Hi there! Are you looking for the official Deno documentation? Try docs.deno.com for all your Deno learning needs.

Finding

import type { Finding } from "https://googleapis.deno.dev/v1/websecurityscanner:v1.ts";

A Finding resource represents a vulnerability instance identified during a ScanRun.

interface Finding {
body?: string;
description?: string;
finalUrl?: string;
findingType?: string;
form?: Form;
frameUrl?: string;
fuzzedUrl?: string;
httpMethod?: string;
name?: string;
outdatedLibrary?: OutdatedLibrary;
reproductionUrl?: string;
readonly severity?:
| "SEVERITY_UNSPECIFIED"
| "CRITICAL"
| "HIGH"
| "MEDIUM"
| "LOW";
trackingId?: string;
violatingResource?: ViolatingResource;
vulnerableHeaders?: VulnerableHeaders;
vulnerableParameters?: VulnerableParameters;
xss?: Xss;
readonly xxe?: Xxe;
}

§Properties

§
body?: string
[src]

Output only. The body of the request that triggered the vulnerability.

§
description?: string
[src]

Output only. The description of the vulnerability.

§
finalUrl?: string
[src]

Output only. The URL where the browser lands when the vulnerability is detected.

§
findingType?: string
[src]

Output only. The type of the Finding. Detailed and up-to-date information on findings can be found here: https://cloud.google.com/security-command-center/docs/how-to-remediate-web-security-scanner-findings

§
form?: Form
[src]

Output only. An addon containing information reported for a vulnerability with an HTML form, if any.

§
frameUrl?: string
[src]

Output only. If the vulnerability was originated from nested IFrame, the immediate parent IFrame is reported.

§
fuzzedUrl?: string
[src]

Output only. The URL produced by the server-side fuzzer and used in the request that triggered the vulnerability.

§
httpMethod?: string
[src]

Output only. The http method of the request that triggered the vulnerability, in uppercase.

§
name?: string
[src]

Output only. The resource name of the Finding. The name follows the format of 'projects/{projectId}/scanConfigs/{scanConfigId}/scanruns/{scanRunId}/findings/{findingId}'. The finding IDs are generated by the system.

§
outdatedLibrary?: OutdatedLibrary
[src]

Output only. An addon containing information about outdated libraries.

§
reproductionUrl?: string
[src]

Output only. The URL containing human-readable payload that user can leverage to reproduce the vulnerability.

§
readonly severity?: "SEVERITY_UNSPECIFIED" | "CRITICAL" | "HIGH" | "MEDIUM" | "LOW"
[src]

Output only. The severity level of the reported vulnerability.

§
trackingId?: string
[src]

Output only. The tracking ID uniquely identifies a vulnerability instance across multiple ScanRuns.

§
violatingResource?: ViolatingResource
[src]

Output only. An addon containing detailed information regarding any resource causing the vulnerability such as JavaScript sources, image, audio files, etc.

§
vulnerableHeaders?: VulnerableHeaders
[src]

Output only. An addon containing information about vulnerable or missing HTTP headers.

§
vulnerableParameters?: VulnerableParameters
[src]

Output only. An addon containing information about request parameters which were found to be vulnerable.

§
xss?: Xss
[src]

Output only. An addon containing information reported for an XSS, if any.

§
readonly xxe?: Xxe
[src]

Output only. An addon containing information reported for an XXE, if any.