Get desktop application:
View/edit binary Protocol Buffers messages
Cloud Web Security Scanner Service identifies security vulnerabilities in web applications hosted on Google Cloud Platform. It crawls your application, and attempts to exercise as many user inputs and event handlers as possible.
Creates a new ScanConfig.
Request for the `CreateScanConfig` method.
Required. The parent resource name where the scan is created, which should be a project resource name in the format 'projects/{projectId}'.
Required. The ScanConfig to be created.
Deletes an existing ScanConfig and its child resources.
Request for the `DeleteScanConfig` method.
Required. The resource name of the ScanConfig to be deleted. The name follows the format of 'projects/{projectId}/scanConfigs/{scanConfigId}'.
Gets a ScanConfig.
Request for the `GetScanConfig` method.
Required. The resource name of the ScanConfig to be returned. The name follows the format of 'projects/{projectId}/scanConfigs/{scanConfigId}'.
Lists ScanConfigs under a given project.
Request for the `ListScanConfigs` method.
Required. The parent resource name, which should be a project resource name in the format 'projects/{projectId}'.
A token identifying a page of results to be returned. This should be a `next_page_token` value returned from a previous List request. If unspecified, the first page of results is returned.
The maximum number of ScanConfigs to return, can be limited by server. If not specified or not positive, the implementation will select a reasonable value.
Response for the `ListScanConfigs` method.
The list of ScanConfigs returned.
Token to retrieve the next page of results, or empty if there are no more results in the list.
Updates a ScanConfig. This method support partial update of a ScanConfig.
Request for the `UpdateScanConfigRequest` method.
Required. The ScanConfig to be updated. The name field must be set to identify the resource to be updated. The values of fields not covered by the mask will be ignored.
Required. The update mask applies to the resource. For the `FieldMask` definition, see https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#fieldmask
Start a ScanRun according to the given ScanConfig.
Request for the `StartScanRun` method.
Required. The resource name of the ScanConfig to be used. The name follows the format of 'projects/{projectId}/scanConfigs/{scanConfigId}'.
Gets a ScanRun.
Request for the `GetScanRun` method.
Required. The resource name of the ScanRun to be returned. The name follows the format of 'projects/{projectId}/scanConfigs/{scanConfigId}/scanRuns/{scanRunId}'.
Lists ScanRuns under a given ScanConfig, in descending order of ScanRun stop time.
Request for the `ListScanRuns` method.
Required. The parent resource name, which should be a scan resource name in the format 'projects/{projectId}/scanConfigs/{scanConfigId}'.
A token identifying a page of results to be returned. This should be a `next_page_token` value returned from a previous List request. If unspecified, the first page of results is returned.
The maximum number of ScanRuns to return, can be limited by server. If not specified or not positive, the implementation will select a reasonable value.
Response for the `ListScanRuns` method.
The list of ScanRuns returned.
Token to retrieve the next page of results, or empty if there are no more results in the list.
Stops a ScanRun. The stopped ScanRun is returned.
Request for the `StopScanRun` method.
Required. The resource name of the ScanRun to be stopped. The name follows the format of 'projects/{projectId}/scanConfigs/{scanConfigId}/scanRuns/{scanRunId}'.
List CrawledUrls under a given ScanRun.
Request for the `ListCrawledUrls` method.
Required. The parent resource name, which should be a scan run resource name in the format 'projects/{projectId}/scanConfigs/{scanConfigId}/scanRuns/{scanRunId}'.
A token identifying a page of results to be returned. This should be a `next_page_token` value returned from a previous List request. If unspecified, the first page of results is returned.
The maximum number of CrawledUrls to return, can be limited by server. If not specified or not positive, the implementation will select a reasonable value.
Response for the `ListCrawledUrls` method.
The list of CrawledUrls returned.
Token to retrieve the next page of results, or empty if there are no more results in the list.
Gets a Finding.
Request for the `GetFinding` method.
Required. The resource name of the Finding to be returned. The name follows the format of 'projects/{projectId}/scanConfigs/{scanConfigId}/scanRuns/{scanRunId}/findings/{findingId}'.
List Findings under a given ScanRun.
Request for the `ListFindings` method.
Required. The parent resource name, which should be a scan run resource name in the format 'projects/{projectId}/scanConfigs/{scanConfigId}/scanRuns/{scanRunId}'.
Required. The filter expression. The expression must be in the format: <field> <operator> <value>. Supported field: 'finding_type'. Supported operator: '='.
A token identifying a page of results to be returned. This should be a `next_page_token` value returned from a previous List request. If unspecified, the first page of results is returned.
The maximum number of Findings to return, can be limited by server. If not specified or not positive, the implementation will select a reasonable value.
Response for the `ListFindings` method.
The list of Findings returned.
Token to retrieve the next page of results, or empty if there are no more results in the list.
List all FindingTypeStats under a given ScanRun.
Request for the `ListFindingTypeStats` method.
Required. The parent resource name, which should be a scan run resource name in the format 'projects/{projectId}/scanConfigs/{scanConfigId}/scanRuns/{scanRunId}'.
Response for the `ListFindingTypeStats` method.
The list of FindingTypeStats returned.
A CrawledUrl resource represents a URL that was crawled during a ScanRun. Web Security Scanner Service crawls the web applications, following all links within the scope of sites, to find the URLs to test against.
Used in:
Output only. The http method of the request that was used to visit the URL, in uppercase.
Output only. The URL that was crawled.
Output only. The body of the request that was used to visit the URL.
A Finding resource represents a vulnerability instance identified during a ScanRun.
Used as response type in: WebSecurityScanner.GetFinding
Used as field type in:
The resource name of the Finding. The name follows the format of 'projects/{projectId}/scanConfigs/{scanConfigId}/scanruns/{scanRunId}/findings/{findingId}'. The finding IDs are generated by the system.
The type of the Finding.
The http method of the request that triggered the vulnerability, in uppercase.
The URL produced by the server-side fuzzer and used in the request that triggered the vulnerability.
The body of the request that triggered the vulnerability.
The description of the vulnerability.
The URL containing human-readable payload that user can leverage to reproduce the vulnerability.
If the vulnerability was originated from nested IFrame, the immediate parent IFrame is reported.
The URL where the browser lands when the vulnerability is detected.
The tracking ID uniquely identifies a vulnerability instance across multiple ScanRuns.
An addon containing information about outdated libraries.
An addon containing detailed information regarding any resource causing the vulnerability such as JavaScript sources, image, audio files, etc.
An addon containing information about vulnerable or missing HTTP headers.
An addon containing information about request parameters which were found to be vulnerable.
An addon containing information reported for an XSS, if any.
Types of Findings.
Used in:
,The invalid finding type.
A page that was served over HTTPS also resources over HTTP. A man-in-the-middle attacker could tamper with the HTTP resource and gain full access to the website that loads the resource or to monitor the actions taken by the user.
The version of an included library is known to contain a security issue. The scanner checks the version of library in use against a known list of vulnerable libraries. False positives are possible if the version detection fails or if the library has been manually patched.
This type of vulnerability occurs when the value of a request parameter is reflected at the beginning of the response, for example, in requests using JSONP. Under certain circumstances, an attacker may be able to supply an alphanumeric-only Flash file in the vulnerable parameter causing the browser to execute the Flash file as if it originated on the vulnerable server.
A cross-site scripting (XSS) bug is found via JavaScript callback. For detailed explanations on XSS, see https://www.google.com/about/appsecurity/learning/xss/.
A potential cross-site scripting (XSS) bug due to JavaScript breakage. In some circumstances, the application under test might modify the test string before it is parsed by the browser. When the browser attempts to runs this modified test string, it will likely break and throw a JavaScript execution error, thus an injection issue is occurring. However, it may not be exploitable. Manual verification is needed to see if the test string modifications can be evaded and confirm that the issue is in fact an XSS vulnerability. For detailed explanations on XSS, see https://www.google.com/about/appsecurity/learning/xss/.
An application appears to be transmitting a password field in clear text. An attacker can eavesdrop network traffic and sniff the password field.
An application returns sensitive content with an invalid content type, or without an 'X-Content-Type-Options: nosniff' header.
A cross-site scripting (XSS) vulnerability in AngularJS module that occurs when a user-provided string is interpolated by Angular.
A malformed or invalid valued header.
Misspelled security header name.
Mismatching values in a duplicate security header.
A FindingTypeStats resource represents stats regarding a specific FindingType of Findings under a given ScanRun.
Used in:
The finding type associated with the stats.
The count of findings belonging to this finding type.
Information reported for an outdated library.
Used in:
The name of the outdated library.
The version number.
URLs to learn more information about the vulnerabilities in the library.
A ScanConfig resource contains the configurations to launch a scan. next id: 12
Used as response type in: WebSecurityScanner.CreateScanConfig, WebSecurityScanner.GetScanConfig, WebSecurityScanner.UpdateScanConfig
Used as field type in:
, ,The resource name of the ScanConfig. The name follows the format of 'projects/{projectId}/scanConfigs/{scanConfigId}'. The ScanConfig IDs are generated by the system.
Required. The user provided display name of the ScanConfig.
The maximum QPS during scanning. A valid value ranges from 5 to 20 inclusively. If the field is unspecified or its value is set 0, server will default to 15. Other values outside of [5, 20] range will be rejected with INVALID_ARGUMENT error.
Required. The starting URLs from which the scanner finds site pages.
The authentication configuration. If specified, service will use the authentication configuration during scanning.
The user agent used during scanning.
The blacklist URL patterns as described in https://cloud.google.com/security-scanner/docs/excluded-urls
The schedule of the ScanConfig.
Set of Cloud Platforms targeted by the scan. If empty, APP_ENGINE will be used as a default.
Latest ScanRun if available.
Scan authentication configuration.
Used in:
Required. Authentication configuration
Authentication using a Google account.
Authentication using a custom account.
Describes authentication configuration that uses a custom account.
Used in:
Required. The user name of the custom account.
Required. Input only. The password of the custom account. The credential is stored encrypted and not returned in any response nor included in audit logs.
Required. The login form URL of the website.
Describes authentication configuration that uses a Google account.
Used in:
Required. The user name of the Google account.
Required. Input only. The password of the Google account. The credential is stored encrypted and not returned in any response nor included in audit logs.
Scan schedule configuration.
Used in:
A timestamp indicates when the next run will be scheduled. The value is refreshed by the server after each run. If unspecified, it will default to current server time, which means the scan will be scheduled to start immediately.
Required. The duration of time between executions in days.
Cloud platforms supported by Cloud Web Security Scanner.
Used in:
The target platform is unknown. Requests with this enum value will be rejected with INVALID_ARGUMENT error.
Google App Engine service.
Google Compute Engine service.
Type of user agents used for scanning.
Used in:
The user agent is unknown. Service will default to CHROME_LINUX.
Chrome on Linux. This is the service default if unspecified.
Chrome on Android.
Safari on IPhone.
A ScanRun is a output-only resource representing an actual run of the scan.
Used as response type in: WebSecurityScanner.GetScanRun, WebSecurityScanner.StartScanRun, WebSecurityScanner.StopScanRun
Used as field type in:
,The resource name of the ScanRun. The name follows the format of 'projects/{projectId}/scanConfigs/{scanConfigId}/scanRuns/{scanRunId}'. The ScanRun IDs are generated by the system.
The execution state of the ScanRun.
The result state of the ScanRun. This field is only available after the execution state reaches "FINISHED".
The time at which the ScanRun started.
The time at which the ScanRun reached termination state - that the ScanRun is either finished or stopped by user.
The number of URLs crawled during this ScanRun. If the scan is in progress, the value represents the number of URLs crawled up to now.
The number of URLs tested during this ScanRun. If the scan is in progress, the value represents the number of URLs tested up to now. The number of URLs tested is usually larger than the number URLS crawled because typically a crawled URL is tested with multiple test payloads.
Whether the scan run has found any vulnerabilities.
The percentage of total completion ranging from 0 to 100. If the scan is in queue, the value is 0. If the scan is running, the value ranges from 0 to 100. If the scan is finished, the value is 100.
Types of ScanRun execution state.
Used in:
Represents an invalid state caused by internal server error. This value should never be returned.
The scan is waiting in the queue.
The scan is in progress.
The scan is either finished or stopped by user.
Types of ScanRun result state.
Used in:
Default value. This value is returned when the ScanRun is not yet finished.
The scan finished without errors.
The scan finished with errors.
The scan was terminated by user.
Information regarding any resource causing the vulnerability such as JavaScript sources, image, audio files, etc.
Used in:
The MIME type of this resource.
URL of this violating resource.
Information about vulnerable or missing HTTP Headers.
Used in:
List of vulnerable headers.
List of missing headers.
Describes a HTTP Header.
Used in:
Header name.
Header value.
Information about vulnerable request parameters.
Used in:
The vulnerable parameter names.
Information reported for an XSS.
Used in:
Stack traces leading to the point where the XSS occurred.
An error message generated by a javascript breakage.