts the number of vulnerabilities per type
critical integer.
high integer.
low integer.
medium integer.
total integer.
vulnerabilityRiskScore floatImage's CVE risk score.
- imageName string
ImageName is the image name (e.g. registry/repo:tag).
listening object[]
Listening is a list of listening events detected during this scan.
Array [port integerPort is the network port.
process object
ProcessEvent represents a process event during sandbox scan
command stringCommand is the command line.
md5 stringMD5 is the md5 hash for the process binary.
parent object
ProcessInfo holds process information
command stringCommand is the command line.
md5 stringMD5 is the md5 hash for the process binary.
path stringPath is the binary path.
time date-timeTime is the process start time.
user stringUser is the username/id.
path stringPath is the binary path.
time date-timeTime is the process start time.
user stringUser is the username/id.
time date-timeTime is the event time.
]- pass boolean
Pass indicates if the scan passed or failed.
procs object[]
Procs are the different detected process during this scan.
Array [command stringCommand is the command line.
md5 stringMD5 is the md5 hash for the process binary.
parent object
ProcessInfo holds process information
command stringCommand is the command line.
md5 stringMD5 is the md5 hash for the process binary.
path stringPath is the binary path.
time date-timeTime is the process start time.
user stringUser is the username/id.
path stringPath is the binary path.
time date-timeTime is the process start time.
user stringUser is the username/id.
]- riskScore double
RiskScore is the weighted total risk score.
- scanDuration int64
ScanDuration is the provided scan duration in nanoseconds.
- scanTime date-time
Start is the scan start time.
suspiciousFiles object[]
SuspiciousFiles are suspicious files detected during scan.
Array [containerPath stringContainerPath is the path of the file in the running container.
created booleanCreated indicates if the file was created during runtime.
md5 stringMD5 is the file MD5 hash.
path stringPath is the path to the copy of the file.
]
{
"_id": "string",
"collections": [
"string"
],
"connection": [
{
"countryCode": "string",
"ip": "string",
"port": 0,
"process": {
"command": "string",
"md5": "string",
"parent": {
"command": "string",
"md5": "string",
"path": "string",
"time": "2023-05-27T04:01:51.362Z",
"user": "string"
},
"path": "string",
"time": "2023-05-27T04:01:51.362Z",
"user": "string"
},
"protocol": "string",
"time": "2023-05-27T04:01:51.362Z"
}
],
"dns": [
{
"countryCode": "string",
"domainName": "string",
"domainType": "string",
"ip": "string",
"process": {
"command": "string",
"md5": "string",
"parent": {
"command": "string",
"md5": "string",
"path": "string",
"time": "2023-05-27T04:01:51.363Z",
"user": "string"
},
"path": "string",
"time": "2023-05-27T04:01:51.363Z",
"user": "string"
},
"time": "2023-05-27T04:01:51.363Z"
}
],
"entrypoint": "string",
"filesystem": [
{
"accessType": [
"open",
"modify",
"create"
],
"path": "string",
"process": {
"command": "string",
"md5": "string",
"parent": {
"command": "string",
"md5": "string",
"path": "string",
"time": "2023-05-27T04:01:51.363Z",
"user": "string"
},
"path": "string",
"time": "2023-05-27T04:01:51.363Z",
"user": "string"
},
"time": "2023-05-27T04:01:51.363Z"
}
],
"findings": [
{
"description": "string",
"events": [
{
"description": "string",
"time": "2023-05-27T04:01:51.363Z"
}
],
"severity": [
"critical",
"high",
"medium",
"low"
],
"time": "2023-05-27T04:01:51.363Z",
"type": [
"dropper",
"modifiedBinary",
"executableCreation",
"filelessExecutableCreation",
"wildFireMalware",
"verticalPortScan",
"cryptoMiner",
"suspiciousELFHeader",
"kernelModule",
"modifiedBinaryExecution",
"filelessExecution"
]
}
],
"image": {
"Secrets": [
"string"
],
"allCompliance": {
"compliance": [
{
"applicableRules": [
"string"
],
"binaryPkgs": [
"string"
],
"block": true,
"cause": "string",
"cri": true,
"custom": true,
"cve": "string",
"cvss": 0,
"description": "string",
"discovered": "2023-05-27T04:01:51.363Z",
"exploit": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
],
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"fixDate": 0,
"fixLink": "string",
"functionLayer": "string",
"gracePeriodDays": 0,
"id": 0,
"layerTime": 0,
"link": "string",
"packageName": "string",
"packageVersion": "string",
"published": 0,
"riskFactors": {},
"severity": "string",
"status": "string",
"templates": [
[
"PCI",
"HIPAA",
"NIST SP 800-190",
"GDPR",
"DISA STIG"
]
],
"text": "string",
"title": "string",
"twistlock": true,
"type": [
"container",
"image",
"host_config",
"daemon_config",
"daemon_config_files",
"security_operations",
"k8s_master",
"k8s_worker",
"k8s_federation",
"linux",
"windows",
"istio",
"serverless",
"custom",
"docker_stig",
"openshift_master",
"openshift_worker",
"application_control_linux"
],
"vecStr": "string",
"vulnTagInfos": [
{
"color": "string",
"comment": "string",
"name": "string"
}
]
}
],
"enabled": true
},
"applications": [
{
"installedFromPackage": true,
"knownVulnerabilities": 0,
"layerTime": 0,
"name": "string",
"path": "string",
"service": true,
"version": "string"
}
],
"baseImage": "string",
"binaries": [
{
"altered": true,
"cveCount": 0,
"deps": [
"string"
],
"functionLayer": "string",
"md5": "string",
"missingPkg": true,
"name": "string",
"path": "string",
"pkgRootDir": "string",
"services": [
"string"
],
"version": "string"
}
],
"cloudMetadata": {
"accountID": "string",
"awsExecutionEnv": "string",
"image": "string",
"labels": [
{
"key": "string",
"sourceName": "string",
"sourceType": [
"namespace",
"deployment",
"aws",
"azure",
"gcp",
"oci"
],
"timestamp": "2023-05-27T04:01:51.364Z",
"value": "string"
}
],
"name": "string",
"provider": [
"aws",
"azure",
"gcp",
"alibaba",
"oci",
"others"
],
"region": "string",
"resourceID": "string",
"resourceURL": "string",
"type": "string",
"vmID": "string",
"vmImageID": "string"
},
"clusterType": [
"AKS",
"ECS",
"EKS",
"GKE",
"Kubernetes"
],
"clusters": [
"string"
],
"complianceDistribution": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"complianceIssues": [
{
"applicableRules": [
"string"
],
"binaryPkgs": [
"string"
],
"block": true,
"cause": "string",
"cri": true,
"custom": true,
"cve": "string",
"cvss": 0,
"description": "string",
"discovered": "2023-05-27T04:01:51.364Z",
"exploit": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
],
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"fixDate": 0,
"fixLink": "string",
"functionLayer": "string",
"gracePeriodDays": 0,
"id": 0,
"layerTime": 0,
"link": "string",
"packageName": "string",
"packageVersion": "string",
"published": 0,
"riskFactors": {},
"severity": "string",
"status": "string",
"templates": [
[
"PCI",
"HIPAA",
"NIST SP 800-190",
"GDPR",
"DISA STIG"
]
],
"text": "string",
"title": "string",
"twistlock": true,
"type": [
"container",
"image",
"host_config",
"daemon_config",
"daemon_config_files",
"security_operations",
"k8s_master",
"k8s_worker",
"k8s_federation",
"linux",
"windows",
"istio",
"serverless",
"custom",
"docker_stig",
"openshift_master",
"openshift_worker",
"application_control_linux"
],
"vecStr": "string",
"vulnTagInfos": [
{
"color": "string",
"comment": "string",
"name": "string"
}
]
}
],
"complianceIssuesCount": 0,
"complianceRiskScore": 0,
"creationTime": "2023-05-27T04:01:51.364Z",
"distro": "string",
"ecsClusterName": "string",
"externalLabels": [
{
"key": "string",
"sourceName": "string",
"sourceType": [
"namespace",
"deployment",
"aws",
"azure",
"gcp",
"oci"
],
"timestamp": "2023-05-27T04:01:51.364Z",
"value": "string"
}
],
"files": [
{
"md5": "string",
"path": "string",
"sha1": "string",
"sha256": "string"
}
],
"firstScanTime": "2023-05-27T04:01:51.364Z",
"history": [
{
"baseLayer": true,
"created": 0,
"emptyLayer": true,
"id": "string",
"instruction": "string",
"sizeBytes": 0,
"tags": [
"string"
],
"vulnerabilities": [
{
"applicableRules": [
"string"
],
"binaryPkgs": [
"string"
],
"block": true,
"cause": "string",
"cri": true,
"custom": true,
"cve": "string",
"cvss": 0,
"description": "string",
"discovered": "2023-05-27T04:01:51.364Z",
"exploit": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
],
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"fixDate": 0,
"fixLink": "string",
"functionLayer": "string",
"gracePeriodDays": 0,
"id": 0,
"layerTime": 0,
"link": "string",
"packageName": "string",
"packageVersion": "string",
"published": 0,
"riskFactors": {},
"severity": "string",
"status": "string",
"templates": [
[
"PCI",
"HIPAA",
"NIST SP 800-190",
"GDPR",
"DISA STIG"
]
],
"text": "string",
"title": "string",
"twistlock": true,
"type": [
"container",
"image",
"host_config",
"daemon_config",
"daemon_config_files",
"security_operations",
"k8s_master",
"k8s_worker",
"k8s_federation",
"linux",
"windows",
"istio",
"serverless",
"custom",
"docker_stig",
"openshift_master",
"openshift_worker",
"application_control_linux"
],
"vecStr": "string",
"vulnTagInfos": [
{
"color": "string",
"comment": "string",
"name": "string"
}
]
}
]
}
],
"hostDevices": [
{
"ip": "string",
"name": "string"
}
],
"id": "string",
"image": {
"created": "2023-05-27T04:01:51.364Z",
"entrypoint": [
"string"
],
"env": [
"string"
],
"healthcheck": true,
"history": [
{
"baseLayer": true,
"created": 0,
"emptyLayer": true,
"id": "string",
"instruction": "string",
"sizeBytes": 0,
"tags": [
"string"
],
"vulnerabilities": [
{
"applicableRules": [
"string"
],
"binaryPkgs": [
"string"
],
"block": true,
"cause": "string",
"cri": true,
"custom": true,
"cve": "string",
"cvss": 0,
"description": "string",
"discovered": "2023-05-27T04:01:51.365Z",
"exploit": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
],
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"fixDate": 0,
"fixLink": "string",
"functionLayer": "string",
"gracePeriodDays": 0,
"id": 0,
"layerTime": 0,
"link": "string",
"packageName": "string",
"packageVersion": "string",
"published": 0,
"riskFactors": {},
"severity": "string",
"status": "string",
"templates": [
[
"PCI",
"HIPAA",
"NIST SP 800-190",
"GDPR",
"DISA STIG"
]
],
"text": "string",
"title": "string",
"twistlock": true,
"type": [
"container",
"image",
"host_config",
"daemon_config",
"daemon_config_files",
"security_operations",
"k8s_master",
"k8s_worker",
"k8s_federation",
"linux",
"windows",
"istio",
"serverless",
"custom",
"docker_stig",
"openshift_master",
"openshift_worker",
"application_control_linux"
],
"vecStr": "string",
"vulnTagInfos": [
{
"color": "string",
"comment": "string",
"name": "string"
}
]
}
]
}
],
"id": "string",
"labels": {},
"layers": [
"string"
],
"os": "string",
"repoDigest": [
"string"
],
"repoTags": [
"string"
],
"user": "string",
"workingDir": "string"
},
"installedProducts": {
"agentless": true,
"apache": "string",
"awsCloud": true,
"crio": true,
"docker": "string",
"dockerEnterprise": true,
"hasPackageManager": true,
"k8sApiServer": true,
"k8sControllerManager": true,
"k8sEtcd": true,
"k8sFederationApiServer": true,
"k8sFederationControllerManager": true,
"k8sKubelet": true,
"k8sProxy": true,
"k8sScheduler": true,
"kubernetes": "string",
"openshift": true,
"openshiftVersion": "string",
"osDistro": "string",
"serverless": true,
"swarmManager": true,
"swarmNode": true
},
"isARM64": true,
"k8sClusterAddr": "string",
"labels": [
"string"
],
"layers": [
"string"
],
"missingDistroVulnCoverage": true,
"namespaces": [
"string"
],
"osDistro": "string",
"osDistroRelease": "string",
"osDistroVersion": "string",
"packageCorrelationDone": true,
"packageManager": true,
"packages": [
{
"pkgs": [
{
"binaryIdx": [
0
],
"binaryPkgs": [
"string"
],
"cveCount": 0,
"defaultGem": true,
"files": [
{
"md5": "string",
"path": "string",
"sha1": "string",
"sha256": "string"
}
],
"functionLayer": "string",
"goPkg": true,
"jarIdentifier": "string",
"layerTime": 0,
"license": "string",
"name": "string",
"osPackage": true,
"path": "string",
"version": "string"
}
],
"pkgsType": [
"nodejs",
"gem",
"python",
"jar",
"package",
"windows",
"binary",
"nuget",
"go"
]
}
],
"pushTime": "2023-05-27T04:01:51.365Z",
"registryNamespace": "string",
"registryType": "string",
"repoDigests": [
"string"
],
"repoTag": {
"digest": "string",
"id": "string",
"registry": "string",
"repo": "string",
"tag": "string"
},
"rhelRepos": [
"string"
],
"riskFactors": {},
"scanBuildDate": "string",
"scanVersion": "string",
"startupBinaries": [
{
"altered": true,
"cveCount": 0,
"deps": [
"string"
],
"functionLayer": "string",
"md5": "string",
"missingPkg": true,
"name": "string",
"path": "string",
"pkgRootDir": "string",
"services": [
"string"
],
"version": "string"
}
],
"tags": [
{
"digest": "string",
"id": "string",
"registry": "string",
"repo": "string",
"tag": "string"
}
],
"topLayer": "string",
"twistlockImage": true,
"vulnerabilities": [
{
"applicableRules": [
"string"
],
"binaryPkgs": [
"string"
],
"block": true,
"cause": "string",
"cri": true,
"custom": true,
"cve": "string",
"cvss": 0,
"description": "string",
"discovered": "2023-05-27T04:01:51.365Z",
"exploit": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
],
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"fixDate": 0,
"fixLink": "string",
"functionLayer": "string",
"gracePeriodDays": 0,
"id": 0,
"layerTime": 0,
"link": "string",
"packageName": "string",
"packageVersion": "string",
"published": 0,
"riskFactors": {},
"severity": "string",
"status": "string",
"templates": [
[
"PCI",
"HIPAA",
"NIST SP 800-190",
"GDPR",
"DISA STIG"
]
],
"text": "string",
"title": "string",
"twistlock": true,
"type": [
"container",
"image",
"host_config",
"daemon_config",
"daemon_config_files",
"security_operations",
"k8s_master",
"k8s_worker",
"k8s_federation",
"linux",
"windows",
"istio",
"serverless",
"custom",
"docker_stig",
"openshift_master",
"openshift_worker",
"application_control_linux"
],
"vecStr": "string",
"vulnTagInfos": [
{
"color": "string",
"comment": "string",
"name": "string"
}
]
}
],
"vulnerabilitiesCount": 0,
"vulnerabilityDistribution": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"vulnerabilityRiskScore": 0
},
"imageName": "string",
"listening": [
{
"port": 0,
"process": {
"command": "string",
"md5": "string",
"parent": {
"command": "string",
"md5": "string",
"path": "string",
"time": "2023-05-27T04:01:51.366Z",
"user": "string"
},
"path": "string",
"time": "2023-05-27T04:01:51.366Z",
"user": "string"
},
"time": "2023-05-27T04:01:51.366Z"
}
],
"pass": true,
"procs": [
{
"command": "string",
"md5": "string",
"parent": {
"command": "string",
"md5": "string",
"path": "string",
"time": "2023-05-27T04:01:51.366Z",
"user": "string"
},
"path": "string",
"time": "2023-05-27T04:01:51.366Z",
"user": "string"
}
],
"riskScore": 0,
"scanDuration": 0,
"scanTime": "2023-05-27T04:01:51.366Z",
"suspiciousFiles": [
{
"containerPath": "string",
"created": true,
"md5": "string",
"path": "string"
}
]
}