- Resource: Note
- Vulnerability
- Detail
- CVSSv3
- AttackVector
- AttackComplexity
- PrivilegesRequired
- UserInteraction
- Scope
- Impact
- WindowsDetail
- KnowledgeBase
- Build
- BuildSignature
- KeyType
- Basis
- Package
- Distribution
- Architecture
- Deployable
- Discovery
- Authority
- Hint
- InToto
- SigningKey
- ArtifactRule
- Methods
Resource: Note
A type of analysis that can be done for a resource.
JSON representation | |
---|---|
{ "name": string, "shortDescription": string, "longDescription": string, "kind": enum ( |
Fields | ||
---|---|---|
name |
Output only. The name of the note in the form of |
|
shortDescription |
A one sentence description of this note. |
|
longDescription |
A detailed description of this note. |
|
kind |
Output only. The type of analysis. This field can be used as a filter in list requests. |
|
relatedUrl[] |
URLs associated with this note. |
|
expirationTime |
Time of expiration for this note. Empty if note does not expire. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: |
|
createTime |
Output only. The time this note was created. This field can be used as a filter in list requests. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: |
|
updateTime |
Output only. The time this note was last updated. This field can be used as a filter in list requests. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: |
|
relatedNoteNames[] |
Other notes related to this note. |
|
Union field type . Required. Immutable. The type of analysis this note represents. type can be only one of the following: |
||
vulnerability |
A note describing a package vulnerability. |
|
build |
A note describing build provenance for a verifiable build. |
|
baseImage |
A note describing a base image. |
|
package |
A note describing a package hosted by various package managers. |
|
deployable |
A note describing something that can be deployed. |
|
discovery |
A note describing the initial analysis of a resource. |
|
attestationAuthority |
A note describing an attestation role. |
|
intoto |
A note describing an in-toto link. |
Vulnerability
Vulnerability provides metadata about a security vulnerability in a Note.
JSON representation | |
---|---|
{ "cvssScore": number, "severity": enum ( |
Fields | |
---|---|
cvssScore |
The CVSS score for this vulnerability. |
severity |
Note provider assigned impact of the vulnerability. |
details[] |
All information about the package to specifically identify this vulnerability. One entry per (version range and cpeUri) the package vulnerability has manifested in. |
cvssV3 |
The full description of the CVSSv3. |
windowsDetails[] |
Windows details get their own format because the information format and model don't match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version. |
sourceUpdateTime |
The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: |
Detail
Identifies all appearances of this vulnerability in the package for a specific distro/location. For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
JSON representation | |
---|---|
{ "cpeUri": string, "package": string, "minAffectedVersion": { object ( |
Fields | |
---|---|
cpeUri |
Required. The CPE URI in cpe format in which the vulnerability manifests. Examples include distro or storage location for vulnerable jar. |
package |
Required. The name of the package where the vulnerability was found. |
minAffectedVersion |
The min version of the package in which the vulnerability exists. |
maxAffectedVersion |
The max version of the package in which the vulnerability exists. |
severityName |
The severity (eg: distro assigned severity) for this vulnerability. |
description |
A vendor-specific description of this note. |
fixedLocation |
The fix for this specific package version. |
packageType |
The type of package; whether native or non native(ruby gems, node.js packages etc). |
isObsolete |
Whether this detail is obsolete. Occurrences are expected not to point to obsolete details. |
sourceUpdateTime |
The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: |
CVSSv3
Common Vulnerability Scoring System version 3. For details, see https://www.first.org/cvss/specification-document
JSON representation | |
---|---|
{ "baseScore": number, "exploitabilityScore": number, "impactScore": number, "attackVector": enum ( |
Fields | |
---|---|
baseScore |
The base score is a function of the base metric scores. |
exploitabilityScore |
|
impactScore |
|
attackVector |
Base Metrics Represents the intrinsic characteristics of a vulnerability that are constant over time and across user environments. |
attackComplexity |
|
privilegesRequired |
|
userInteraction |
|
scope |
|
confidentialityImpact |
|
integrityImpact |
|
availabilityImpact |
|
AttackVector
Enums | |
---|---|
ATTACK_VECTOR_UNSPECIFIED |
|
ATTACK_VECTOR_NETWORK |
|
ATTACK_VECTOR_ADJACENT |
|
ATTACK_VECTOR_LOCAL |
|
ATTACK_VECTOR_PHYSICAL |
AttackComplexity
Enums | |
---|---|
ATTACK_COMPLEXITY_UNSPECIFIED |
|
ATTACK_COMPLEXITY_LOW |
|
ATTACK_COMPLEXITY_HIGH |
PrivilegesRequired
Enums | |
---|---|
PRIVILEGES_REQUIRED_UNSPECIFIED |
|
PRIVILEGES_REQUIRED_NONE |
|
PRIVILEGES_REQUIRED_LOW |
|
PRIVILEGES_REQUIRED_HIGH |
UserInteraction
Enums | |
---|---|
USER_INTERACTION_UNSPECIFIED |
|
USER_INTERACTION_NONE |
|
USER_INTERACTION_REQUIRED |
Scope
Enums | |
---|---|
SCOPE_UNSPECIFIED |
|
SCOPE_UNCHANGED |
|
SCOPE_CHANGED |
Impact
Enums | |
---|---|
IMPACT_UNSPECIFIED |
|
IMPACT_HIGH |
|
IMPACT_LOW |
|
IMPACT_NONE |
WindowsDetail
JSON representation | |
---|---|
{
"cpeUri": string,
"name": string,
"description": string,
"fixingKbs": [
{
object ( |
Fields | |
---|---|
cpeUri |
Required. The CPE URI in cpe format in which the vulnerability manifests. Examples include distro or storage location for vulnerable jar. |
name |
Required. The name of the vulnerability. |
description |
The description of the vulnerability. |
fixingKbs[] |
Required. The names of the KBs which have hotfixes to mitigate this vulnerability. Note that there may be multiple hotfixes (and thus multiple KBs) that mitigate a given vulnerability. Currently any listed kb's presence is considered a fix. |
KnowledgeBase
JSON representation | |
---|---|
{ "name": string, "url": string } |
Fields | |
---|---|
name |
The KB name (generally of the form KB[0-9]+ i.e. KB123456). |
url |
A link to the KB in the Windows update catalog - https://www.catalog.update.microsoft.com/ |
Build
Note holding the version of the provider's builder and the signature of the provenance message in the build details occurrence.
JSON representation | |
---|---|
{
"builderVersion": string,
"signature": {
object ( |
Fields | |
---|---|
builderVersion |
Required. Immutable. Version of the builder which produced this build. |
signature |
Signature of the build in occurrences pointing to this build note containing build details. |
BuildSignature
Message encapsulating the signature of the verified build.
JSON representation | |
---|---|
{
"publicKey": string,
"signature": string,
"keyId": string,
"keyType": enum ( |
Fields | |
---|---|
publicKey |
Public key of the builder which can be used to verify that the related findings are valid and unchanged. If This field may be empty if For Cloud Build based signatures, this is a PEM encoded public key. To verify the Cloud Build signature, place the contents of this field into a file (public.pem). The signature field is base64-decoded into its binary representation in signature.bin, and the provenance bytes from |
signature |
Required. Signature of the related A base64-encoded string. |
keyId |
An ID for the key used to sign. This could be either an ID for the key stored in |
keyType |
The type of the key, either stored in |
KeyType
Public key formats.
Enums | |
---|---|
KEY_TYPE_UNSPECIFIED |
KeyType is not set. |
PGP_ASCII_ARMORED |
PGP ASCII Armored public key. |
PKIX_PEM |
PKIX PEM public key. |
Basis
Basis describes the base image portion (Note) of the DockerImage relationship. Linked occurrences are derived from this or an equivalent image via: FROM <Basis.resource_url> Or an equivalent reference, e.g. a tag of the resourceUrl.
JSON representation | |
---|---|
{
"resourceUrl": string,
"fingerprint": {
object ( |
Fields | |
---|---|
resourceUrl |
Required. Immutable. The resourceUrl for the resource representing the basis of associated occurrence images. |
fingerprint |
Required. Immutable. The fingerprint of the base image. |
Package
This represents a particular package that is distributed over various channels. E.g., glibc (aka libc6) is distributed by many, at various versions.
JSON representation | |
---|---|
{
"name": string,
"distribution": [
{
object ( |
Fields | |
---|---|
name |
Required. Immutable. The name of the package. |
distribution[] |
The various channels by which a package is distributed. |
Distribution
This represents a particular channel of distribution for a given package. E.g., Debian's jessie-backports dpkg mirror.
JSON representation | |
---|---|
{ "cpeUri": string, "architecture": enum ( |
Fields | |
---|---|
cpeUri |
Required. The cpeUri in CPE format denoting the package manager version distributing a package. |
architecture |
The CPU architecture for which packages in this distribution channel were built. |
latestVersion |
The latest available version of this package in this distribution channel. |
maintainer |
A freeform string denoting the maintainer of this package. |
url |
The distribution channel-specific homepage for this package. |
description |
The distribution channel-specific description of this package. |
Architecture
Instruction set architectures supported by various package managers.
Enums | |
---|---|
ARCHITECTURE_UNSPECIFIED |
Unknown architecture. |
X86 |
X86 architecture. |
X64 |
X64 architecture. |
Deployable
An artifact that can be deployed in some runtime.
JSON representation | |
---|---|
{ "resourceUri": [ string ] } |
Fields | |
---|---|
resourceUri[] |
Required. Resource URI for the artifact being deployed. |
Discovery
A note that indicates a type of analysis a provider would perform. This note exists in a provider's project. A Discovery
occurrence is created in a consumer's project at the start of analysis.
JSON representation | |
---|---|
{
"analysisKind": enum ( |
Fields | |
---|---|
analysisKind |
Required. Immutable. The kind of analysis that is handled by this discovery. |
Authority
Note kind that represents a logical attestation "role" or "authority". For example, an organization might have one Authority
for "QA" and one for "build". This note is intended to act strictly as a grouping mechanism for the attached occurrences (Attestations). This grouping mechanism also provides a security boundary, since IAM ACLs gate the ability for a principle to attach an occurrence to a given note. It also provides a single point of lookup to find all attached attestation occurrences, even if they don't all live in the same project.
JSON representation | |
---|---|
{
"hint": {
object ( |
Fields | |
---|---|
hint |
Hint hints at the purpose of the attestation authority. |
Hint
This submessage provides human-readable hints about the purpose of the authority. Because the name of a note acts as its resource reference, it is important to disambiguate the canonical name of the Note (which might be a UUID for security purposes) from "readable" names more suitable for debug output. Note that these hints should not be used to look up authorities in security sensitive contexts, such as when looking up attestations to verify.
JSON representation | |
---|---|
{ "humanReadableName": string } |
Fields | |
---|---|
humanReadableName |
Required. The human readable name of this attestation authority, for example "qa". |
InToto
This contains the fields corresponding to the definition of a software supply chain step in an in-toto layout. This information goes into a Grafeas note.
JSON representation | |
---|---|
{ "stepName": string, "signingKeys": [ { object ( |
Fields | |
---|---|
stepName |
This field identifies the name of the step in the supply chain. |
signingKeys[] |
This field contains the public keys that can be used to verify the signatures on the step metadata. |
expectedMaterials[] |
The following fields contain in-toto artifact rules identifying the artifacts that enter this supply chain step, and exit the supply chain step, i.e. materials and products of the step. |
expectedProducts[] |
|
expectedCommand[] |
This field contains the expected command used to perform the step. |
threshold |
This field contains a value that indicates the minimum number of keys that need to be used to sign the step's in-toto link. |
SigningKey
This defines the format used to record keys used in the software supply chain. An in-toto link is attested using one or more keys defined in the in-toto layout. An example of this is: { "keyId": "776a00e29f3559e0141b3b096f696abc6cfb0c657ab40f441132b345b0...", "keyType": "rsa", "publicKeyValue": "-----BEGIN PUBLIC KEY-----\nMIIBojANBgkqhkiG9w0B...", "keyScheme": "rsassa-pss-sha256" } The format for in-toto's key definition can be found in section 4.2 of the in-toto specification.
JSON representation | |
---|---|
{ "keyId": string, "keyType": string, "publicKeyValue": string, "keyScheme": string } |
Fields | |
---|---|
keyId |
keyId is an identifier for the signing key. |
keyType |
This field identifies the specific signing method. Eg: "rsa", "ed25519", and "ecdsa". |
publicKeyValue |
This field contains the actual public key. |
keyScheme |
This field contains the corresponding signature scheme. Eg: "rsassa-pss-sha256". |
ArtifactRule
Defines an object to declare an in-toto artifact rule
JSON representation | |
---|---|
{ "artifactRule": [ string ] } |
Fields | |
---|---|
artifactRule[] |
|
Methods |
|
---|---|
|
Creates new notes in batch. |
|
Creates a new note. |
|
Deletes the specified note. |
|
Gets the specified note. |
|
Gets the access control policy for a note or an occurrence resource. |
|
Lists notes for the specified project. |
|
Updates the specified note. |
|
Sets the access control policy on the specified note or occurrence. |
|
Returns the permissions that a caller has on the specified note or occurrence. |