Get desktop application:
View/edit binary Protocol Buffers messages
The additional data found in APK packages.
Used in:
Used in:
A unique ID for the finding.
Remediation instructions, e.g. "update to latest version".
Used in:
A unique identifier per advisory.
Used in:
e.g. "CVE".
e.g. "CVE-2023-1234".
The additional data for packages extracted from CDX files.
Used in:
The additional data found in COS packages.
Used in:
Used in:
The additional data found in Chrome extensions.
Used in:
Used in:
Used in:
The additional data found in .NET deps json packages.
Used in:
The additional data found in DPKG packages. Next ID: 11
Used in:
The additional data found in Docker container.
Used in:
Used in:
A security finding found by a detector. It could describe things like a CVE or a CIS non-compliance.
Used in:
,Info specific to the finding. Should always be the same for the same type of finding.
Instance-specific info such as location of the vulnerable files.
Additional free-text info.
The name of the Detectors that found this finding. Set by the core library.
The additional data found in Flatpak packages.
Used in:
The additional data found in Homebrew packages.
Used in:
(message has no fields)
The artifacts (e.g. software inventory, security findings) that a scan found.
Used in:
The additional data found in Java JAR packages.
Used in:
The additional data found in Java lockfiles.
Used in:
The additional data found in npm packages.
Used in:
The additional data found in MODULE packages.
Used in:
Details about the layer a package was found in.
Used in:
The index of the layer in the container image.
The diff ID (typically a sha256 hash) of the layer in the container image.
The layer chain ID (sha256 hash) of the layer in the container image. https://github.com/opencontainers/image-spec/blob/main/config.md#layer-chainid
The layer build command that was used to build the layer. This may not be found in all layers depending on how the container image is built.
Denotes whether the layer is in the base image.
The additional data found in Mac Applications.
Used in:
The additional data found in Nix packages.
Used in:
The additional data for packages extracted by an OSV extractor wrapper.
Used in:
The additional data found in PACMAN packages.
Used in:
A software package or library found by an extractor. PURL or CPE needs to be set, maybe both.
Used in:
, ,Human-readable name of the software, to be used for things like logging. For vuln matching, use the name from metadata.
Version of the package.
Source code level package identifiers.
Package URL of the software.
Ecosystem - For software packages this corresponds to an OSV ecosystem value, e.g. PyPI.
Paths or source of files related to the package.
The name of the Extractor that found this software. Set by the core library.
The additional data found in the package.
Details about the layer a package was found in. This should be set only for container image scanning.
Used in:
Used in:
The additional data found in portage packages.
Used in:
Package URL, see https://github.com/package-url/purl-spec
Used in:
, ,String representation.
Package type, e.g. "maven, npm, pypi".
Package name.
Package version.
Name prefix such as a Maven groupid, or Docker image owner.
Extra qualifying data for a package such as an OS, architecture, etc.
Extra subpath within a package, relative to the package root.
The additional data found in python packages.
Used in:
Used in:
Used in:
Used in:
The additional data found in RPM packages.
Used in:
The additional data found in SNAP packages.
Used in:
The additional data for packages extracted from SPDX files.
Used in:
The results of a scan incl. scan status and artifacts found.
Status of the overall scan.
Status and versions of the plugins that ran.
TODO(b/400910349): Remove once integrators stop using these fields.
Used in:
,Used in:
Used in:
Required severity enum. Can be used for e.g. prioritizing filed bugs.
Optional CVSS scores, only set for vulns with CVEs.
Used in:
Additional identifiers for source code software packages (e.g. NPM).
Used in:
Used in:
The software affected by the finding.
Location of vulnerable files not related to the package, e.g. config files with misconfigurations.
The additional data found in VSCode extensions.
Used in:
The additional data found in Vmlinuz packages.
Used in:
Used in: