- Resource: Note
- JSON representation
- Vulnerability
- Detail
- CVSSv3
- AttackVector
- AttackComplexity
- PrivilegesRequired
- UserInteraction
- Scope
- Impact
- WindowsDetail
- KnowledgeBase
- Build
- BuildSignature
- KeyType
- Basis
- Package
- Distribution
- Digest
- Deployable
- Discovery
- Authority
- Hint
- InToto
- SigningKey
- ArtifactRule
- DocumentNote
- PackageInfoNote
- ExternalRef
- Category
- FileNote
- FileType
- RelationshipNote
- VulnerabilityAssessmentNote
- Publisher
- Product
- Assessment
- SBOMReferenceNote
- Methods
Resource: Note
A type of analysis that can be done for a resource.
JSON representation |
---|
{ "name": string, "shortDescription": string, "longDescription": string, "kind": enum ( |
Fields | |
---|---|
name |
Output only. The name of the note in the form of |
shortDescription |
A one sentence description of this note. |
longDescription |
A detailed description of this note. |
kind |
Output only. The type of analysis. This field can be used as a filter in list requests. |
relatedUrl[] |
URLs associated with this note. |
expirationTime |
Time of expiration for this note. Empty if note does not expire. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: |
createTime |
Output only. The time this note was created. This field can be used as a filter in list requests. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: |
updateTime |
Output only. The time this note was last updated. This field can be used as a filter in list requests. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: |
relatedNoteNames[] |
Other notes related to this note. |
Union field type . Required. Immutable. The type of analysis this note represents. type can be only one of the following: |
|
vulnerability |
A note describing a package vulnerability. |
build |
A note describing build provenance for a verifiable build. |
baseImage |
A note describing a base image. |
package |
A note describing a package hosted by various package managers. |
deployable |
A note describing something that can be deployed. |
discovery |
A note describing the initial analysis of a resource. |
attestationAuthority |
A note describing an attestation role. |
intoto |
A note describing an in-toto link. |
sbom |
A note describing a software bill of materials. |
spdxPackage |
A note describing an SPDX Package. |
spdxFile |
A note describing an SPDX File. |
spdxRelationship |
A note describing an SPDX File. |
vulnerabilityAssessment |
A note describing a vulnerability assessment. |
sbomReference |
A note describing an SBOM reference. |
Vulnerability
Vulnerability provides metadata about a security vulnerability in a Note.
JSON representation |
---|
{ "cvssScore": number, "severity": enum ( |
Fields | |
---|---|
cvssScore |
The CVSS score for this vulnerability. |
severity |
Note provider assigned impact of the vulnerability. |
details[] |
All information about the package to specifically identify this vulnerability. One entry per (version range and cpeUri) the package vulnerability has manifested in. |
cvssV3 |
The full description of the CVSS for version 3. |
windowsDetails[] |
Windows details get their own format because the information format and model don't match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version. |
sourceUpdateTime |
The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: |
cvssV2 |
The full description of the CVSS for version 2. |
cwe[] |
A list of CWE for this vulnerability. For details, see: https://cwe.mitre.org/index.html |
cvssVersion |
CVSS version used to populate cvssScore and severity. |
Detail
Identifies all appearances of this vulnerability in the package for a specific distro/location. For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
JSON representation |
---|
{ "cpeUri": string, "package": string, "minAffectedVersion": { object ( |
Fields | |
---|---|
cpeUri |
Required. The CPE URI in cpe format in which the vulnerability manifests. Examples include distro or storage location for vulnerable jar. |
package |
Required. The name of the package where the vulnerability was found. |
minAffectedVersion |
The min version of the package in which the vulnerability exists. |
maxAffectedVersion |
The max version of the package in which the vulnerability exists. |
severityName |
The severity (eg: distro assigned severity) for this vulnerability. |
description |
A vendor-specific description of this note. |
fixedLocation |
The fix for this specific package version. |
packageType |
The type of package; whether native or non native(ruby gems, node.js packages etc). |
isObsolete |
Whether this detail is obsolete. Occurrences are expected not to point to obsolete details. |
sourceUpdateTime |
The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: |
source |
The source from which the information in this Detail was obtained. |
vendor |
The name of the vendor of the product. |
CVSSv3
Deprecated. Common Vulnerability Scoring System version 3. For details, see https://www.first.org/cvss/specification-document
JSON representation |
---|
{ "baseScore": number, "exploitabilityScore": number, "impactScore": number, "attackVector": enum ( |
Fields | |
---|---|
baseScore |
The base score is a function of the base metric scores. |
exploitabilityScore |
|
impactScore |
|
attackVector |
Base Metrics Represents the intrinsic characteristics of a vulnerability that are constant over time and across user environments. |
attackComplexity |
|
privilegesRequired |
|
userInteraction |
|
scope |
|
confidentialityImpact |
|
integrityImpact |
|
availabilityImpact |
|
AttackVector
Enums | |
---|---|
ATTACK_VECTOR_UNSPECIFIED |
|
ATTACK_VECTOR_NETWORK |
|
ATTACK_VECTOR_ADJACENT |
|
ATTACK_VECTOR_LOCAL |
|
ATTACK_VECTOR_PHYSICAL |
AttackComplexity
Enums | |
---|---|
ATTACK_COMPLEXITY_UNSPECIFIED |
|
ATTACK_COMPLEXITY_LOW |
|
ATTACK_COMPLEXITY_HIGH |
PrivilegesRequired
Enums | |
---|---|
PRIVILEGES_REQUIRED_UNSPECIFIED |
|
PRIVILEGES_REQUIRED_NONE |
|
PRIVILEGES_REQUIRED_LOW |
|
PRIVILEGES_REQUIRED_HIGH |
UserInteraction
Enums | |
---|---|
USER_INTERACTION_UNSPECIFIED |
|
USER_INTERACTION_NONE |
|
USER_INTERACTION_REQUIRED |
Scope
Enums | |
---|---|
SCOPE_UNSPECIFIED |
|
SCOPE_UNCHANGED |
|
SCOPE_CHANGED |
Impact
Enums | |
---|---|
IMPACT_UNSPECIFIED |
|
IMPACT_HIGH |
|
IMPACT_LOW |
|
IMPACT_NONE |
WindowsDetail
JSON representation |
---|
{
"cpeUri": string,
"name": string,
"description": string,
"fixingKbs": [
{
object ( |
Fields | |
---|---|
cpeUri |
Required. The CPE URI in cpe format in which the vulnerability manifests. Examples include distro or storage location for vulnerable jar. |
name |
Required. The name of the vulnerability. |
description |
The description of the vulnerability. |
fixingKbs[] |
Required. The names of the KBs which have hotfixes to mitigate this vulnerability. Note that there may be multiple hotfixes (and thus multiple KBs) that mitigate a given vulnerability. Currently any listed kb's presence is considered a fix. |
KnowledgeBase
JSON representation |
---|
{ "name": string, "url": string } |
Fields | |
---|---|
name |
The KB name (generally of the form KB[0-9]+ i.e. KB123456). |
url |
A link to the KB in the Windows update catalog - https://www.catalog.update.microsoft.com/ |
Build
Note holding the version of the provider's builder and the signature of the provenance message in the build details occurrence.
JSON representation |
---|
{
"builderVersion": string,
"signature": {
object ( |
Fields | |
---|---|
builderVersion |
Required. Immutable. Version of the builder which produced this build. |
signature |
Signature of the build in occurrences pointing to this build note containing build details. |
BuildSignature
Message encapsulating the signature of the verified build.
JSON representation |
---|
{
"publicKey": string,
"signature": string,
"keyId": string,
"keyType": enum ( |
Fields | |
---|---|
publicKey |
Public key of the builder which can be used to verify that the related findings are valid and unchanged. If This field may be empty if For Cloud Build based signatures, this is a PEM encoded public key. To verify the Cloud Build signature, place the contents of this field into a file (public.pem). The signature field is base64-decoded into its binary representation in signature.bin, and the provenance bytes from |
signature |
Required. Signature of the related A base64-encoded string. |
keyId |
An ID for the key used to sign. This could be either an ID for the key stored in |
keyType |
The type of the key, either stored in |
KeyType
Public key formats.
Enums | |
---|---|
KEY_TYPE_UNSPECIFIED |
KeyType is not set. |
PGP_ASCII_ARMORED |
PGP ASCII Armored public key. |
PKIX_PEM |
PKIX PEM public key. |
Basis
Basis describes the base image portion (Note) of the DockerImage relationship. Linked occurrences are derived from this or an equivalent image via: FROM <Basis.resource_url> Or an equivalent reference, e.g. a tag of the resourceUrl.
JSON representation |
---|
{
"resourceUrl": string,
"fingerprint": {
object ( |
Fields | |
---|---|
resourceUrl |
Required. Immutable. The resourceUrl for the resource representing the basis of associated occurrence images. |
fingerprint |
Required. Immutable. The fingerprint of the base image. |
Package
Package represents a particular package version.
JSON representation |
---|
{ "name": string, "distribution": [ { object ( |
Fields | |
---|---|
name |
Required. Immutable. The name of the package. |
distribution[] |
The various channels by which a package is distributed. |
packageType |
The type of package; whether native or non native (e.g., ruby gems, node.js packages, etc.). |
cpeUri |
The cpeUri in CPE format denoting the package manager version distributing a package. The cpeUri will be blank for language packages. |
architecture |
The CPU architecture for which packages in this distribution channel were built. Architecture will be blank for language packages. |
version |
The version of the package. |
maintainer |
A freeform text denoting the maintainer of this package. |
url |
The homepage for this package. |
description |
The description of this package. |
license |
Licenses that have been declared by the authors of the package. |
digest[] |
Hash value, typically a file digest, that allows unique identification a specific package. |
Distribution
This represents a particular channel of distribution for a given package. E.g., Debian's jessie-backports dpkg mirror.
JSON representation |
---|
{ "cpeUri": string, "architecture": enum ( |
Fields | |
---|---|
cpeUri |
Required. The cpeUri in CPE format denoting the package manager version distributing a package. |
architecture |
The CPU architecture for which packages in this distribution channel were built. |
latestVersion |
The latest available version of this package in this distribution channel. |
maintainer |
A freeform string denoting the maintainer of this package. |
url |
The distribution channel-specific homepage for this package. |
description |
The distribution channel-specific description of this package. |
Digest
Digest information.
JSON representation |
---|
{ "algo": string, "digestBytes": string } |
Fields | |
---|---|
algo |
|
digestBytes |
Value of the digest. A base64-encoded string. |
Deployable
An artifact that can be deployed in some runtime.
JSON representation |
---|
{ "resourceUri": [ string ] } |
Fields | |
---|---|
resourceUri[] |
Required. Resource URI for the artifact being deployed. |
Discovery
A note that indicates a type of analysis a provider would perform. This note exists in a provider's project. A Discovery
occurrence is created in a consumer's project at the start of analysis.
JSON representation |
---|
{
"analysisKind": enum ( |
Fields | |
---|---|
analysisKind |
Required. Immutable. The kind of analysis that is handled by this discovery. |
Authority
Note kind that represents a logical attestation "role" or "authority". For example, an organization might have one Authority
for "QA" and one for "build". This note is intended to act strictly as a grouping mechanism for the attached occurrences (Attestations). This grouping mechanism also provides a security boundary, since IAM ACLs gate the ability for a principle to attach an occurrence to a given note. It also provides a single point of lookup to find all attached attestation occurrences, even if they don't all live in the same project.
JSON representation |
---|
{
"hint": {
object ( |
Fields | |
---|---|
hint |
Hint hints at the purpose of the attestation authority. |
Hint
This submessage provides human-readable hints about the purpose of the authority. Because the name of a note acts as its resource reference, it is important to disambiguate the canonical name of the Note (which might be a UUID for security purposes) from "readable" names more suitable for debug output. Note that these hints should not be used to look up authorities in security sensitive contexts, such as when looking up attestations to verify.
JSON representation |
---|
{ "humanReadableName": string } |
Fields | |
---|---|
humanReadableName |
Required. The human readable name of this attestation authority, for example "qa". |
InToto
This contains the fields corresponding to the definition of a software supply chain step in an in-toto layout. This information goes into a Grafeas note.
JSON representation |
---|
{ "stepName": string, "signingKeys": [ { object ( |
Fields | |
---|---|
stepName |
This field identifies the name of the step in the supply chain. |
signingKeys[] |
This field contains the public keys that can be used to verify the signatures on the step metadata. |
expectedMaterials[] |
The following fields contain in-toto artifact rules identifying the artifacts that enter this supply chain step, and exit the supply chain step, i.e. materials and products of the step. |
expectedProducts[] |
|
expectedCommand[] |
This field contains the expected command used to perform the step. |
threshold |
This field contains a value that indicates the minimum number of keys that need to be used to sign the step's in-toto link. |
SigningKey
This defines the format used to record keys used in the software supply chain. An in-toto link is attested using one or more keys defined in the in-toto layout. An example of this is: { "keyId": "776a00e29f3559e0141b3b096f696abc6cfb0c657ab40f441132b345b0...", "keyType": "rsa", "publicKeyValue": "-----BEGIN PUBLIC KEY-----\nMIIBojANBgkqhkiG9w0B...", "keyScheme": "rsassa-pss-sha256" } The format for in-toto's key definition can be found in section 4.2 of the in-toto specification.
JSON representation |
---|
{ "keyId": string, "keyType": string, "publicKeyValue": string, "keyScheme": string } |
Fields | |
---|---|
keyId |
keyId is an identifier for the signing key. |
keyType |
This field identifies the specific signing method. Eg: "rsa", "ed25519", and "ecdsa". |
publicKeyValue |
This field contains the actual public key. |
keyScheme |
This field contains the corresponding signature scheme. Eg: "rsassa-pss-sha256". |
ArtifactRule
Defines an object to declare an in-toto artifact rule
JSON representation |
---|
{ "artifactRule": [ string ] } |
Fields | |
---|---|
artifactRule[] |
|
DocumentNote
DocumentNote represents an SPDX Document Creation Information section: https://spdx.github.io/spdx-spec/2-document-creation-information/
JSON representation |
---|
{ "spdxVersion": string, "dataLicence": string } |
Fields | |
---|---|
spdxVersion |
Provide a reference number that can be used to understand how to parse and interpret the rest of the file |
dataLicence |
Compliance with the SPDX specification includes populating the SPDX fields therein with data related to such fields ("SPDX-Metadata") |
PackageInfoNote
PackageInfoNote represents an SPDX Package Information section: https://spdx.github.io/spdx-spec/3-package-information/
JSON representation |
---|
{ "title": string, "version": string, "supplier": string, "originator": string, "downloadLocation": string, "analyzed": boolean, "verificationCode": string, "checksum": string, "homePage": string, "filesLicenseInfo": [ string ], "licenseDeclared": { object ( |
Fields | |
---|---|
title |
Identify the full name of the package as given by the Package Originator |
version |
Identify the version of the package |
supplier |
Identify the actual distribution source for the package/directory identified in the SPDX file |
originator |
If the package identified in the SPDX file originated from a different person or organization than identified as Package Supplier, this field identifies from where or whom the package originally came |
downloadLocation |
This section identifies the download Universal Resource Locator (URL), or a specific location within a version control system (VCS) for the package at the time that the SPDX file was created |
analyzed |
Indicates whether the file content of this package has been available for or subjected to analysis when creating the SPDX document |
verificationCode |
This field provides an independently reproducible mechanism identifying specific contents of a package based on the actual files (except the SPDX file itself, if it is included in the package) that make up each package and that correlates to the data in this SPDX file |
checksum |
Provide an independently reproducible mechanism that permits unique identification of a specific package that correlates to the data in this SPDX file |
homePage |
Provide a place for the SPDX file creator to record a web site that serves as the package's home page |
filesLicenseInfo[] |
Contain the license the SPDX file creator has concluded as governing the This field is to contain a list of all licenses found in the package. The relationship between licenses (i.e., conjunctive, disjunctive) is not specified in this field – it is simply a listing of all licenses found |
licenseDeclared |
List the licenses that have been declared by the authors of the package |
copyright |
Identify the copyright holders of the package, as well as any dates present |
summaryDescription |
A short description of the package |
detailedDescription |
A more detailed description of the package |
externalRefs[] |
ExternalRef |
attribution |
A place for the SPDX data creator to record, at the package level, acknowledgements that may be needed to be communicated in some contexts |
packageType |
The type of package: OS, MAVEN, GO, GO_STDLIB, etc. |
ExternalRef
An External Reference allows a Package to reference an external source of additional information, metadata, enumerations, asset identifiers, or downloadable content believed to be relevant to the Package
JSON representation |
---|
{
"category": enum ( |
Fields | |
---|---|
category |
An External Reference allows a Package to reference an external source of additional information, metadata, enumerations, asset identifiers, or downloadable content believed to be relevant to the Package |
type |
Type of category (e.g. 'npm' for the PACKAGE_MANAGER category) |
locator |
The unique string with no spaces necessary to access the package-specific information, metadata, or content within the target location |
comment |
Human-readable information about the purpose and target of the reference |
Category
The category of the external reference
Enums | |
---|---|
CATEGORY_UNSPECIFIED |
Unspecified |
SECURITY |
Security (e.g. cpe22Type, cpe23Type) |
PACKAGE_MANAGER |
Package Manager (e.g. maven-central, npm, nuget, bower, purl) |
PERSISTENT_ID |
Persistent-Id (e.g. swh) |
OTHER |
Other |
FileNote
FileNote represents an SPDX File Information section: https://spdx.github.io/spdx-spec/4-file-information/
JSON representation |
---|
{
"title": string,
"fileType": enum ( |
Fields | |
---|---|
title |
Identify the full path and filename that corresponds to the file information in this section |
fileType |
This field provides information about the type of file identified |
checksum[] |
Provide a unique identifier to match analysis information on each specific file in a package |
FileType
File Type is intrinsic to the file, independent of how the file is being used
Enums | |
---|---|
FILE_TYPE_UNSPECIFIED |
Unspecified |
SOURCE |
The file is human readable source code (.c, .html, etc.) |
BINARY |
The file is a compiled object, target image or binary executable (.o, .a, etc.) |
ARCHIVE |
The file represents an archive (.tar, .jar, etc.) |
APPLICATION |
The file is associated with a specific application type (MIME type of application/*) |
AUDIO |
The file is associated with an audio file (MIME type of audio/* , e.g. .mp3) |
IMAGE |
The file is associated with an picture image file (MIME type of image/*, e.g., .jpg, .gif) |
TEXT |
The file is human readable text file (MIME type of text/*) |
VIDEO |
The file is associated with a video file type (MIME type of video/*) |
DOCUMENTATION |
The file serves as documentation |
SPDX |
The file is an SPDX document |
OTHER |
The file doesn't fit into the above categories (generated artifacts, data files, etc.) |
RelationshipNote
RelationshipNote represents an SPDX Relationship section: https://spdx.github.io/spdx-spec/7-relationships-between-SPDX-elements/
JSON representation |
---|
{
"type": enum ( |
Fields | |
---|---|
type |
The type of relationship between the source and target SPDX elements |
VulnerabilityAssessmentNote
A single VulnerabilityAssessmentNote represents one particular product's vulnerability assessment for one CVE.
JSON representation |
---|
{ "title": string, "shortDescription": string, "longDescription": string, "languageCode": string, "publisher": { object ( |
Fields | |
---|---|
title |
The title of the note. E.g. |
shortDescription |
A one sentence description of this Vex. |
longDescription |
A detailed description of this Vex. |
languageCode |
Identifies the language used by this document, corresponding to IETF BCP 47 / RFC 5646. |
publisher |
Publisher details of this Note. |
product |
The product affected by this vex. |
assessment |
Represents a vulnerability assessment for the product. |
Publisher
Publisher contains information about the publisher of this Note.
JSON representation |
---|
{ "name": string, "issuingAuthority": string, "publisherNamespace": string } |
Fields | |
---|---|
name |
Name of the publisher. Examples: 'Google', 'Google Cloud Platform'. |
issuingAuthority |
Provides information about the authority of the issuing party to release the document, in particular, the party's constituency and responsibilities or other obligations. |
publisherNamespace |
The context or namespace. Contains a URL which is under control of the issuing party and can be used as a globally unique identifier for that issuing party. Example: https://csaf.io |
Product
Product contains information about a product and how to uniquely identify it.
JSON representation |
---|
{ "name": string, "id": string, // Union field |
Fields | |
---|---|
name |
Name of the product. |
id |
Token that identifies a product so that it can be referred to from other parts in the document. There is no predefined format as long as it uniquely identifies a group in the context of the current document. |
Union field
|
|
genericUri |
Contains a URI which is vendor-specific. Example: The artifact repository URL of an image. |
Assessment
Assessment provides all information that is related to a single vulnerability for this product.
JSON representation |
---|
{ "cve": string, "vulnerabilityId": string, "shortDescription": string, "longDescription": string, "relatedUris": [ { object ( |
Fields | |
---|---|
cve |
Holds the MITRE standard Common Vulnerabilities and Exposures (CVE) tracking number for the vulnerability. Deprecated: Use vulnerabilityId instead to denote CVEs. |
vulnerabilityId |
The vulnerability identifier for this Assessment. Will hold one of common identifiers e.g. CVE, GHSA etc. |
shortDescription |
A one sentence description of this Vex. |
longDescription |
A detailed description of this Vex. |
relatedUris[] |
Holds a list of references associated with this vulnerability item and assessment. These uris have additional information about the vulnerability and the assessment itself. E.g. Link to a document which details how this assessment concluded the state of this vulnerability. |
state |
Provides the state of this Vulnerability assessment. |
impacts[] |
Contains information about the impact of this vulnerability, this will change with time. |
justification |
Justification provides the justification when the state of the assessment if NOT_AFFECTED. |
remediations[] |
Specifies details on how to handle (and presumably, fix) a vulnerability. |
SBOMReferenceNote
The note representing an SBOM reference.
JSON representation |
---|
{ "format": string, "version": string } |
Fields | |
---|---|
format |
The format that SBOM takes. E.g. may be spdx, cyclonedx, etc... |
version |
The version of the format that the SBOM takes. E.g. if the format is spdx, the version may be 2.3. |
Methods |
|
---|---|
|
Creates new notes in batch. |
|
Creates a new note. |
|
Deletes the specified note. |
|
Gets the specified note. |
|
Gets the access control policy for a note or an occurrence resource. |
|
Lists notes for the specified project. |
|
Updates the specified note. |
|
Sets the access control policy on the specified note or occurrence. |
|
Returns the permissions that a caller has on the specified note or occurrence. |