Skip to content

Commit 0ee5f2f

Browse files
feat(securitycenter): update the api
#### securitycenter:v1 The following keys were added: - schemas.Cwe (Total Keys: 5) - schemas.GoogleCloudSecuritycenterV2Cwe (Total Keys: 5) - schemas.GoogleCloudSecuritycenterV2Vulnerability.properties.cwes (Total Keys: 2) - schemas.GoogleCloudSecuritycenterV2Vulnerability.properties.providerRiskScore (Total Keys: 2) - schemas.GoogleCloudSecuritycenterV2Vulnerability.properties.reachable.type (Total Keys: 1) - schemas.Vulnerability.properties.cwes (Total Keys: 2) - schemas.Vulnerability.properties.providerRiskScore (Total Keys: 2) - schemas.Vulnerability.properties.reachable.type (Total Keys: 1) #### securitycenter:v1beta1 The following keys were added: - schemas.Cwe (Total Keys: 5) - schemas.GoogleCloudSecuritycenterV2Cwe (Total Keys: 5) - schemas.GoogleCloudSecuritycenterV2Vulnerability.properties.cwes (Total Keys: 2) - schemas.GoogleCloudSecuritycenterV2Vulnerability.properties.providerRiskScore (Total Keys: 2) - schemas.GoogleCloudSecuritycenterV2Vulnerability.properties.reachable.type (Total Keys: 1) - schemas.Vulnerability.properties.cwes (Total Keys: 2) - schemas.Vulnerability.properties.providerRiskScore (Total Keys: 2) - schemas.Vulnerability.properties.reachable.type (Total Keys: 1) #### securitycenter:v1beta2 The following keys were added: - schemas.Cwe (Total Keys: 5) - schemas.GoogleCloudSecuritycenterV2Cwe (Total Keys: 5) - schemas.GoogleCloudSecuritycenterV2Vulnerability.properties.cwes (Total Keys: 2) - schemas.GoogleCloudSecuritycenterV2Vulnerability.properties.providerRiskScore (Total Keys: 2) - schemas.GoogleCloudSecuritycenterV2Vulnerability.properties.reachable.type (Total Keys: 1) - schemas.Vulnerability.properties.cwes (Total Keys: 2) - schemas.Vulnerability.properties.providerRiskScore (Total Keys: 2) - schemas.Vulnerability.properties.reachable.type (Total Keys: 1)
1 parent 8e694c9 commit 0ee5f2f

9 files changed

+467
-3
lines changed

docs/dyn/securitycenter_v1.folders.securityHealthAnalyticsSettings.customModules.html

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1232,6 +1232,17 @@ <h3>Method Details</h3>
12321232
&quot;upstreamFixAvailable&quot;: True or False, # Whether upstream fix is available for the CVE.
12331233
&quot;zeroDay&quot;: True or False, # Whether or not the vulnerability was zero day when the finding was published.
12341234
},
1235+
&quot;cwes&quot;: [ # Represents one or more Common Weakness Enumeration (CWE) information on this vulnerability.
1236+
{ # CWE stands for Common Weakness Enumeration. Information about this weakness, as described by [CWE](https://cwe.mitre.org/).
1237+
&quot;id&quot;: &quot;A String&quot;, # The CWE identifier, e.g. CWE-94
1238+
&quot;references&quot;: [ # Any reference to the details on the CWE, for example, https://cwe.mitre.org/data/definitions/94.html
1239+
{ # Additional Links
1240+
&quot;source&quot;: &quot;A String&quot;, # Source of the reference e.g. NVD
1241+
&quot;uri&quot;: &quot;A String&quot;, # Uri for the mentioned source e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527.
1242+
},
1243+
],
1244+
},
1245+
],
12351246
&quot;fixedPackage&quot;: { # Package is a generic definition of a package. # The fixed package is relevant to the finding.
12361247
&quot;cpeUri&quot;: &quot;A String&quot;, # The CPE URI where the vulnerability was detected.
12371248
&quot;packageName&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was detected.
@@ -1244,6 +1255,8 @@ <h3>Method Details</h3>
12441255
&quot;packageType&quot;: &quot;A String&quot;, # Type of package, for example, os, maven, or go.
12451256
&quot;packageVersion&quot;: &quot;A String&quot;, # The version of the package.
12461257
},
1258+
&quot;providerRiskScore&quot;: &quot;A String&quot;, # Provider provided risk_score based on multiple factors. The higher the risk score, the more risky the vulnerability is.
1259+
&quot;reachable&quot;: True or False, # Represents whether the vulnerability is reachable (detected via static analysis)
12471260
&quot;securityBulletin&quot;: { # SecurityBulletin are notifications of vulnerabilities of Google products. # The security bulletin is relevant to this finding.
12481261
&quot;bulletinId&quot;: &quot;A String&quot;, # ID of the bulletin corresponding to the vulnerability.
12491262
&quot;submissionTime&quot;: &quot;A String&quot;, # Submission time of this Security Bulletin.

docs/dyn/securitycenter_v1.folders.sources.findings.html

Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -801,6 +801,17 @@ <h3>Method Details</h3>
801801
&quot;upstreamFixAvailable&quot;: True or False, # Whether upstream fix is available for the CVE.
802802
&quot;zeroDay&quot;: True or False, # Whether or not the vulnerability was zero day when the finding was published.
803803
},
804+
&quot;cwes&quot;: [ # Represents one or more Common Weakness Enumeration (CWE) information on this vulnerability.
805+
{ # CWE stands for Common Weakness Enumeration. Information about this weakness, as described by [CWE](https://cwe.mitre.org/).
806+
&quot;id&quot;: &quot;A String&quot;, # The CWE identifier, e.g. CWE-94
807+
&quot;references&quot;: [ # Any reference to the details on the CWE, for example, https://cwe.mitre.org/data/definitions/94.html
808+
{ # Additional Links
809+
&quot;source&quot;: &quot;A String&quot;, # Source of the reference e.g. NVD
810+
&quot;uri&quot;: &quot;A String&quot;, # Uri for the mentioned source e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527.
811+
},
812+
],
813+
},
814+
],
804815
&quot;fixedPackage&quot;: { # Package is a generic definition of a package. # The fixed package is relevant to the finding.
805816
&quot;cpeUri&quot;: &quot;A String&quot;, # The CPE URI where the vulnerability was detected.
806817
&quot;packageName&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was detected.
@@ -813,6 +824,8 @@ <h3>Method Details</h3>
813824
&quot;packageType&quot;: &quot;A String&quot;, # Type of package, for example, os, maven, or go.
814825
&quot;packageVersion&quot;: &quot;A String&quot;, # The version of the package.
815826
},
827+
&quot;providerRiskScore&quot;: &quot;A String&quot;, # Provider provided risk_score based on multiple factors. The higher the risk score, the more risky the vulnerability is.
828+
&quot;reachable&quot;: True or False, # Represents whether the vulnerability is reachable (detected via static analysis)
816829
&quot;securityBulletin&quot;: { # SecurityBulletin are notifications of vulnerabilities of Google products. # The security bulletin is relevant to this finding.
817830
&quot;bulletinId&quot;: &quot;A String&quot;, # ID of the bulletin corresponding to the vulnerability.
818831
&quot;submissionTime&quot;: &quot;A String&quot;, # Submission time of this Security Bulletin.
@@ -1526,6 +1539,17 @@ <h3>Method Details</h3>
15261539
&quot;upstreamFixAvailable&quot;: True or False, # Whether upstream fix is available for the CVE.
15271540
&quot;zeroDay&quot;: True or False, # Whether or not the vulnerability was zero day when the finding was published.
15281541
},
1542+
&quot;cwes&quot;: [ # Represents one or more Common Weakness Enumeration (CWE) information on this vulnerability.
1543+
{ # CWE stands for Common Weakness Enumeration. Information about this weakness, as described by [CWE](https://cwe.mitre.org/).
1544+
&quot;id&quot;: &quot;A String&quot;, # The CWE identifier, e.g. CWE-94
1545+
&quot;references&quot;: [ # Any reference to the details on the CWE, for example, https://cwe.mitre.org/data/definitions/94.html
1546+
{ # Additional Links
1547+
&quot;source&quot;: &quot;A String&quot;, # Source of the reference e.g. NVD
1548+
&quot;uri&quot;: &quot;A String&quot;, # Uri for the mentioned source e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527.
1549+
},
1550+
],
1551+
},
1552+
],
15291553
&quot;fixedPackage&quot;: { # Package is a generic definition of a package. # The fixed package is relevant to the finding.
15301554
&quot;cpeUri&quot;: &quot;A String&quot;, # The CPE URI where the vulnerability was detected.
15311555
&quot;packageName&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was detected.
@@ -1538,6 +1562,8 @@ <h3>Method Details</h3>
15381562
&quot;packageType&quot;: &quot;A String&quot;, # Type of package, for example, os, maven, or go.
15391563
&quot;packageVersion&quot;: &quot;A String&quot;, # The version of the package.
15401564
},
1565+
&quot;providerRiskScore&quot;: &quot;A String&quot;, # Provider provided risk_score based on multiple factors. The higher the risk score, the more risky the vulnerability is.
1566+
&quot;reachable&quot;: True or False, # Represents whether the vulnerability is reachable (detected via static analysis)
15411567
&quot;securityBulletin&quot;: { # SecurityBulletin are notifications of vulnerabilities of Google products. # The security bulletin is relevant to this finding.
15421568
&quot;bulletinId&quot;: &quot;A String&quot;, # ID of the bulletin corresponding to the vulnerability.
15431569
&quot;submissionTime&quot;: &quot;A String&quot;, # Submission time of this Security Bulletin.
@@ -2165,6 +2191,17 @@ <h3>Method Details</h3>
21652191
&quot;upstreamFixAvailable&quot;: True or False, # Whether upstream fix is available for the CVE.
21662192
&quot;zeroDay&quot;: True or False, # Whether or not the vulnerability was zero day when the finding was published.
21672193
},
2194+
&quot;cwes&quot;: [ # Represents one or more Common Weakness Enumeration (CWE) information on this vulnerability.
2195+
{ # CWE stands for Common Weakness Enumeration. Information about this weakness, as described by [CWE](https://cwe.mitre.org/).
2196+
&quot;id&quot;: &quot;A String&quot;, # The CWE identifier, e.g. CWE-94
2197+
&quot;references&quot;: [ # Any reference to the details on the CWE, for example, https://cwe.mitre.org/data/definitions/94.html
2198+
{ # Additional Links
2199+
&quot;source&quot;: &quot;A String&quot;, # Source of the reference e.g. NVD
2200+
&quot;uri&quot;: &quot;A String&quot;, # Uri for the mentioned source e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527.
2201+
},
2202+
],
2203+
},
2204+
],
21682205
&quot;fixedPackage&quot;: { # Package is a generic definition of a package. # The fixed package is relevant to the finding.
21692206
&quot;cpeUri&quot;: &quot;A String&quot;, # The CPE URI where the vulnerability was detected.
21702207
&quot;packageName&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was detected.
@@ -2177,6 +2214,8 @@ <h3>Method Details</h3>
21772214
&quot;packageType&quot;: &quot;A String&quot;, # Type of package, for example, os, maven, or go.
21782215
&quot;packageVersion&quot;: &quot;A String&quot;, # The version of the package.
21792216
},
2217+
&quot;providerRiskScore&quot;: &quot;A String&quot;, # Provider provided risk_score based on multiple factors. The higher the risk score, the more risky the vulnerability is.
2218+
&quot;reachable&quot;: True or False, # Represents whether the vulnerability is reachable (detected via static analysis)
21802219
&quot;securityBulletin&quot;: { # SecurityBulletin are notifications of vulnerabilities of Google products. # The security bulletin is relevant to this finding.
21812220
&quot;bulletinId&quot;: &quot;A String&quot;, # ID of the bulletin corresponding to the vulnerability.
21822221
&quot;submissionTime&quot;: &quot;A String&quot;, # Submission time of this Security Bulletin.
@@ -2817,6 +2856,17 @@ <h3>Method Details</h3>
28172856
&quot;upstreamFixAvailable&quot;: True or False, # Whether upstream fix is available for the CVE.
28182857
&quot;zeroDay&quot;: True or False, # Whether or not the vulnerability was zero day when the finding was published.
28192858
},
2859+
&quot;cwes&quot;: [ # Represents one or more Common Weakness Enumeration (CWE) information on this vulnerability.
2860+
{ # CWE stands for Common Weakness Enumeration. Information about this weakness, as described by [CWE](https://cwe.mitre.org/).
2861+
&quot;id&quot;: &quot;A String&quot;, # The CWE identifier, e.g. CWE-94
2862+
&quot;references&quot;: [ # Any reference to the details on the CWE, for example, https://cwe.mitre.org/data/definitions/94.html
2863+
{ # Additional Links
2864+
&quot;source&quot;: &quot;A String&quot;, # Source of the reference e.g. NVD
2865+
&quot;uri&quot;: &quot;A String&quot;, # Uri for the mentioned source e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527.
2866+
},
2867+
],
2868+
},
2869+
],
28202870
&quot;fixedPackage&quot;: { # Package is a generic definition of a package. # The fixed package is relevant to the finding.
28212871
&quot;cpeUri&quot;: &quot;A String&quot;, # The CPE URI where the vulnerability was detected.
28222872
&quot;packageName&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was detected.
@@ -2829,6 +2879,8 @@ <h3>Method Details</h3>
28292879
&quot;packageType&quot;: &quot;A String&quot;, # Type of package, for example, os, maven, or go.
28302880
&quot;packageVersion&quot;: &quot;A String&quot;, # The version of the package.
28312881
},
2882+
&quot;providerRiskScore&quot;: &quot;A String&quot;, # Provider provided risk_score based on multiple factors. The higher the risk score, the more risky the vulnerability is.
2883+
&quot;reachable&quot;: True or False, # Represents whether the vulnerability is reachable (detected via static analysis)
28322884
&quot;securityBulletin&quot;: { # SecurityBulletin are notifications of vulnerabilities of Google products. # The security bulletin is relevant to this finding.
28332885
&quot;bulletinId&quot;: &quot;A String&quot;, # ID of the bulletin corresponding to the vulnerability.
28342886
&quot;submissionTime&quot;: &quot;A String&quot;, # Submission time of this Security Bulletin.
@@ -3470,6 +3522,17 @@ <h3>Method Details</h3>
34703522
&quot;upstreamFixAvailable&quot;: True or False, # Whether upstream fix is available for the CVE.
34713523
&quot;zeroDay&quot;: True or False, # Whether or not the vulnerability was zero day when the finding was published.
34723524
},
3525+
&quot;cwes&quot;: [ # Represents one or more Common Weakness Enumeration (CWE) information on this vulnerability.
3526+
{ # CWE stands for Common Weakness Enumeration. Information about this weakness, as described by [CWE](https://cwe.mitre.org/).
3527+
&quot;id&quot;: &quot;A String&quot;, # The CWE identifier, e.g. CWE-94
3528+
&quot;references&quot;: [ # Any reference to the details on the CWE, for example, https://cwe.mitre.org/data/definitions/94.html
3529+
{ # Additional Links
3530+
&quot;source&quot;: &quot;A String&quot;, # Source of the reference e.g. NVD
3531+
&quot;uri&quot;: &quot;A String&quot;, # Uri for the mentioned source e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527.
3532+
},
3533+
],
3534+
},
3535+
],
34733536
&quot;fixedPackage&quot;: { # Package is a generic definition of a package. # The fixed package is relevant to the finding.
34743537
&quot;cpeUri&quot;: &quot;A String&quot;, # The CPE URI where the vulnerability was detected.
34753538
&quot;packageName&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was detected.
@@ -3482,6 +3545,8 @@ <h3>Method Details</h3>
34823545
&quot;packageType&quot;: &quot;A String&quot;, # Type of package, for example, os, maven, or go.
34833546
&quot;packageVersion&quot;: &quot;A String&quot;, # The version of the package.
34843547
},
3548+
&quot;providerRiskScore&quot;: &quot;A String&quot;, # Provider provided risk_score based on multiple factors. The higher the risk score, the more risky the vulnerability is.
3549+
&quot;reachable&quot;: True or False, # Represents whether the vulnerability is reachable (detected via static analysis)
34853550
&quot;securityBulletin&quot;: { # SecurityBulletin are notifications of vulnerabilities of Google products. # The security bulletin is relevant to this finding.
34863551
&quot;bulletinId&quot;: &quot;A String&quot;, # ID of the bulletin corresponding to the vulnerability.
34873552
&quot;submissionTime&quot;: &quot;A String&quot;, # Submission time of this Security Bulletin.

docs/dyn/securitycenter_v1.organizations.securityHealthAnalyticsSettings.customModules.html

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1232,6 +1232,17 @@ <h3>Method Details</h3>
12321232
&quot;upstreamFixAvailable&quot;: True or False, # Whether upstream fix is available for the CVE.
12331233
&quot;zeroDay&quot;: True or False, # Whether or not the vulnerability was zero day when the finding was published.
12341234
},
1235+
&quot;cwes&quot;: [ # Represents one or more Common Weakness Enumeration (CWE) information on this vulnerability.
1236+
{ # CWE stands for Common Weakness Enumeration. Information about this weakness, as described by [CWE](https://cwe.mitre.org/).
1237+
&quot;id&quot;: &quot;A String&quot;, # The CWE identifier, e.g. CWE-94
1238+
&quot;references&quot;: [ # Any reference to the details on the CWE, for example, https://cwe.mitre.org/data/definitions/94.html
1239+
{ # Additional Links
1240+
&quot;source&quot;: &quot;A String&quot;, # Source of the reference e.g. NVD
1241+
&quot;uri&quot;: &quot;A String&quot;, # Uri for the mentioned source e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527.
1242+
},
1243+
],
1244+
},
1245+
],
12351246
&quot;fixedPackage&quot;: { # Package is a generic definition of a package. # The fixed package is relevant to the finding.
12361247
&quot;cpeUri&quot;: &quot;A String&quot;, # The CPE URI where the vulnerability was detected.
12371248
&quot;packageName&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was detected.
@@ -1244,6 +1255,8 @@ <h3>Method Details</h3>
12441255
&quot;packageType&quot;: &quot;A String&quot;, # Type of package, for example, os, maven, or go.
12451256
&quot;packageVersion&quot;: &quot;A String&quot;, # The version of the package.
12461257
},
1258+
&quot;providerRiskScore&quot;: &quot;A String&quot;, # Provider provided risk_score based on multiple factors. The higher the risk score, the more risky the vulnerability is.
1259+
&quot;reachable&quot;: True or False, # Represents whether the vulnerability is reachable (detected via static analysis)
12471260
&quot;securityBulletin&quot;: { # SecurityBulletin are notifications of vulnerabilities of Google products. # The security bulletin is relevant to this finding.
12481261
&quot;bulletinId&quot;: &quot;A String&quot;, # ID of the bulletin corresponding to the vulnerability.
12491262
&quot;submissionTime&quot;: &quot;A String&quot;, # Submission time of this Security Bulletin.

0 commit comments

Comments
 (0)