Documentation Index
Fetch the complete documentation index at: https://docs.blinkops.com/llms.txt
Use this file to discover all available pages before exploring further.
Get a list of findings.
Basic Parameters
| Parameter | Description |
|---|
| After | A cursor for paginating forward through the results. |
| Before | A cursor for paginating backward through the results. |
| First | The maximum number of findings to return in a single request. |
| Last | The maximum number of findings to return.
Note fetches results from the end of the dataset instead of the beginning. |
| Sort | Sorting options that determine the order of the findings. |
Advanced Parameters
| Parameter | Description |
|---|
| Filters | A JSON object defining the filtering criteria, such as limiting results by status, ticket status, or source.
Example:
{ “operator”: “and”, “operands”: [ { “field”: “actual_status”, “condition”: "", “value”: { “field”: “category”, “condition”: “in”, “value”: [ “OPEN” ] } }, { “field”: “ticket_status”, “condition”: “in”, “value”: [ “BACKLOG”, “SCHEDULED” ] } ] }
|
| Filters Scope ID | A unique identifier for a specific scope to show results from. |
| Filters Scopes Json | A JSON containing the filter conditions. |
| Include Original Severity | Select to include the original severity of each finding before any adjustments were applied. |
| Include Total Count | Select to include the total number of findings matching the query. |
Example Output
{
"data": {
"finding": {
"id": "RmluZGluZzoxODAxNTA=",
"id_int": 180150,
"finding_id": "1-1-findings.id IN (902, 905) and (1 is not null)",
"last_reported_time": "2021-04-07T14:52:29+00:00",
"cloud_provider": "github",
"original_status": "",
"discovered_time": "2022-02-19T06:58:31+00:00",
"cloud_account": "github:mobile-app",
"package_name": null,
"datasource": {
"friendly_name": "GHB"
},
"main_resource": {
"resource_name": "mobile-app"
},
"title": "Code Injection in js-yaml - Multiple Vulnerabilities",
"finding_score": {
"score": 10.0,
"severity": 3,
"original_score": null
},
"age": 709,
"description": "Versions of `js-yaml` prior to 3.13.1 are vulnerable to Code Injection. The `load()` function may execute arbitrary code injected through a malicious YAML file. Objects that have `toString` as key, JavaScript code as value and are used as explicit mapping keys allow attackers to execute the supplied code through the `load()` function. The `safeLoad()` function is unaffected.\n\nAn example payload is \n`{{ toString: !<tag:yaml.org,2002:js/function> 'function (){{return Date.now()}}' }} : 1` \nwhich returns the object\n{{\n \"1553107949161\": 1\n}}\n\n\n## Recommendation\n\nUpgrade to version 3.13.1."
}
}
}
Workflow Library Example
Get Findings with Seemplicity and Send Results Via Email