List Target's Findings
GET/targets/:target_id/findings/
Request
Path Parameters
Identifier of the target.
Query Parameters
and
- andor
- or10
- low20
- medium30
- highnotfixed
- Not Fixedinvalid
- Invalidaccepted
- Acceptedfixed
- Fixedretesting
- Re-testing
A unique Base58 value identifying this object.
Fields to exclude from the response.
A unique Base58 value identifying this object.
Possible values: [and
, or
]
Logical operator to apply between labels:
(Defaults to or
)
Date and time of when the vulnerability was last found to filter results, in ISO 8601 UTC format.
For example, "2023-08-09T13:27:43.8208302"
Date and time of when the vulnerability was last found to filter results, in ISO 8601 UTC format.
For example, "2023-08-09T13:27:43.8208302"
Number of results to return per page.
Which field to use when ordering the results.
A page number within the paginated result set.
A unique Base58 value identifying this object.
A search term.
Possible values: [10
, 20
, 30
]
Severity of the vulnerability finding:
Possible values: [accepted
, fixed
, invalid
, notfixed
, retesting
]
State of the vulnerability finding:
(Read more about the meaning of vulnerability findings states)
Responses
- 200
- 400
- 401
- 404
- 500
- application/json
- Schema
- Example (from schema)
Schema
Array [
Array [
]
Array [
]
Array [
]
any
- Is logged out if any condition is verified.all
- Is logged out only if all condition are verified.SHA1
- Sha1SHA256
- Sha256SHA512
- Sha5126
- Six7
- Seven8
- EightArray [
]
-
file
- Verifies the domain against a text file in the root directory of the website. Learn more in this article. -
back_office
- Automatically set if manually verified in the back-office. Read-only. -
existing_domain
- Automatically set if the upper-level domain is verified. For example, "my.example.com" is automatically verified if "example.com" is verified. Read-only. -
dns_txt
- Verifies the domain against a TXT record in the Domain Name System (DNS). Learn more in this article. -
dns
- Same asdns_txt
. -
dns_cname
- Verifies the domain against a CNAME record in the Domain Name System (DNS). Learn more in this article. -
meta_tag
- Verifies the domain against a meta tag in the index page of the website. Learn more in this article. -
whitelist
- Automatically verifies if the domain is in the whitelist -
email
- Automatically verifies a domain if the user's email is in the same domain as the target -
aws_route53
- Automatically verifies a domain if the hostname exists as an AWS Route53 Zone. -
cloudflare
- Automatically verifies a domain if the host name exists and is verified as a CloudflareZone. -
waved
- Automatically verifies a domain if there is a waver agreement. openapi
- OpenAPI schema.postman
- Postman collection.Array [
]
application/json
- The payload is in JSON format in the request body.application/x-www-form-urlencoded
- The payload is encoded in the request URL.cookie
- Cookieheader
- HeaderArray [
]
pdf
- PDF file format.docx
- DOCX file format.Array [
]
Array [
]
Array [
]
get
- GETpost
- POSTtrace
- TRACEoptions
- OPTIONSput
- PUTdelete
- DELETEcookie
- Cookieparameter
- Parameterarbitrary_url_param
- Parameterheader
- Headerurl_folder
- URL Pathurl_filename
- URL Pathjson_parameter
- JSON Parameterrequest_body
- Request Bodymultipart_parameter
- Multipart Parametergraphql_parameter
- GraphQL Parameternon_standard_parameter
- Non Standard Parameternotfixed
- Not Fixedinvalid
- Invalidaccepted
- Acceptedfixed
- Fixed10
- low20
- medium30
- high]
Total number of results.
Total number of pages.
Number of the current page.
The first page is 1.
Defaults to 1 if no specific page is requested.
Number of results returned per page.
results
object[]
Global ID in the format: <TARGET_ID>-<FINDING_ID>
target
object
required
Possible values: <= 255 characters
Name of the target.
The maximum length is 255 characters.
site
object
Core settings of the target.
Includes basic target information (like the name, description, and URL) and scanning information (like the authentication and navigation sequences).
A unique Base58 value identifying this object.
Possible values: <= 255 characters
Name of the target or extra host.
The maximum length is 255 characters.
Description of the target.
URL of the target.
Hostname of the target.
If true, the target authentication is done through a login form.
Read more about how to set up target authentication (login form).
Defaults to false.
URL of the login form of the target.
Possible values: <= 255 characters
Pattern to check a successful login.
The maximum length is 255 characters.
form_login
object[]
Field and value pairs to fill the login form.
If true, detects any undesired logouts that may occur during scans to log back in.
Requires check_session_url
and logout_detectors
to be defined.
Defaults to false.
If true, the target authentication is done through a recorded login sequence.
Read more about how to set up target authentication (login sequence).
Defaults to false.
If true, the target authentication is done through username and password credentials.
Defaults to false.
basic_auth
object
Username and password credentials for the basic auth.
Possible values: <= 255 characters
Possible values: <= 255 characters
headers
object[]
Custom headers to send.
cookies
object[]
Custom cookies to send.
whitelist
object
Additional paths to crawl and scan. For example, "archive/search?query=probely". Only relative paths are allowed. The blacklist takes precedence over the whitelist.
Additional paths to crawl and scan. For example, "archive/search?query=probely". Only relative paths are allowed. The blacklist takes precedence over the whitelist.
blacklist
object
URLs to avoid scanning.
For example, "https://example.com/pic-delete.php*" or "*.archive.example.com".
URLs need to be absolute and wildcards (*
) are allowed.
The blacklist takes precedence over the whitelist.
URLs to avoid scanning.
For example, "https://example.com/pic-delete.php*" or "*.archive.example.com".
URLs need to be absolute and wildcards (*
) are allowed.
The blacklist takes precedence over the whitelist.
Date and time of the last change, in ISO 8601 UTC format.
For example, "2023-08-09T13:27:43.8208302".
changed_by
object
required
User who last made changes.
A unique Base58 value identifying this object.
Possible values: <= 254 characters
Email of the user.
Possible values: <= 60 characters
Name of the user.
If true, the target has authentication.
Defaults to false.
Possible values: [any
, all
]
Type of combination of the logout conditions:
URL to check session.
If true, the target has two-factor authentication (2FA).
Read more about how to set up target two-factor authentication (2FA).
Defaults to false.
The seed/secret obtained when the QR code is displayed to be scanned by the third-party authenticator (TPA) app installed on the phone (e.g., Google Authenticator, 1Password, Authy, Microsoft Authenticator, etc.).
Read more about how to set up target two-factor authentication (2FA).
Possible values: [SHA1
, SHA256
, SHA512
]
Default value: SHA1
Secure hash algorithm (SHA) to generate the one-time password (OTP):
(Defaults to SHA1
)
Possible values: >= -2147483648
and <= 2147483647
, [6
, 7
, 8
]
Default value: 6
Number of digits of the one-time password (OTP):
(Defaults to 6
)
CSS selector of the HTML element in the page to enter the one-time password (OTP).
For example, a text input field.
Read more about how to obtain a CSS selector.
Defaults to "".
CSS selector of the HTML element in the page to submit the one-time password (OTP).
For example, a button.
Read more about how to obtain a CSS selector.
Defaults to "".
Possible values: >= 6 characters
and <= 8 characters
One-time password (OTP) obtained at the time when the login sequence was recorded, i.e., the time-based one-time password (TOTP).
Defaults to "".
stack
object[]
Technologies identified in the target during scans.
The scanning engine uses them to fine-tune vulnerability tests and improve the explanation of how to fix vulnerabilities.
A unique Base58 value identifying this object.
Possible values: <= 255 characters
Name of the technology.
For example, "PHP, "SQLite", "Python", "Apache", or "Wordpress".
The maximum lenght is 255 characters.
Description of the technology.
Defaults to "".
If true, the domain is verified. Read-only.
Token used to verify the domain. Read-only.
Date and time of the verification of the domain, in ISO 8601 UTC format. For example, "2023-08-09T13:27:43.8208302". Read-only.
Possible values: [file
, back_office
, existing_domain
, dns_txt
, dns
, dns_cname
, meta_tag
, whitelist
, email
, aws_route53
, cloudflare
, waved
]
Method used in the domain verification:
Error of the last verification of the domain. Read-only.
api_scan_settings
object
required
Scanning settings if the target is an API.
Possible values: [openapi
, postman
]
Type of schema that defines the API:
custom_api_parameters
object[]
Possible values: [application/json
, application/x-www-form-urlencoded
]
Format of the payload:
Possible values: <= 2048 characters
URL to make the authentication request to the API.
The maximum length is 2048 characters.
Possible values: <= 4096 characters
Payload to send in the authentication request.
The maximum length is 4096 characters.
Possible values: <= 256 characters
Field containing the authentication token in the response to the authentication request.
The maximum length is 256 characters.
Possible values: <= 16 characters
Prefix to add to the authentication token.
For example, "Bearer" or "JWT".
The maximum length is 16 characters.
Possible values: <= 256 characters
Parameter name to send the authentication token.
For example, "Authorization".
The maximum length is 256 characters.
Possible values: [cookie
, header
]
Where to send the parameter name with the authentication token and the prefix:
Type of target.
Possible values are "single" for a web application and "api" for an API.
Defaults to "single".
Description of the target.
Defaults to "".
labels
object[]
A unique Base58 value identifying this object.
Possible values: <= 255 characters
Name of the label.
The maximum length is 255 characters.
Possible values: Value must match regular expression ^[a-zA-Z0-9#_-]*$
Color of the label, in RGB hexadecimal format prefixed with "#".
For example, "#00FF00" for green.
changed_by
object
required
User who last made changes.
A unique Base58 value identifying this object.
Possible values: <= 254 characters
Email of the user.
Possible values: <= 60 characters
Name of the user.
Date and time of the last change, in ISO 8601 UTC format.
For example, "2023-08-09T13:27:43.8208302".
Possible values: [pdf
, docx
]
Report format for the target:
(Defaults to pdf
)
scanning_agent
object
nullable
Return serializer_class with all fields as read_only except key. The key is the field use to retrieve the object in to_internal_value
.
This is for the drf-spectacular documentation generation.
Possible values: <= 255 characters
teams
object[]
required
A unique Base58 value identifying this object.
blackout_period
object
required
Time window during which scans are temporarily interrupted.
Time of when the blackout period starts, in ISO 8601 UTC format.
For example, "13:27".
Time of when the blackout period ceases, in ISO 8601 UTC format.
For example, "13:27".
If true, the blackout period is enabled.
Possible values: <= 64 characters
Date and time of the last change, in ISO 8601 UTC format.
For example, "2023-08-09T13:27:43.8208302".
changed_by
object
required
User who last made changes.
A unique Base58 value identifying this object.
Possible values: <= 254 characters
Email of the user.
Possible values: <= 60 characters
Name of the user.
Scans that originated the vulnerability finding.
labels
object[]
required
A unique Base58 value identifying this object.
Possible values: <= 255 characters
Name of the label.
The maximum length is 255 characters.
Possible values: Value must match regular expression ^[a-zA-Z0-9#_-]*$
Color of the label, in RGB hexadecimal format prefixed with "#".
For example, "#00FF00" for green.
changed_by
object
required
User who last made changes.
A unique Base58 value identifying this object.
Possible values: <= 254 characters
Email of the user.
Possible values: <= 60 characters
Name of the user.
Date and time of the last change, in ISO 8601 UTC format.
For example, "2023-08-09T13:27:43.8208302".
Description of how to fix the vulnerability.
requests
object[]
required
Pairs of requests and responses of the vulnerability finding.
Evidence with proof of the vulnerability finding.
Extra details about the vulnerability finding.
definition
object
required
Possible values: <= 255 characters
Name of the vulnerability.
The maximum length is 255 characters.
Description of the vulnerability.
Possible values: <= 66000 characters
URL of the vulnerability finding. For example, "http://www.example.com/user/show-details". The maximum length is 66000 characters.
URL path of the vulnerability finding. For example, "user/show-details".
Possible values: [get
, post
, trace
, options
, put
, delete
]
HTTP method used in the request:
Possible values: [cookie
, parameter
, arbitrary_url_param
, header
, url_folder
, url_filename
, json_parameter
, request_body
, multipart_parameter
, graphql_parameter
, non_standard_parameter
, ``]
Insertion point of the parameter:
Possible values: <= 1024 characters
Name of the inserted parameter.
The maximum length is 1024 characters.
Value of the inserted parameter.
Query parameters of the vulnerability finding, in JSON format. For example, "{'name': ['Joe Smith'], 'phone': ['+919999999999', '+628888888888']}"
assignee
object
required
A unique Base58 value identifying this object.
Possible values: <= 254 characters
Email of the user.
Possible values: <= 60 characters
Name of the user.
Possible values: [notfixed
, invalid
, accepted
, fixed
]
State of the vulnerability finding:
(Read more about the meaning of vulnerability findings states)
Possible values: >= -2147483648
and <= 2147483647
, [10
, 20
, 30
]
Severity of the vulnerability finding:
Score of the vulnerability finding according to the Common Vulnerability Scoring System (CVSS).
Vector with the metrics of the score of the vulnerability finding according to the Common Vulnerability Scoring System (CVSS).
Date and time of when the vulnerability was last found, in ISO 8601 UTC format. For example, "2023-08-09T13:27:43.8208302"
If true, the vulnerability will be retested.
If, after the retest, the vulnerability is no longer found, the vulnerability finding is marked as fixed. Otherwise, it is marked as not fixed.
If true, this is a newly found vulnerability. If false, this vulnerability has been found in previous scans.
Timestamp of the Finding's creation.
Date and time of the last change, in ISO 8601 UTC format.
For example, "2023-08-09T13:27:43.8208302".
changed_by
object
required
User who last made changes.
A unique Base58 value identifying this object.
Possible values: <= 254 characters
Email of the user.
Possible values: <= 60 characters
Name of the user.
Comment on the object.
{
"count": 6,
"page_total": 1,
"page": 1,
"length": 10,
"results": [
{
"id": "string",
"target": {
"id": "string",
"site": {
"id": "string",
"name": "string",
"desc": "string",
"url": "string",
"host": "string",
"has_form_login": false,
"form_login_url": "string",
"form_login_check_pattern": "string",
"form_login": [
{
"name": "string",
"value": "string"
}
],
"logout_detection_enabled": false,
"has_sequence_login": false,
"has_sequence_navigation": true,
"has_basic_auth": false,
"basic_auth": {
"username": "string",
"password": "string"
},
"headers": [
{
"name": "string",
"value": "string"
}
],
"cookies": [
{
"name": "string",
"value": "string"
}
],
"whitelist": {},
"blacklist": {},
"changed": "2024-07-29T15:51:28.071Z",
"changed_by": {
"id": "string",
"email": "[email protected]",
"name": "string"
},
"auth_enabled": false,
"logout_condition": "any",
"check_session_url": "string",
"has_otp": true,
"otp_secret": "string",
"otp_algorithm": "SHA1",
"otp_digits": 6,
"otp_field": "string",
"otp_submit": "string",
"otp_login_sequence_totp_value": "string",
"otp_type": "string",
"otp_url": "string",
"stack": [
{
"id": "string",
"name": "string",
"desc": "string"
}
],
"verified": true,
"verification_token": "string",
"verification_date": "2024-07-29T15:51:28.071Z",
"verification_method": "file",
"verification_last_error": "string",
"api_scan_settings": {
"api_schema_type": "openapi",
"api_schema_url": "string",
"api_schema_file": "string",
"custom_api_parameters": [
{
"name": "string",
"value": "string"
}
],
"media_type": "application/json",
"api_login_url": "string",
"api_login_payload": "string",
"api_login_enabled": true,
"api_login_token_field": "string",
"token_prefix": "string",
"token_parameter_name": "string",
"token_parameter_location": "cookie"
}
},
"type": "string",
"labels": [
{
"id": "string",
"name": "string",
"color": "string",
"changed_by": {
"id": "string",
"email": "[email protected]",
"name": "string"
},
"changed": "2024-07-29T15:51:28.071Z"
}
],
"has_assets": true,
"report_fileformat": "pdf",
"scanning_agent": {
"id": "string",
"name": "string",
"installer_generated": true,
"online": true,
"fallback": true,
"rx_bytes": 0,
"tx_bytes": 0,
"latest_handshake": 0
},
"teams": [
{
"id": "string",
"name": "string"
}
],
"blackout_period": {
"begin": "string",
"cease": "string",
"weekdays": [
0
],
"enabled": true,
"timezone": "string",
"changed": "2024-07-29T15:51:28.071Z",
"changed_by": {
"id": "string",
"email": "[email protected]",
"name": "string"
}
}
},
"scans": [
"string"
],
"labels": [
{
"id": "string",
"name": "string",
"color": "string",
"changed_by": {
"id": "string",
"email": "[email protected]",
"name": "string"
},
"changed": "2024-07-29T15:51:28.071Z"
}
],
"fix": "string",
"requests": [
{
"request": "string",
"response": "string"
}
],
"evidence": "string",
"extra": "string",
"definition": {
"id": "string",
"name": "string",
"desc": "string"
},
"url": "string",
"path": "string",
"method": "get",
"insertion_point": "cookie",
"parameter": "string",
"value": "string",
"params": "string",
"assignee": {
"id": "string",
"email": "[email protected]",
"name": "string"
},
"state": "notfixed",
"severity": 10,
"cvss_score": 0,
"cvss_vector": "string",
"last_found": "2024-07-29T15:51:28.071Z",
"retesting": true,
"new": true,
"created_at": "2024-07-29T15:51:28.071Z",
"changed": "2024-07-29T15:51:28.071Z",
"changed_by": {
"id": "string",
"email": "[email protected]",
"name": "string"
},
"comment": "string"
}
]
}
- application/json
- Schema
- Example (from schema)
Schema
{
"<field name>": [
"Errors related to field <field name>."
],
"non_field_errors": [
"Errors not related to any field specific field."
]
}
- application/json
- Schema
- Example (from schema)
Schema
{
"detail": "Incorrect authentication credentials."
}
- application/json
- Schema
- Example (from schema)
Schema
{
"detail": "Not found."
}
- application/json
- Schema
- Example (from schema)
Schema
{
"detail": "Unexpected error while handling your request."
}