@maxim_mazurok/gapi.client.ondemandscanning-v1 0.0.20250716 → 0.1.20250815
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/index.d.ts +19 -1
- package/package.json +1 -1
- package/readme.md +2 -0
package/index.d.ts
CHANGED
|
@@ -9,7 +9,7 @@
|
|
|
9
9
|
// This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
|
|
10
10
|
// In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
|
|
11
11
|
// Generated from: https://ondemandscanning.googleapis.com/$discovery/rest?version=v1
|
|
12
|
-
// Revision:
|
|
12
|
+
// Revision: 20250815
|
|
13
13
|
|
|
14
14
|
/// <reference types="gapi.client" />
|
|
15
15
|
|
|
@@ -155,6 +155,10 @@ declare namespace gapi.client {
|
|
|
155
155
|
/** The localized name of the category. */
|
|
156
156
|
name?: string;
|
|
157
157
|
}
|
|
158
|
+
interface CISAKnownExploitedVulnerabilities {
|
|
159
|
+
/** Whether the vulnerability is known to have been leveraged as part of a ransomware campaign. */
|
|
160
|
+
knownRansomwareCampaignUse?: string;
|
|
161
|
+
}
|
|
158
162
|
interface CloudRepoSourceContext {
|
|
159
163
|
/** An alias, which may be a branch or tag. */
|
|
160
164
|
aliasContext?: AliasContext;
|
|
@@ -267,6 +271,12 @@ declare namespace gapi.client {
|
|
|
267
271
|
keyid?: string;
|
|
268
272
|
sig?: string;
|
|
269
273
|
}
|
|
274
|
+
interface ExploitPredictionScoringSystem {
|
|
275
|
+
/** The percentile of the current score, the proportion of all scored vulnerabilities with the same or a lower EPSS score */
|
|
276
|
+
percentile?: number;
|
|
277
|
+
/** The EPSS score representing the probability [0-1] of exploitation in the wild in the next 30 days */
|
|
278
|
+
score?: number;
|
|
279
|
+
}
|
|
270
280
|
interface File {
|
|
271
281
|
digest?: {[P in string]: string};
|
|
272
282
|
name?: string;
|
|
@@ -681,6 +691,12 @@ declare namespace gapi.client {
|
|
|
681
691
|
name?: string;
|
|
682
692
|
uri?: string;
|
|
683
693
|
}
|
|
694
|
+
interface Risk {
|
|
695
|
+
/** CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. */
|
|
696
|
+
cisaKev?: CISAKnownExploitedVulnerabilities;
|
|
697
|
+
/** The Exploit Prediction Scoring System (EPSS) estimates the likelihood (probability) that a software vulnerability will be exploited in the wild. */
|
|
698
|
+
epss?: ExploitPredictionScoringSystem;
|
|
699
|
+
}
|
|
684
700
|
interface RunDetails {
|
|
685
701
|
builder?: ProvenanceBuilder;
|
|
686
702
|
byproducts?: ResourceDescriptor[];
|
|
@@ -908,6 +924,8 @@ declare namespace gapi.client {
|
|
|
908
924
|
packageIssue?: PackageIssue[];
|
|
909
925
|
/** Output only. URLs related to this vulnerability. */
|
|
910
926
|
relatedUrls?: RelatedUrl[];
|
|
927
|
+
/** Risk information about the vulnerability, such as CISA, EPSS, etc. */
|
|
928
|
+
risk?: Risk;
|
|
911
929
|
/** Output only. The note provider assigned severity of this vulnerability. */
|
|
912
930
|
severity?: string;
|
|
913
931
|
/** Output only. A one sentence description of this vulnerability. */
|
package/package.json
CHANGED
package/readme.md
CHANGED
|
@@ -71,3 +71,5 @@ After that you can use On-Demand Scanning API resources: <!-- TODO: make this wo
|
|
|
71
71
|
```typescript
|
|
72
72
|
|
|
73
73
|
```
|
|
74
|
+
|
|
75
|
+
For provenance information see [Provenance section on NPM](https://www.npmjs.com/package/@maxim_mazurok/gapi.client.ondemandscanning-v1#Provenance:~:text=none-,Provenance,-Built%20and%20signed)
|