Class: Google::Cloud::WebSecurityScanner::V1beta::Finding
- Inherits:
-
Object
- Object
- Google::Cloud::WebSecurityScanner::V1beta::Finding
- Extended by:
- Protobuf::MessageExts::ClassMethods
- Includes:
- Protobuf::MessageExts
- Defined in:
- proto_docs/google/cloud/websecurityscanner/v1beta/finding.rb
Overview
A Finding resource represents a vulnerability instance identified during a ScanRun.
Instance Attribute Summary collapse
-
#body ⇒ ::String
The body of the request that triggered the vulnerability.
-
#description ⇒ ::String
The description of the vulnerability.
-
#final_url ⇒ ::String
The URL where the browser lands when the vulnerability is detected.
-
#finding_type ⇒ ::String
The type of the Finding.
-
#form ⇒ ::Google::Cloud::WebSecurityScanner::V1beta::Form
An addon containing information reported for a vulnerability with an HTML form, if any.
-
#frame_url ⇒ ::String
If the vulnerability was originated from nested IFrame, the immediate parent IFrame is reported.
-
#fuzzed_url ⇒ ::String
The URL produced by the server-side fuzzer and used in the request that triggered the vulnerability.
-
#http_method ⇒ ::String
The http method of the request that triggered the vulnerability, in uppercase.
-
#name ⇒ ::String
The resource name of the Finding.
-
#outdated_library ⇒ ::Google::Cloud::WebSecurityScanner::V1beta::OutdatedLibrary
An addon containing information about outdated libraries.
-
#reproduction_url ⇒ ::String
The URL containing human-readable payload that user can leverage to reproduce the vulnerability.
-
#tracking_id ⇒ ::String
The tracking ID uniquely identifies a vulnerability instance across multiple ScanRuns.
-
#violating_resource ⇒ ::Google::Cloud::WebSecurityScanner::V1beta::ViolatingResource
An addon containing detailed information regarding any resource causing the vulnerability such as JavaScript sources, image, audio files, etc.
-
#vulnerable_headers ⇒ ::Google::Cloud::WebSecurityScanner::V1beta::VulnerableHeaders
An addon containing information about vulnerable or missing HTTP headers.
-
#vulnerable_parameters ⇒ ::Google::Cloud::WebSecurityScanner::V1beta::VulnerableParameters
An addon containing information about request parameters which were found to be vulnerable.
-
#xss ⇒ ::Google::Cloud::WebSecurityScanner::V1beta::Xss
An addon containing information reported for an XSS, if any.
Instance Attribute Details
#body ⇒ ::String
Returns The body of the request that triggered the vulnerability.
86 87 88 89 |
# File 'proto_docs/google/cloud/websecurityscanner/v1beta/finding.rb', line 86 class Finding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end |
#description ⇒ ::String
Returns The description of the vulnerability.
86 87 88 89 |
# File 'proto_docs/google/cloud/websecurityscanner/v1beta/finding.rb', line 86 class Finding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end |
#final_url ⇒ ::String
Returns The URL where the browser lands when the vulnerability is detected.
86 87 88 89 |
# File 'proto_docs/google/cloud/websecurityscanner/v1beta/finding.rb', line 86 class Finding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end |
#finding_type ⇒ ::String
Returns The type of the Finding. Detailed and up-to-date information on findings can be found here: https://cloud.google.com/security-scanner/docs/scan-result-details.
86 87 88 89 |
# File 'proto_docs/google/cloud/websecurityscanner/v1beta/finding.rb', line 86 class Finding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end |
#form ⇒ ::Google::Cloud::WebSecurityScanner::V1beta::Form
Returns An addon containing information reported for a vulnerability with an HTML form, if any.
86 87 88 89 |
# File 'proto_docs/google/cloud/websecurityscanner/v1beta/finding.rb', line 86 class Finding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end |
#frame_url ⇒ ::String
Returns If the vulnerability was originated from nested IFrame, the immediate parent IFrame is reported.
86 87 88 89 |
# File 'proto_docs/google/cloud/websecurityscanner/v1beta/finding.rb', line 86 class Finding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end |
#fuzzed_url ⇒ ::String
Returns The URL produced by the server-side fuzzer and used in the request that triggered the vulnerability.
86 87 88 89 |
# File 'proto_docs/google/cloud/websecurityscanner/v1beta/finding.rb', line 86 class Finding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end |
#http_method ⇒ ::String
Returns The http method of the request that triggered the vulnerability, in uppercase.
86 87 88 89 |
# File 'proto_docs/google/cloud/websecurityscanner/v1beta/finding.rb', line 86 class Finding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end |
#name ⇒ ::String
Returns The resource name of the Finding. The name follows the format of 'projects/{projectId}/scanConfigs/{scanConfigId}/scanruns/{scanRunId}/findings/{findingId}'. The finding IDs are generated by the system.
86 87 88 89 |
# File 'proto_docs/google/cloud/websecurityscanner/v1beta/finding.rb', line 86 class Finding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end |
#outdated_library ⇒ ::Google::Cloud::WebSecurityScanner::V1beta::OutdatedLibrary
Returns An addon containing information about outdated libraries.
86 87 88 89 |
# File 'proto_docs/google/cloud/websecurityscanner/v1beta/finding.rb', line 86 class Finding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end |
#reproduction_url ⇒ ::String
Returns The URL containing human-readable payload that user can leverage to reproduce the vulnerability.
86 87 88 89 |
# File 'proto_docs/google/cloud/websecurityscanner/v1beta/finding.rb', line 86 class Finding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end |
#tracking_id ⇒ ::String
Returns The tracking ID uniquely identifies a vulnerability instance across multiple ScanRuns.
86 87 88 89 |
# File 'proto_docs/google/cloud/websecurityscanner/v1beta/finding.rb', line 86 class Finding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end |
#violating_resource ⇒ ::Google::Cloud::WebSecurityScanner::V1beta::ViolatingResource
Returns An addon containing detailed information regarding any resource causing the vulnerability such as JavaScript sources, image, audio files, etc.
86 87 88 89 |
# File 'proto_docs/google/cloud/websecurityscanner/v1beta/finding.rb', line 86 class Finding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end |
#vulnerable_headers ⇒ ::Google::Cloud::WebSecurityScanner::V1beta::VulnerableHeaders
Returns An addon containing information about vulnerable or missing HTTP headers.
86 87 88 89 |
# File 'proto_docs/google/cloud/websecurityscanner/v1beta/finding.rb', line 86 class Finding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end |
#vulnerable_parameters ⇒ ::Google::Cloud::WebSecurityScanner::V1beta::VulnerableParameters
Returns An addon containing information about request parameters which were found to be vulnerable.
86 87 88 89 |
# File 'proto_docs/google/cloud/websecurityscanner/v1beta/finding.rb', line 86 class Finding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end |
#xss ⇒ ::Google::Cloud::WebSecurityScanner::V1beta::Xss
Returns An addon containing information reported for an XSS, if any.
86 87 88 89 |
# File 'proto_docs/google/cloud/websecurityscanner/v1beta/finding.rb', line 86 class Finding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end |