@maxim_mazurok/gapi.client.ondemandscanning-v1beta1 0.0.20250716 → 0.0.20250815
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/index.d.ts +19 -1
- package/package.json +1 -1
package/index.d.ts
CHANGED
|
@@ -9,7 +9,7 @@
|
|
|
9
9
|
// This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
|
|
10
10
|
// In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
|
|
11
11
|
// Generated from: https://ondemandscanning.googleapis.com/$discovery/rest?version=v1beta1
|
|
12
|
-
// Revision:
|
|
12
|
+
// Revision: 20250815
|
|
13
13
|
|
|
14
14
|
/// <reference types="gapi.client" />
|
|
15
15
|
|
|
@@ -153,6 +153,10 @@ declare namespace gapi.client {
|
|
|
153
153
|
/** The localized name of the category. */
|
|
154
154
|
name?: string;
|
|
155
155
|
}
|
|
156
|
+
interface CISAKnownExploitedVulnerabilities {
|
|
157
|
+
/** Whether the vulnerability is known to have been leveraged as part of a ransomware campaign. */
|
|
158
|
+
knownRansomwareCampaignUse?: string;
|
|
159
|
+
}
|
|
156
160
|
interface CloudRepoSourceContext {
|
|
157
161
|
/** An alias, which may be a branch or tag. */
|
|
158
162
|
aliasContext?: AliasContext;
|
|
@@ -265,6 +269,12 @@ declare namespace gapi.client {
|
|
|
265
269
|
keyid?: string;
|
|
266
270
|
sig?: string;
|
|
267
271
|
}
|
|
272
|
+
interface ExploitPredictionScoringSystem {
|
|
273
|
+
/** The percentile of the current score, the proportion of all scored vulnerabilities with the same or a lower EPSS score */
|
|
274
|
+
percentile?: number;
|
|
275
|
+
/** The EPSS score representing the probability [0-1] of exploitation in the wild in the next 30 days */
|
|
276
|
+
score?: number;
|
|
277
|
+
}
|
|
268
278
|
interface File {
|
|
269
279
|
digest?: {[P in string]: string};
|
|
270
280
|
name?: string;
|
|
@@ -679,6 +689,12 @@ declare namespace gapi.client {
|
|
|
679
689
|
name?: string;
|
|
680
690
|
uri?: string;
|
|
681
691
|
}
|
|
692
|
+
interface Risk {
|
|
693
|
+
/** CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. */
|
|
694
|
+
cisaKev?: CISAKnownExploitedVulnerabilities;
|
|
695
|
+
/** The Exploit Prediction Scoring System (EPSS) estimates the likelihood (probability) that a software vulnerability will be exploited in the wild. */
|
|
696
|
+
epss?: ExploitPredictionScoringSystem;
|
|
697
|
+
}
|
|
682
698
|
interface RunDetails {
|
|
683
699
|
builder?: ProvenanceBuilder;
|
|
684
700
|
byproducts?: ResourceDescriptor[];
|
|
@@ -906,6 +922,8 @@ declare namespace gapi.client {
|
|
|
906
922
|
packageIssue?: PackageIssue[];
|
|
907
923
|
/** Output only. URLs related to this vulnerability. */
|
|
908
924
|
relatedUrls?: RelatedUrl[];
|
|
925
|
+
/** Risk information about the vulnerability, such as CISA, EPSS, etc. */
|
|
926
|
+
risk?: Risk;
|
|
909
927
|
/** Output only. The note provider assigned severity of this vulnerability. */
|
|
910
928
|
severity?: string;
|
|
911
929
|
/** Output only. A one sentence description of this vulnerability. */
|