@maxim_mazurok/gapi.client.securitycenter-v1beta2 0.0.20250228 → 0.0.20250308
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/index.d.ts +25 -1
- package/package.json +1 -1
package/index.d.ts
CHANGED
|
@@ -9,7 +9,7 @@
|
|
|
9
9
|
// This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
|
|
10
10
|
// In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
|
|
11
11
|
// Generated from: https://securitycenter.googleapis.com/$discovery/rest?version=v1beta2
|
|
12
|
-
// Revision:
|
|
12
|
+
// Revision: 20250308
|
|
13
13
|
|
|
14
14
|
/// <reference types="gapi.client" />
|
|
15
15
|
|
|
@@ -348,6 +348,12 @@ declare namespace gapi.client {
|
|
|
348
348
|
/** This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component. */
|
|
349
349
|
userInteraction?: string;
|
|
350
350
|
}
|
|
351
|
+
interface Cwe {
|
|
352
|
+
/** The CWE identifier, e.g. CWE-94 */
|
|
353
|
+
id?: string;
|
|
354
|
+
/** Any reference to the details on the CWE, for example, https://cwe.mitre.org/data/definitions/94.html */
|
|
355
|
+
references?: Reference[];
|
|
356
|
+
}
|
|
351
357
|
interface DataAccessEvent {
|
|
352
358
|
/** Unique identifier for data access event. */
|
|
353
359
|
eventId?: string;
|
|
@@ -1222,6 +1228,12 @@ declare namespace gapi.client {
|
|
|
1222
1228
|
/** This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component. */
|
|
1223
1229
|
userInteraction?: string;
|
|
1224
1230
|
}
|
|
1231
|
+
interface GoogleCloudSecuritycenterV2Cwe {
|
|
1232
|
+
/** The CWE identifier, e.g. CWE-94 */
|
|
1233
|
+
id?: string;
|
|
1234
|
+
/** Any reference to the details on the CWE, for example, https://cwe.mitre.org/data/definitions/94.html */
|
|
1235
|
+
references?: GoogleCloudSecuritycenterV2Reference[];
|
|
1236
|
+
}
|
|
1225
1237
|
interface GoogleCloudSecuritycenterV2DataAccessEvent {
|
|
1226
1238
|
/** Unique identifier for data access event. */
|
|
1227
1239
|
eventId?: string;
|
|
@@ -2039,10 +2051,16 @@ declare namespace gapi.client {
|
|
|
2039
2051
|
interface GoogleCloudSecuritycenterV2Vulnerability {
|
|
2040
2052
|
/** CVE stands for Common Vulnerabilities and Exposures (https://cve.mitre.org/about/) */
|
|
2041
2053
|
cve?: GoogleCloudSecuritycenterV2Cve;
|
|
2054
|
+
/** Represents one or more Common Weakness Enumeration (CWE) information on this vulnerability. */
|
|
2055
|
+
cwes?: GoogleCloudSecuritycenterV2Cwe[];
|
|
2042
2056
|
/** The fixed package is relevant to the finding. */
|
|
2043
2057
|
fixedPackage?: GoogleCloudSecuritycenterV2Package;
|
|
2044
2058
|
/** The offending package is relevant to the finding. */
|
|
2045
2059
|
offendingPackage?: GoogleCloudSecuritycenterV2Package;
|
|
2060
|
+
/** Provider provided risk_score based on multiple factors. The higher the risk score, the more risky the vulnerability is. */
|
|
2061
|
+
providerRiskScore?: string;
|
|
2062
|
+
/** Represents whether the vulnerability is reachable (detected via static analysis) */
|
|
2063
|
+
reachable?: boolean;
|
|
2046
2064
|
/** The security bulletin is relevant to this finding. */
|
|
2047
2065
|
securityBulletin?: GoogleCloudSecuritycenterV2SecurityBulletin;
|
|
2048
2066
|
}
|
|
@@ -2456,10 +2474,16 @@ declare namespace gapi.client {
|
|
|
2456
2474
|
interface Vulnerability {
|
|
2457
2475
|
/** CVE stands for Common Vulnerabilities and Exposures (https://cve.mitre.org/about/) */
|
|
2458
2476
|
cve?: Cve;
|
|
2477
|
+
/** Represents one or more Common Weakness Enumeration (CWE) information on this vulnerability. */
|
|
2478
|
+
cwes?: Cwe[];
|
|
2459
2479
|
/** The fixed package is relevant to the finding. */
|
|
2460
2480
|
fixedPackage?: Package;
|
|
2461
2481
|
/** The offending package is relevant to the finding. */
|
|
2462
2482
|
offendingPackage?: Package;
|
|
2483
|
+
/** Provider provided risk_score based on multiple factors. The higher the risk score, the more risky the vulnerability is. */
|
|
2484
|
+
providerRiskScore?: string;
|
|
2485
|
+
/** Represents whether the vulnerability is reachable (detected via static analysis) */
|
|
2486
|
+
reachable?: boolean;
|
|
2463
2487
|
/** The security bulletin is relevant to this finding. */
|
|
2464
2488
|
securityBulletin?: SecurityBulletin;
|
|
2465
2489
|
}
|