Get a list of findings.

External Documentation

To learn more, visit the Seemplicity documentation.

Basic Parameters

ParameterDescription
AfterA cursor for paginating forward through the results.
BeforeA cursor for paginating backward through the results.
FirstThe maximum number of findings to return in a single request.
LastThe maximum number of findings to return.Note fetches results from the end of the dataset instead of the beginning.
SortSorting options that determine the order of the findings.

Advanced Parameters

ParameterDescription
FiltersA JSON object defining the filtering criteria, such as limiting results by status, ticket status, or source.Example: { "operator": "and", "operands": [ { "field": "actual_status", "condition": "", "value": { "field": "category", "condition": "in", "value": [ "OPEN" ] } }, { "field": "ticket_status", "condition": "in", "value": [ "BACKLOG", "SCHEDULED" ] } ] }
Filters Scope IDA unique identifier for a specific scope to show results from.
Filters Scopes JsonA JSON containing the filter conditions.
Include Original SeveritySelect to include the original severity of each finding before any adjustments were applied.
Include Total CountSelect to include the total number of findings matching the query.

Example Output

{
	"data": {
		"finding": {
			"id": "RmluZGluZzoxODAxNTA=",
			"id_int": 180150,
			"finding_id": "1-1-findings.id IN (902, 905) and (1 is not null)",
			"last_reported_time": "2021-04-07T14:52:29+00:00",
			"cloud_provider": "github",
			"original_status": "",
			"discovered_time": "2022-02-19T06:58:31+00:00",
			"cloud_account": "github:mobile-app",
			"package_name": null,
			"datasource": {
				"friendly_name": "GHB"
			},
			"main_resource": {
				"resource_name": "mobile-app"
			},
			"title": "Code Injection in js-yaml - Multiple Vulnerabilities",
			"finding_score": {
				"score": 10.0,
				"severity": 3,
				"original_score": null
			},
			"age": 709,
			"description": "Versions of `js-yaml` prior to 3.13.1 are vulnerable to Code Injection. The `load()` function may execute arbitrary code injected through a malicious YAML file. Objects that have `toString` as key, JavaScript code as value and are used as explicit mapping keys allow attackers to execute the supplied code through the `load()` function. The `safeLoad()` function is unaffected.\n\nAn example payload is \n`{{ toString: !<tag:yaml.org,2002:js/function> 'function (){{return Date.now()}}' }} : 1` \nwhich returns the object\n{{\n \"1553107949161\": 1\n}}\n\n\n## Recommendation\n\nUpgrade to version 3.13.1."
		}
	}
}

Workflow Library Example

Get Findings with Seemplicity and Send Results Via Email

Preview this Workflow on desktop