Get desktop application:
View/edit binary Protocol Buffers messages
The expected state of a client's local database.
Used in:
The SHA256 hash of the client state; that is, of the sorted list of all hashes present in the database.
The client metadata associated with Safe Browsing API requests specific to users of Chrome.
Used in:
The reporting population of the user.
Safe Browsing reporting populations in Chrome.
Used in:
Unspecified reporting verbosity.
Client is opted out of reporting.
Legacy extended reporting population.
Scout reporting population.
The client metadata associated with Safe Browsing API requests.
Used in:
, ,A client ID that (hopefully) uniquely identifies the client implementation of the Safe Browsing API.
The version of the client implementation.
The ways in which threat entry sets can be compressed.
Used in:
,Unknown.
Raw, uncompressed data.
Rice-Golomb encoded data.
Used in:
, ,Signed seconds of the span of time. Must be from -315,576,000,000 to +315,576,000,000 inclusive.
Signed fractions of a second at nanosecond resolution of the span of time. Durations less than one second are represented with a 0 `seconds` field and a positive or negative `nanos` field. For durations of one second or more, a non-zero value for the `nanos` field must be of the same sign as the `seconds` field. Must be from -999,999,999 to +999,999,999 inclusive.
Describes a Safe Browsing API update request. Clients can request updates for multiple lists in a single request.
The client metadata.
The requested threat list updates.
Chrome-specific client information.
A single list update request.
Used in:
The type of threat posed by entries present in the list.
The type of platform at risk by entries present in the list.
The types of entries present in the list.
The current state of the client for the requested list (the encrypted ClientState that was sent to the client from the previous update request).
The constraints associated with this request.
The constraints for this update.
Used in:
The maximum size in number of entries. The update will not contain more entries than this value. This should be a power of 2 between 2**10 and 2**20. If zero, no update size limit is set.
Sets the maxmimum number of entries that the client is willing to have in the local database. This should be a power of 2 between 2**10 and 2**20. If zero, no database size limit is set.
Requests the list for a specific geographic location. If not set the server may pick that value based on the user's IP address. Expects ISO 3166-1 alpha-2 format.
The compression types supported by the client.
Response type for threat list update requests.
The list updates requested by the clients.
The minimum duration the client must wait before issuing any update request. If this field is not set clients may update as soon as they want.
An update to an individual list.
Used in:
The threat type for which data is returned.
The format of the threats.
The platform type for which data is returned.
The type of response. This may indicate that an action is required by the client when the response is received.
A set of entries to add to a local threat type's list. Repeated to allow for a combination of compressed and raw data to be sent in a single response.
A set of entries to remove from a local threat type's list. In practice, this field is empty or contains exactly one ThreatEntrySet.
The new client state, in encrypted format. Opaque to clients.
The expected SHA256 hash of the client state; that is, of the sorted list of all hashes present in the database after applying the provided update. If the client state doesn't match the expected state, the client must disregard this update and retry later.
The type of response sent to the client.
Used in:
Unknown.
Partial updates are applied to the client's existing local database.
Full updates replace the client's entire local database. This means that either the client was seriously out-of-date or the client is believed to be corrupt.
Request to return full hashes matched by the provided hash prefixes.
The client metadata.
The current client states for each of the client's local threat lists.
The lists and hashes to be checked.
Response type for requests to find full hashes.
The full hashes that matched the requested prefixes.
The minimum duration the client must wait before issuing any find hashes request. If this field is not set, clients can issue a request as soon as they want.
For requested entities that did not match the threat list, how long to cache the response.
Request to check entries against lists.
The client metadata.
The lists and entries to be checked for matches.
Response type for requests to find threat matches.
The threat list matches.
A collection of lists available for download.
The lists available for download.
Types of platforms.
Used in:
, , , , ,Unknown platform.
Threat posed to Windows.
Threat posed to Linux.
Threat posed to Android. This cannot be ANDROID because that symbol is defined for android builds here: build/config/android/BUILD.gn line21.
Threat posed to OSX.
Threat posed to iOS.
Threat posed to at least one of the defined platforms.
Threat posed to all defined platforms.
Threat posed to Chrome.
The uncompressed threat entries in hash format of a particular prefix length. Hashes can be anywhere from 4 to 32 bytes in size. A large majority are 4 bytes, but some hashes are lengthened if they collide with the hash of a popular URL. Used for sending ThreatEntrySet to clients that do not support compression, or when sending non-4-byte hashes to clients that do support compression.
Used in:
The number of bytes for each prefix encoded below. This field can be anywhere from 4 (shortest prefix) to 32 (full SHA256 hash).
The hashes, all concatenated into one long string. Each hash has a prefix size of |prefix_size| above. Hashes are sorted in lexicographic order.
A set of raw indicies to remove from a local list.
Used in:
The indicies to remove from a lexicographically-sorted local list.
The Rice-Golomb encoded data. Used for sending compressed 4-byte hashes or compressed removal indices.
Used in:
The offset of the first entry in the encoded data, or, if only a single integer was encoded, that single integer's value.
The Golomb-Rice parameter which is a number between 2 and 28. This field is missing (that is, zero) if num_entries is zero.
The number of entries that are delta encoded in the encoded data. If only a single integer was encoded, this will be zero and the single value will be stored in first_value.
The encoded deltas that are encoded using the Golomb-Rice coder.
An individual threat; for example, a malicious URL or its hash representation. Only one of these fields should be set.
Used in:
, ,A variable-length SHA256 hash with size between 4 and 32 bytes inclusive.
A URL.
The metadata associated with a specific threat entry. The client is expected to know the metadata key/value pairs associated with each threat type.
Used in:
The metadata entries.
A single metadata entry.
Used in:
The metadata entry key.
The metadata entry value.
A set of threats that should be added or removed from a client's local database.
Used in:
The compression type for the entries in this set.
The raw SHA256-formatted entries.
The raw removal indices for a local list.
The encoded 4-byte prefixes of SHA256-formatted entries, using a Golomb-Rice encoding.
The encoded local, lexicographically-sorted list indices, using a Golomb-Rice encoding. Used for sending compressed removal indicies.
Types of entries that pose threats. Threat lists are collections of entries of a single type.
Used in:
, , , ,Unspecified.
A host-suffix/path-prefix URL expression; for example, "foo.bar.com/baz/".
An executable program.
An IP range.
Chrome extension.
Filename.
CERT.
A hit comprised of multiple resources; one is the threat list entry that was encountered by the client, while others give context as to how the client arrived at the unsafe entry.
The threat type reported.
The platform type reported.
The threat entry responsible for the hit. Full hash should be reported for hash-based hits.
The resources related to the threat hit.
A single resource related to a threat hit.
Used in:
The URL of the resource.
The type of source reported.
The remote IP of the resource in ASCII format. Either IPv4 or IPv6.
Referrer of the resource. Only set if the referrer is available.
Types of resources reported by the client as part of a single hit.
Used in:
Unknown.
The URL that matched the threat list (for which GetFullHash returned a valid hash).
The final top-level URL of the tab that the client was browsing when the match occurred.
A redirect URL that was fetched before hitting the final TAB_URL.
Used in:
,The threat types to be checked.
The platform types to be checked.
The entry types to be checked.
The threat entries to be checked.
Describes an individual threat list. A list is defined by three parameters: the type of threat posed, the type of platform targeted by the threat, and the type of entries in the list.
Used in:
The threat type posed by the list's entries.
The platform type targeted by the list's entries.
The entry types contained in the list.
A match when checking a threat entry in the Safe Browsing threat lists.
Used in:
,The threat type matching this threat.
The platform type matching this threat.
The threat entry type matching this threat.
The threat matching this threat.
Optional metadata associated with this threat.
The cache lifetime for the returned match. Clients must not cache this response for more than this duration to avoid false positives.
Types of threats.
Used in:
, , , , ,Unknown.
Malware threat type.
Social engineering threat type.
Unwanted software threat type.
Potentially harmful application threat type.
Social engineering threat type for internal use.
API abuse threat type.
Malicious binary threat type.
Client side detection whitelist threat type.
Client side download detection whitelist threat type.
Client incident threat type.
Patterns to be used for activating the subresource filter. Interstitial will not be shown for patterns from this list.