tccli 3.0.1215.1__py2.py3-none-any.whl → 3.0.1217.1__py2.py3-none-any.whl
Sign up to get free protection for your applications and to get access to all the features.
- tccli/__init__.py +1 -1
- tccli/argparser.py +1 -1
- tccli/command.py +2 -2
- tccli/configure.py +46 -1
- tccli/credentials.py +25 -0
- tccli/main.py +6 -2
- tccli/plugins/sso/__init__.py +61 -0
- tccli/plugins/sso/configs.py +4 -0
- tccli/plugins/sso/configure.py +45 -0
- tccli/plugins/sso/login.py +144 -0
- tccli/plugins/sso/logout.py +21 -0
- tccli/plugins/sso/terminal.py +161 -0
- tccli/plugins/sso/texts.py +40 -0
- tccli/services/__init__.py +6 -3
- tccli/services/acp/v20220105/api.json +7 -7
- tccli/services/acp/v20220105/examples.json +2 -2
- tccli/services/aiart/v20221229/api.json +29 -29
- tccli/services/aiart/v20221229/examples.json +8 -8
- tccli/services/apigateway/v20180808/api.json +18 -17
- tccli/services/apigateway/v20180808/examples.json +12 -12
- tccli/services/apm/v20210622/api.json +118 -4
- tccli/services/asr/v20190614/api.json +21 -20
- tccli/services/asr/v20190614/examples.json +13 -13
- tccli/services/autoscaling/v20180419/api.json +371 -309
- tccli/services/autoscaling/v20180419/examples.json +17 -17
- tccli/services/batch/v20170312/api.json +7 -7
- tccli/services/bda/v20200324/api.json +39 -31
- tccli/services/bda/v20200324/examples.json +9 -9
- tccli/services/bh/__init__.py +4 -0
- tccli/services/bh/bh_client.py +3428 -0
- tccli/services/bh/v20230418/api.json +8180 -0
- tccli/services/bh/v20230418/examples.json +519 -0
- tccli/services/bi/v20220105/api.json +80 -4
- tccli/services/bi/v20220105/examples.json +1 -1
- tccli/services/billing/billing_client.py +53 -0
- tccli/services/billing/v20180709/api.json +330 -24
- tccli/services/billing/v20180709/examples.json +8 -0
- tccli/services/bsca/v20210811/api.json +223 -18
- tccli/services/bsca/v20210811/examples.json +4 -4
- tccli/services/btoe/v20210514/api.json +4 -4
- tccli/services/btoe/v20210514/examples.json +2 -2
- tccli/services/ca/v20230228/api.json +60 -0
- tccli/services/cam/v20190116/api.json +11 -11
- tccli/services/cat/v20180409/api.json +9 -0
- tccli/services/cbs/v20170312/api.json +200 -188
- tccli/services/cbs/v20170312/examples.json +4 -4
- tccli/services/ccc/ccc_client.py +53 -0
- tccli/services/ccc/v20200210/api.json +541 -325
- tccli/services/ccc/v20200210/examples.json +26 -18
- tccli/services/cdb/cdb_client.py +13 -13
- tccli/services/cdb/v20170320/api.json +308 -274
- tccli/services/cdb/v20170320/examples.json +38 -38
- tccli/services/cdc/v20201214/api.json +283 -270
- tccli/services/cdc/v20201214/examples.json +26 -26
- tccli/services/cdn/v20180606/api.json +5 -3
- tccli/services/cds/v20180420/api.json +82 -76
- tccli/services/cds/v20180420/examples.json +1 -1
- tccli/services/cdwch/v20200915/api.json +1 -1
- tccli/services/cdwdoris/v20211228/api.json +54 -4
- tccli/services/cdz/v20221123/api.json +41 -5
- tccli/services/cfg/v20210820/api.json +31 -0
- tccli/services/cfs/v20190719/api.json +89 -1
- tccli/services/cfs/v20190719/examples.json +1 -1
- tccli/services/cfw/cfw_client.py +0 -53
- tccli/services/cfw/v20190904/api.json +1895 -2011
- tccli/services/cfw/v20190904/examples.json +175 -171
- tccli/services/ciam/v20220331/api.json +316 -315
- tccli/services/ciam/v20220331/examples.json +49 -49
- tccli/services/ckafka/v20190819/api.json +104 -75
- tccli/services/clb/v20180317/api.json +48 -26
- tccli/services/clb/v20180317/examples.json +1 -1
- tccli/services/cloudapp/v20220530/api.json +5 -1
- tccli/services/cloudaudit/cloudaudit_client.py +30 -30
- tccli/services/cloudaudit/v20190319/api.json +254 -211
- tccli/services/cloudaudit/v20190319/examples.json +19 -19
- tccli/services/cloudstudio/v20230508/api.json +38 -37
- tccli/services/cloudstudio/v20230508/examples.json +4 -4
- tccli/services/cls/cls_client.py +216 -4
- tccli/services/cls/v20201016/api.json +935 -147
- tccli/services/cls/v20201016/examples.json +43 -5
- tccli/services/csip/v20221121/api.json +2566 -2386
- tccli/services/csip/v20221121/examples.json +108 -108
- tccli/services/cvm/v20170312/api.json +191 -112
- tccli/services/cvm/v20170312/examples.json +2 -2
- tccli/services/cwp/cwp_client.py +4 -110
- tccli/services/cwp/v20180228/api.json +6498 -6252
- tccli/services/cwp/v20180228/examples.json +372 -412
- tccli/services/cynosdb/v20190107/api.json +170 -110
- tccli/services/cynosdb/v20190107/examples.json +91 -91
- tccli/services/dasb/v20191018/api.json +859 -637
- tccli/services/dasb/v20191018/examples.json +101 -101
- tccli/services/dcdb/dcdb_client.py +114 -61
- tccli/services/dcdb/v20180411/api.json +141 -7
- tccli/services/dcdb/v20180411/examples.json +32 -0
- tccli/services/dlc/v20210125/api.json +21 -11
- tccli/services/dnspod/dnspod_client.py +417 -46
- tccli/services/dnspod/v20210323/api.json +751 -30
- tccli/services/dnspod/v20210323/examples.json +62 -0
- tccli/services/domain/v20180808/api.json +3 -3
- tccli/services/domain/v20180808/examples.json +3 -3
- tccli/services/dts/v20211206/api.json +4 -4
- tccli/services/eb/v20210416/api.json +15 -15
- tccli/services/eb/v20210416/examples.json +1 -1
- tccli/services/ecm/v20190719/api.json +2 -2
- tccli/services/emr/v20190103/api.json +339 -114
- tccli/services/emr/v20190103/examples.json +64 -82
- tccli/services/es/es_client.py +249 -37
- tccli/services/es/v20180416/api.json +550 -0
- tccli/services/es/v20180416/examples.json +33 -1
- tccli/services/ess/ess_client.py +53 -0
- tccli/services/ess/v20201111/api.json +192 -38
- tccli/services/ess/v20201111/examples.json +35 -9
- tccli/services/essbasic/essbasic_client.py +106 -0
- tccli/services/essbasic/v20210526/api.json +287 -60
- tccli/services/essbasic/v20210526/examples.json +58 -18
- tccli/services/facefusion/v20181201/api.json +47 -45
- tccli/services/facefusion/v20181201/examples.json +2 -2
- tccli/services/facefusion/v20220927/api.json +54 -48
- tccli/services/facefusion/v20220927/examples.json +5 -5
- tccli/services/faceid/v20180301/api.json +497 -496
- tccli/services/faceid/v20180301/examples.json +219 -101
- tccli/services/fmu/v20191213/api.json +59 -67
- tccli/services/fmu/v20191213/examples.json +22 -22
- tccli/services/ft/v20200304/api.json +53 -57
- tccli/services/ft/v20200304/examples.json +14 -14
- tccli/services/gaap/v20180529/api.json +44 -26
- tccli/services/gaap/v20180529/examples.json +24 -30
- tccli/services/gme/v20180711/api.json +21 -11
- tccli/services/gme/v20180711/examples.json +1 -1
- tccli/services/hai/v20230812/api.json +116 -9
- tccli/services/hai/v20230812/examples.json +4 -4
- tccli/services/hunyuan/hunyuan_client.py +436 -12
- tccli/services/hunyuan/v20230901/api.json +1482 -118
- tccli/services/hunyuan/v20230901/examples.json +82 -18
- tccli/services/iai/v20180301/api.json +23 -19
- tccli/services/iai/v20180301/examples.json +2 -2
- tccli/services/iai/v20200303/api.json +530 -511
- tccli/services/iai/v20200303/examples.json +116 -86
- tccli/services/ig/__init__.py +4 -0
- tccli/services/ig/ig_client.py +195 -0
- tccli/services/ig/v20210518/api.json +83 -0
- tccli/services/ig/v20210518/examples.json +13 -0
- tccli/services/ioa/ioa_client.py +53 -0
- tccli/services/ioa/v20220601/api.json +662 -413
- tccli/services/ioa/v20220601/examples.json +24 -10
- tccli/services/iotexplorer/v20190423/api.json +73 -13
- tccli/services/iotexplorer/v20190423/examples.json +3 -3
- tccli/services/iotvideo/iotvideo_client.py +106 -0
- tccli/services/iotvideo/v20191126/api.json +256 -24
- tccli/services/iotvideo/v20191126/examples.json +19 -3
- tccli/services/iotvideo/v20201215/api.json +1 -1
- tccli/services/iotvideo/v20201215/examples.json +1 -1
- tccli/services/iotvideo/v20211125/api.json +1 -1
- tccli/services/iotvideo/v20211125/examples.json +2 -2
- tccli/services/iss/iss_client.py +69 -122
- tccli/services/iss/v20230517/api.json +10 -54
- tccli/services/iss/v20230517/examples.json +0 -14
- tccli/services/kms/v20190118/api.json +301 -268
- tccli/services/kms/v20190118/examples.json +45 -51
- tccli/services/lcic/lcic_client.py +159 -0
- tccli/services/lcic/v20220817/api.json +273 -1
- tccli/services/lcic/v20220817/examples.json +24 -0
- tccli/services/lighthouse/v20200324/api.json +56 -0
- tccli/services/live/live_client.py +159 -0
- tccli/services/live/v20180801/api.json +279 -9
- tccli/services/live/v20180801/examples.json +24 -0
- tccli/services/lke/v20231130/api.json +17 -17
- tccli/services/lke/v20231130/examples.json +19 -25
- tccli/services/mariadb/v20170312/api.json +7 -7
- tccli/services/market/v20191010/api.json +3 -3
- tccli/services/market/v20191010/examples.json +2 -2
- tccli/services/mmps/v20200710/api.json +47 -47
- tccli/services/mmps/v20200710/examples.json +3 -3
- tccli/services/mongodb/v20190725/api.json +10 -12
- tccli/services/monitor/v20180724/api.json +46 -19
- tccli/services/mps/v20190612/api.json +282 -5
- tccli/services/mps/v20190612/examples.json +25 -1
- tccli/services/mqtt/v20240516/api.json +2 -2
- tccli/services/mrs/v20200910/api.json +72 -34
- tccli/services/mrs/v20200910/examples.json +2 -2
- tccli/services/ms/v20180408/api.json +535 -506
- tccli/services/ms/v20180408/examples.json +25 -25
- tccli/services/oceanus/v20190422/api.json +130 -0
- tccli/services/ocr/ocr_client.py +232 -20
- tccli/services/ocr/v20181119/api.json +2263 -758
- tccli/services/ocr/v20181119/examples.json +200 -180
- tccli/services/omics/v20221128/api.json +614 -553
- tccli/services/omics/v20221128/examples.json +9 -9
- tccli/services/organization/organization_client.py +352 -34
- tccli/services/organization/v20210331/api.json +464 -4
- tccli/services/organization/v20210331/examples.json +49 -1
- tccli/services/partners/v20180321/api.json +244 -234
- tccli/services/partners/v20180321/examples.json +19 -19
- tccli/services/privatedns/privatedns_client.py +428 -4
- tccli/services/privatedns/v20201028/api.json +815 -11
- tccli/services/privatedns/v20201028/examples.json +64 -0
- tccli/services/pts/v20210728/api.json +18 -0
- tccli/services/pts/v20210728/examples.json +1 -1
- tccli/services/rce/rce_client.py +53 -0
- tccli/services/rce/v20201103/api.json +146 -0
- tccli/services/rce/v20201103/examples.json +8 -0
- tccli/services/redis/v20180412/api.json +42 -42
- tccli/services/redis/v20180412/examples.json +19 -19
- tccli/services/region/v20220627/api.json +1 -1
- tccli/services/rum/v20210622/api.json +9 -0
- tccli/services/scf/scf_client.py +269 -4
- tccli/services/scf/v20180416/api.json +569 -15
- tccli/services/scf/v20180416/examples.json +47 -1
- tccli/services/smop/v20201203/api.json +46 -42
- tccli/services/smop/v20201203/examples.json +2 -2
- tccli/services/soe/v20180724/api.json +10 -10
- tccli/services/sqlserver/v20180328/api.json +21 -8
- tccli/services/sqlserver/v20180328/examples.json +5 -5
- tccli/services/ssl/v20191205/api.json +98 -5
- tccli/services/ssm/v20190923/api.json +292 -231
- tccli/services/ssm/v20190923/examples.json +42 -42
- tccli/services/tat/v20201028/api.json +124 -122
- tccli/services/tat/v20201028/examples.json +24 -30
- tccli/services/tchd/v20230306/api.json +5 -5
- tccli/services/tchd/v20230306/examples.json +3 -3
- tccli/services/tcr/v20190924/api.json +1 -1
- tccli/services/tcr/v20190924/examples.json +1 -1
- tccli/services/tcss/v20201101/api.json +1984 -1437
- tccli/services/tcss/v20201101/examples.json +350 -368
- tccli/services/tdmq/v20200217/api.json +603 -464
- tccli/services/tdmq/v20200217/examples.json +105 -105
- tccli/services/tds/v20220801/api.json +4 -4
- tccli/services/tem/v20210701/api.json +429 -372
- tccli/services/tem/v20210701/examples.json +85 -85
- tccli/services/teo/teo_client.py +277 -12
- tccli/services/teo/v20220901/api.json +1029 -124
- tccli/services/teo/v20220901/examples.json +84 -8
- tccli/services/thpc/v20230321/api.json +5 -5
- tccli/services/tke/tke_client.py +270 -58
- tccli/services/tke/v20180525/api.json +79 -27
- tccli/services/tke/v20180525/examples.json +9 -1
- tccli/services/tke/v20220501/api.json +176 -0
- tccli/services/tke/v20220501/examples.json +24 -0
- tccli/services/tms/tms_client.py +4 -57
- tccli/services/tms/v20201229/api.json +0 -354
- tccli/services/tms/v20201229/examples.json +0 -8
- tccli/services/tmt/v20180321/api.json +38 -8
- tccli/services/trp/v20210515/api.json +86 -74
- tccli/services/trp/v20210515/examples.json +65 -65
- tccli/services/trro/v20220325/api.json +72 -71
- tccli/services/trro/v20220325/examples.json +8 -8
- tccli/services/trtc/trtc_client.py +8 -61
- tccli/services/trtc/v20190722/api.json +293 -52
- tccli/services/trtc/v20190722/examples.json +3 -11
- tccli/services/tse/tse_client.py +110 -4
- tccli/services/tse/v20201207/api.json +122 -7
- tccli/services/tse/v20201207/examples.json +25 -9
- tccli/services/vclm/v20240523/api.json +225 -82
- tccli/services/vclm/v20240523/examples.json +13 -19
- tccli/services/vod/v20180717/api.json +431 -4
- tccli/services/vod/v20180717/examples.json +25 -5
- tccli/services/vod/v20240718/api.json +11 -11
- tccli/services/vod/v20240718/examples.json +4 -4
- tccli/services/vod/vod_client.py +53 -0
- tccli/services/vpc/v20170312/api.json +1195 -892
- tccli/services/vpc/v20170312/examples.json +84 -68
- tccli/services/vpc/vpc_client.py +168 -62
- tccli/services/waf/v20180125/api.json +2611 -2187
- tccli/services/waf/v20180125/examples.json +224 -284
- tccli/services/waf/waf_client.py +225 -119
- tccli/services/wav/v20210129/api.json +48 -48
- tccli/services/wav/v20210129/examples.json +4 -4
- tccli/services/wedata/v20210820/api.json +1595 -25
- tccli/services/wedata/v20210820/examples.json +44 -4
- tccli/services/wedata/wedata_client.py +265 -0
- tccli/services/weilingwith/v20230427/api.json +6 -6
- tccli/services/weilingwith/v20230427/examples.json +3 -3
- tccli/sso.py +229 -0
- {tccli-3.0.1215.1.dist-info → tccli-3.0.1217.1.dist-info}/METADATA +6 -2
- {tccli-3.0.1215.1.dist-info → tccli-3.0.1217.1.dist-info}/RECORD +278 -265
- tccli/services/cr/__init__.py +0 -4
- tccli/services/cr/cr_client.py +0 -1626
- tccli/services/cr/v20180321/api.json +0 -2829
- tccli/services/cr/v20180321/examples.json +0 -235
- {tccli-3.0.1215.1.dist-info → tccli-3.0.1217.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1215.1.dist-info → tccli-3.0.1217.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1215.1.dist-info → tccli-3.0.1217.1.dist-info}/license_files/LICENSE +0 -0
@@ -4,215 +4,215 @@
|
|
4
4
|
{
|
5
5
|
"document": "新用户加入通知",
|
6
6
|
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddNewBindRoleUser\n<公共请求参数>\n\n{}",
|
7
|
-
"output": "{\n \"Response\": {\n \"Status\": 0,\n \"RequestId\": \"
|
7
|
+
"output": "{\n \"Response\": {\n \"Status\": 0,\n \"RequestId\": \"f9184c15-9721-456d-8ca0-4263967b5ead\"\n }\n}",
|
8
8
|
"title": "新用户加入通知"
|
9
9
|
}
|
10
10
|
],
|
11
11
|
"CreateDomainAndIp": [
|
12
12
|
{
|
13
13
|
"document": "",
|
14
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateDomainAndIp\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"
|
15
|
-
"output": "{\n \"Response\": {\n \"Data\": 0,\n \"RequestId\": \"
|
14
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateDomainAndIp\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-68b8087a65268000\"\n ],\n \"Content\": [\n \"127.0.0.1\"\n ],\n \"Tags\": [\n {\n \"TagKey\": \"sec\",\n \"TagValue\": \"sec\"\n }\n ]\n}",
|
15
|
+
"output": "{\n \"Response\": {\n \"Data\": 0,\n \"RequestId\": \"7cf2ba3d-87ad-4691-a374-fd92ec11d9c8\"\n }\n}",
|
16
16
|
"title": "添加资产"
|
17
17
|
}
|
18
18
|
],
|
19
19
|
"CreateRiskCenterScanTask": [
|
20
20
|
{
|
21
21
|
"document": "创建风险中心扫描任务",
|
22
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateRiskCenterScanTask\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"
|
23
|
-
"output": "{\n \"Response\": {\n \"TaskId\": \"
|
22
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateRiskCenterScanTask\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-68b8087a65268000\"\n ],\n \"TaskName\": \"scan-task\",\n \"Assets\": [\n {\n \"AssetName\": \"insname\",\n \"InstanceType\": \"CVM\",\n \"AssetType\": \"Instance\",\n \"Asset\": \"ns-mx19k34r\",\n \"Region\": \"ap-guangzhou\"\n }\n ],\n \"ScanAssetType\": 1,\n \"ScanItem\": [\n \"port\"\n ],\n \"ScanPlanType\": 2,\n \"ScanPlanContent\": \"38 53 11 */1 * * *\",\n \"SelfDefiningAssets\": [],\n \"ScanFrom\": \"csip\",\n \"TaskAdvanceCFG\": {\n \"PortRisk\": [\n {\n \"PortSets\": \"80\",\n \"CheckType\": 0,\n \"Detail\": \"port info\",\n \"Enable\": 0\n }\n ]\n },\n \"TaskMode\": 0\n}",
|
23
|
+
"output": "{\n \"Response\": {\n \"TaskId\": \"rmis-18yeflff\",\n \"RequestId\": \"7cf2ba3d-87ad-4691-a374-fd92ec11d9c8\"\n }\n}",
|
24
24
|
"title": "创建风险中心扫描任务"
|
25
25
|
}
|
26
26
|
],
|
27
27
|
"DeleteDomainAndIp": [
|
28
28
|
{
|
29
29
|
"document": "删除公网IP/域名",
|
30
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteDomainAndIp\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"
|
31
|
-
"output": "{\n \"Response\": {\n \"Data\":
|
30
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteDomainAndIp\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-68b8087a65268000\"\n ],\n \"Content\": [\n {\n \"Asset\": \"172.**.**.1\"\n }\n ],\n \"RetainPath\": 0,\n \"IgnoreAsset\": 0,\n \"Tags\": [\n {\n \"TagKey\": \"foo\",\n \"TagValue\": \"foo\"\n }\n ],\n \"Type\": \"CLB\"\n}",
|
31
|
+
"output": "{\n \"Response\": {\n \"Data\": 1,\n \"RequestId\": \"7cf2ba3d-87ad-4691-a374-fd92ec11d9c8\"\n }\n}",
|
32
32
|
"title": "删除公网IP/域名"
|
33
33
|
}
|
34
34
|
],
|
35
35
|
"DeleteRiskScanTask": [
|
36
36
|
{
|
37
37
|
"document": "删除风险中心扫描任务",
|
38
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteRiskScanTask\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem
|
39
|
-
"output": "{\n \"Response\": {\n \"RequestId\": \"
|
38
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteRiskScanTask\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-********\"\n ],\n \"TaskIdList\": [\n {\n \"TaskId\": \"rmis-****\"\n }\n ]\n}",
|
39
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"7429061e-dabd-e1ee-e135-43364c7bb15d\"\n }\n}",
|
40
40
|
"title": "删除风险中心扫描任务"
|
41
41
|
}
|
42
42
|
],
|
43
43
|
"DescribeAlertList": [
|
44
44
|
{
|
45
45
|
"document": "",
|
46
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAlertList\n<公共请求参数>\n\n{\n \"
|
47
|
-
"output": "{\n \"Response\": {\n \"AlertList\": [\n {\n \"
|
46
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAlertList\n<公共请求参数>\n\n{\n \"Filter\": {\n \"Filters\": [\n {\n \"Name\": \"Status\",\n \"Values\": [\n \"0\"\n ],\n \"OperatorType\": 7\n },\n {\n \"Name\": \"Uin\",\n \"Values\": [\n \"1123213213\"\n ],\n \"OperatorType\": 7\n }\n ],\n \"Limit\": 10,\n \"Offset\": 0,\n \"StartTime\": \"2024-10-24 00:00:00\",\n \"EndTime\": \"2024-10-30 23:59:59\"\n },\n \"MemberId\": [\n \"mem-tencent-1829\"\n ]\n}",
|
47
|
+
"output": "{\n \"Response\": {\n \"AlertList\": [\n {\n \"Action\": 1,\n \"AppID\": \"18742\",\n \"Attacker\": {\n \"Account\": \"18742\",\n \"Address\": \"中国上海\",\n \"AssetType\": 2,\n \"City\": \"上海\",\n \"ContainerID\": \"ins-dd213833\",\n \"ContainerName\": \"misakey\",\n \"Country\": \"中国\",\n \"Domain\": \"main.1872.net\",\n \"Family\": \"APT\",\n \"FileName\": \"notdad.exe\",\n \"HostIP\": \"172.16.17.32\",\n \"IP\": \"202.108.127.12\",\n \"Info\": \"mail\",\n \"InstanceID\": \"ins-dd213833\",\n \"Latitude\": \"41.2\",\n \"Longitude\": \"38.2\",\n \"MD5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"Name\": \"sdb\",\n \"OriginIP\": \"202.108.127.12\",\n \"Port\": 20,\n \"Province\": \"广东\",\n \"VirusName\": \"ransomware\"\n },\n \"Count\": 7,\n \"CreateTime\": \"2024-10-30T09:09:14+08:00\",\n \"Date\": \"2024-10-30T00:00:00+08:00\",\n \"EvidenceData\": \"18742\",\n \"EvidenceLocation\": \"xin.1872.net\",\n \"EvidencePath\": \"path/to/file\",\n \"ExtraInfo\": {\n \"AffectedFileName\": \"executable.exe\",\n \"AttackIPTags\": \"APT\",\n \"BehavioralCharacteristics\": \"cmd.exe\",\n \"CallbackAddressTag\": \"APT\",\n \"ClassName\": \"java.lang.Runtime\",\n \"CommandContent\": \"mkdir /tmp/18742\",\n \"DecoyPath\": \"path/to/file\",\n \"ExecutedCommand\": \"sh -c /bin/bash\",\n \"FileLastAccessTime\": \"2024-10-30T00:00:00+08:00\",\n \"FileMD5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileModifyTime\": \"2024-10-30T00:00:00+08:00\",\n \"FileName\": \"file\",\n \"FilePath\": \"file/path/to/file\",\n \"FilePermission\": \"0777\",\n \"FileSize\": \"0.00B\",\n \"LoginUserName\": \"user1\",\n \"MaliciousProcessFileMD5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"MaliciousProcessFileSize\": \"0.00B\",\n \"MaliciousProcessNamePID\": \"(0)\",\n \"MaliciousProcessPath\": \"path/to/process\",\n \"MaliciousProcessStartTime\": \"0001-01-01T08:05:43+08:05\",\n \"NewPermissions\": \"0777\",\n \"ParentProcess\": \"sh\",\n \"ProcessCommandLine\": \"sh -c rm -rf /\",\n \"ProcessName\": \"(0)\",\n \"ProcessNamePID\": \"(0)\",\n \"ProcessPath\": \"path/to/process\",\n \"ProtocolPort\": \"8989\",\n \"RecentAccessTime\": \"2024-10-10T09:09:14+08:00\",\n \"RecentModifyTime\": \"2024-10-30T09:09:14+08:00\",\n \"RelateEvent\": {\n \"Description\": \"user1登录系统\",\n \"EventID\": \"event-1232412\",\n \"RelatedCount\": 3\n },\n \"Rule\": \"system1\",\n \"StartupUser\": \"root\",\n \"UserGroup\": \"admin\",\n \"VirusFileTags\": \"APT\",\n \"VirusName\": \"virus1\"\n },\n \"ID\": \"alert-a18d7e42\",\n \"Key\": \"main.1241.net#ins-1421\",\n \"Level\": 5,\n \"LogSearch\": \"id:alert-a18d7e42\",\n \"LogType\": \"2_3\",\n \"Name\": \"访问恶意地址或域名\",\n \"NickName\": \"nickname\",\n \"ProcessType\": \"BlockCallbackAddress,IsolateAsset\",\n \"RemediationSuggestion\": \"开启云防火墙-NAT边界防火墙,管控拦截恶意主动外联,前往主机安全进行深度安全检测\",\n \"RiskInvestigation\": \"none\",\n \"RiskTreatment\": \"none\",\n \"Source\": \"CWP\",\n \"Status\": 0,\n \"SubType\": \"MaliciousRequest\",\n \"Type\": \"ActiveOutbound\",\n \"Uin\": \"18342\",\n \"UpdateTime\": \"2024-10-30T09:10:55+08:00\",\n \"UrgentSuggestion\": \"封禁回连地址\",\n \"Victim\": {\n \"Account\": \"12742\",\n \"Address\": \"1.4.42.2 | 10.0.0.2\",\n \"AssetType\": 1,\n \"City\": \"上海\",\n \"ContainerID\": \"ins-218742\",\n \"ContainerName\": \"container1\",\n \"Country\": \"中国\",\n \"Domain\": \"www.domain.com\",\n \"Family\": \"malware\",\n \"FileName\": \"wodex.exe\",\n \"HostIP\": \"10.0.0.2\",\n \"IP\": \"1.4.42.2\",\n \"Info\": \"mail\",\n \"InstanceID\": \"ins-218742\",\n \"Latitude\": \"27.1\",\n \"Longitude\": \"12.9\",\n \"MD5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"Name\": \"name1\",\n \"OriginIP\": \"1.4.42.2\",\n \"Port\": 824,\n \"Province\": \"广东\",\n \"VirusName\": \"virus1\"\n }\n }\n ],\n \"AlertTypeCount\": [\n {\n \"Count\": 66,\n \"Name\": \"SuspectIntrusion\"\n },\n {\n \"Count\": 220,\n \"Name\": \"InfoGathering\"\n },\n {\n \"Count\": 94,\n \"Name\": \"ActiveOutbound\"\n },\n {\n \"Count\": 153,\n \"Name\": \"ScanDetect\"\n },\n {\n \"Count\": 58,\n \"Name\": \"HostAbnormality\"\n },\n {\n \"Count\": 4,\n \"Name\": \"ContainerAbnormality\"\n },\n {\n \"Count\": 9085,\n \"Name\": \"AttackAttempts\"\n }\n ],\n \"RequestId\": \"123242123-d199-4c1c-9229-5731e460b8b6\",\n \"ReturnCode\": 0,\n \"ReturnMsg\": \"success\",\n \"TotalCount\": 9680\n }\n}",
|
48
48
|
"title": "告警中心全量告警示例"
|
49
49
|
}
|
50
50
|
],
|
51
51
|
"DescribeAssetViewVulRiskList": [
|
52
52
|
{
|
53
|
-
"document": "
|
54
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetViewVulRiskList\n<公共请求参数>\n\n{}",
|
55
|
-
"output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AffectAsset\": \"182.254.145.158\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"OpenSSH\",\n \"AppVersion\": \"
|
56
|
-
"title": "
|
53
|
+
"document": "获取资产视角的漏洞风险列表",
|
54
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetViewVulRiskList\n<公共请求参数>\n\n{\n \"Filter\": {\n \"Filters\": [\n {\n \"Name\": \"RecentTime\",\n \"Values\": [\n \"2024-10-26 19:37:21\"\n ],\n \"OperatorType\": 4\n },\n {\n \"Name\": \"RecentTime\",\n \"Values\": [\n \"2024-11-01 19:37:21\"\n ],\n \"OperatorType\": 5\n },\n {\n \"Name\": \"Status\",\n \"Values\": [\n \"0\"\n ],\n \"OperatorType\": 7\n }\n ],\n \"Limit\": 10,\n \"Offset\": 0,\n \"Order\": \"desc\",\n \"By\": \"RecentTime\"\n }\n}",
|
55
|
+
"output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AffectAsset\": \"182.254.145.158\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"OpenSSH\",\n \"AppVersion\": \"v1.0.1\",\n \"CVE\": \"CVE-2020-15778\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"OpenSSH\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"id-cnojiv\",\n \"Index\": \"360bfa2c*****\",\n \"InstanceId\": \"ins-***\",\n \"InstanceName\": \"ins-NAT1\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"7bb60327-***-****-***\",\n \"Level\": \"high\",\n \"Nick\": \"声声乌龙\",\n \"PCMGRId\": \"pcmgr-n21ln34l\",\n \"POCId\": \"c808d8eb****\",\n \"Payload\": \"OpenSSH/7.4\",\n \"Port\": \"22\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"1498f23a***\",\n \"Status\": 0,\n \"TaskId\": \"task-2k1b3\",\n \"Uin\": \"2190941624916\",\n \"VULName\": \"OpenSSH 命令注入漏洞(CVE-2020-15778)\",\n \"VULType\": \"命令注入\",\n \"VULURL\": \"/vul/detail?id=360bfa2c*****\"\n }\n ],\n \"FromLists\": [\n {\n \"Text\": \"云安全中心\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"主机检测\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"容器检测\",\n \"Value\": \"5\"\n }\n ],\n \"InstanceTypeLists\": [\n {\n \"Text\": \"CVM\",\n \"Value\": \"CVM\"\n }\n ],\n \"LevelLists\": [\n {\n \"Text\": \"严重\",\n \"Value\": \"extreme\"\n },\n {\n \"Text\": \"高危\",\n \"Value\": \"high\"\n },\n {\n \"Text\": \"中危\",\n \"Value\": \"middle\"\n },\n {\n \"Text\": \"低危\",\n \"Value\": \"low\"\n },\n {\n \"Text\": \"提示\",\n \"Value\": \"info\"\n }\n ],\n \"RequestId\": \"3c68de67-9f7e-442d-b1f0-81191bd1026e\",\n \"StatusLists\": [\n {\n \"Text\": \"未处理\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"标记已处置\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"已忽略\",\n \"Value\": \"2\"\n },\n {\n \"Text\": \"已修复\",\n \"Value\": \"3\"\n }\n ],\n \"Tags\": [\n {\n \"Text\": \"该漏洞存在在野利用或在野攻击\",\n \"Value\": \"KNOWN_EXPLOITED\"\n },\n {\n \"Text\": \"该漏洞仅能本地利用\",\n \"Value\": \"LOCAL\"\n },\n {\n \"Text\": \"该漏洞可作为系统组件漏洞检出\",\n \"Value\": \"SYS\"\n },\n {\n \"Text\": \"该漏洞可作为应用组件漏洞检出\",\n \"Value\": \"APP\"\n },\n {\n \"Text\": \"应急\",\n \"Value\": \"IS_EMERGENCY\"\n },\n {\n \"Text\": \"该漏洞可以远程利用\",\n \"Value\": \"NETWORK\"\n },\n {\n \"Text\": \"该漏洞有poc\",\n \"Value\": \"POC\"\n },\n {\n \"Text\": \"必修\",\n \"Value\": \"IS_SUGGEST\"\n },\n {\n \"Text\": \"该漏洞有exp\",\n \"Value\": \"EXP\"\n }\n ],\n \"TotalCount\": 1102,\n \"VULTypeLists\": [\n {\n \"Text\": \"处理逻辑错误\",\n \"Value\": \"处理逻辑错误\"\n }\n ]\n }\n}",
|
56
|
+
"title": "获取资产视角的漏洞风险列表"
|
57
57
|
}
|
58
58
|
],
|
59
59
|
"DescribeCFWAssetStatistics": [
|
60
60
|
{
|
61
61
|
"document": "资产中心统计",
|
62
62
|
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeCFWAssetStatistics\n<公共请求参数>\n\n{}",
|
63
|
-
"output": "{\n \"Response\": {\n \"NetworkTotal\":
|
63
|
+
"output": "{\n \"Response\": {\n \"NetworkTotal\": 1,\n \"ClbTotal\": 1,\n \"NatTotal\": 1,\n \"PublicAssetTotal\": 1,\n \"CVMAssetTotal\": 1,\n \"CFGTotal\": 1,\n \"PortTotal\": 1,\n \"WebsiteTotal\": 1,\n \"ServerTotal\": 1,\n \"WeakPasswordTotal\": 1,\n \"VULTotal\": 1,\n \"RequestId\": \"f9184c15-9721-456d-8ca0-4263967b5ead\"\n }\n}",
|
64
64
|
"title": "资产中心统计"
|
65
65
|
}
|
66
66
|
],
|
67
67
|
"DescribeCVMAssetInfo": [
|
68
68
|
{
|
69
69
|
"document": "接口测试",
|
70
|
-
"input": "{\n
|
71
|
-
"output": "{\n \"Response\": {\n \"Data\": {\n \"
|
70
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeCVMAssetInfo\n<公共请求参数>\n\n{\n \"AssetId\": \"ins-ggrnxdwj\"\n}",
|
71
|
+
"output": "{\n \"Response\": {\n \"Data\": {\n \"VpcId\": \"vpc-pr0wcl5e\",\n \"VpcName\": \"fengqqian\",\n \"AssetName\": \"主机测试2-win\",\n \"Os\": \"Windows Server 2012 R2 数据中心版 64位中文版\",\n \"PublicIp\": \"139.155.142.171\",\n \"PrivateIp\": \"172.16.0.9\",\n \"Region\": \"ap-chengdu\",\n \"AssetType\": \"CVM\",\n \"AssetId\": \"ins-ggrnxdwj\",\n \"AccountNum\": 2,\n \"PortNum\": 19,\n \"ProcessNum\": 41,\n \"SoftApplicationNum\": 1,\n \"DatabaseNum\": 0,\n \"WebApplicationNum\": 0,\n \"ServiceNum\": 0,\n \"WebFrameworkNum\": 0,\n \"WebSiteNum\": 0,\n \"JarPackageNum\": 0,\n \"StartServiceNum\": 173,\n \"ScheduledTaskNum\": 91,\n \"EnvironmentVariableNum\": 0,\n \"KernelModuleNum\": 0,\n \"SystemInstallationPackageNum\": 0,\n \"SurplusProtectDay\": 33,\n \"CWPStatus\": 4,\n \"Tag\": [\n {\n \"Name\": \"name1\",\n \"Value\": \"value1\"\n }\n ],\n \"ProtectLevel\": \"旗舰版\",\n \"ProtectedDay\": 2\n },\n \"RequestId\": \"8c9f9ac1-73a5-4241-b314-871b8623b017\"\n }\n}",
|
72
72
|
"title": "接口测试"
|
73
73
|
}
|
74
74
|
],
|
75
75
|
"DescribeCVMAssets": [
|
76
76
|
{
|
77
|
-
"document": "cvm列表",
|
78
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeCVMAssets\n<公共请求参数>\n\n{\n \"
|
79
|
-
"output": "{\n \"Response\": {\n \"AppIdList\": [\n {\n \"Text\": \"1300448058\",\n \"Value\": \"1300448058\"\n }\n ],\n \"AssetTypeList\": [\n {\n \"Text\": \"边缘计算机器(ECM)\",\n \"Value\": \"ECM\"\n },\n {\n \"Text\": \"腾讯云服务器(CVM)\",\n \"Value\": \"CVM\"\n }\n ],\n \"Data\": [\n {\n \"Access\": 0,\n \"AccountCount\": \"-\",\n \"AppCount\": \"-\",\n \"AppId\": 1300448058,\n \"AssetCreateTime\": \"2023-02-16 16:51:34\",\n \"AssetId\": \"ein-b41zgmgq\",\n \"AssetName\": \"test1\",\n \"AssetType\": \"ECM\",\n \"Attack\": 0,\n \"AvailableArea\": \"\",\n \"CPUInfo\": \"\",\n \"CPULoad\": \"低\",\n \"CPUSize\": 0,\n \"CWPStatus\": 1,\n \"ConfigurationRisk\": 0,\n \"DiskLoad\": \"0.00%\",\n \"DiskSize\": \"0GB\",\n \"InBandwidth\": \"0.00bps\",\n \"InFlow\": \"0.00B\",\n \"InstanceQUuid\": \"40b8a793-1e96-4101-b832-1f973b8efdb7\",\n \"InstanceUuid\": \"\",\n \"Intercept\": 0,\n \"IsCore\": 1,\n \"LastScanTime\": \"2023-03-31 17:40:20\",\n \"MemberId\": \"mem-c957e6a7195c85e0\",\n \"MemoryLoad\": \"0.00%\",\n \"MemorySize\": \"0GB\",\n \"NetWorkOut\": 0,\n \"NickName\": \"天空之蓝\",\n \"Os\": \"CentOS 8.0 64bit\",\n \"OsName\": \"CentOS 8.0 64bit\",\n \"OutBandwidth\": \"0.00bps\",\n \"OutFlow\": \"0.00B\",\n \"PartitionCount\": 0,\n \"PortCount\": 0,\n \"PortRisk\": 0,\n \"PrivateIp\": \"10.212.0.4\",\n \"ProcessCount\": \"-\",\n \"PublicIp\": \"119.147.20.109\",\n \"Region\": \"ap-guangzhou\",\n \"ScanTask\": 13,\n \"SubnetId\": \"subnet-0aos839s\",\n \"SubnetName\": \"\",\n \"Tag\": [\n {\n \"Name\": \"测试A\",\n \"Value\": \"测试B\"\n }\n ],\n \"RiskExposure\": 0,\n \"BASAgentStatus\": 0,\n \"Uin\": \"100011616646\",\n \"VpcId\": \"vpc-4c9w05r5\",\n \"VpcName\": \"\",\n \"VulnerabilityRisk\": 0\n }\n ],\n \"DefenseStatusList\": [\n {\n \"Text\": \"未开通防护\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"基础版未防护\",\n \"Value\": \"2\"\n }\n ],\n \"IpTypeList\": [\n {\n \"Text\": \"公网资产\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"私网资产\",\n \"Value\": \"0\"\n }\n ],\n \"OsList\": [\n {\n \"Text\": \"CentOS\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"未知\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"TencentOS\",\n \"Value\": \"7\"\n },\n {\n \"Text\": \"Ubuntu\",\n \"Value\": \"5\"\n }\n ],\n \"RegionList\": [\n {\n \"Text\": \"广州\",\n \"Value\": \"ap-guangzhou\"\n },\n {\n \"Text\": \"上海\",\n \"Value\": \"ap-shanghai\"\n },\n {\n \"Text\": \"北京\",\n \"Value\": \"ap-beijing\"\n },\n {\n \"Text\": \"成都\",\n \"Value\": \"ap-chengdu\"\n },\n {\n \"Text\": \"南京\",\n \"Value\": \"ap-nanjing\"\n }\n ],\n \"RequestId\": \"71673908-8c7d-41c3-8564-57c741ed3596\",\n \"SystemTypeList\": [\n {\n \"Text\": \"linux\",\n \"Value\": \"linux\"\n }\n ],\n \"Total\": 29,\n \"VpcList\": [\n {\n \"Text\": \"跨租户天空之蓝\",\n \"Value\": \"vpc-f6xj8nho\"\n },\n {\n \"Text\": \"成都sdwan\",\n \"Value\": \"vpc-ebfqtnxa\"\n },\n {\n \"Text\": \"冲突sdwan\",\n \"Value\": \"vpc-dw314am3\"\n },\n {\n \"Text\": \"vpctest\",\n \"Value\": \"vpc-rkm452h0\"\n },\n {\n \"Text\": \"Default-VPC很长的很长的231321321321321313\",\n \"Value\": \"vpc-5vcbd7cv\"\n }\n ],\n \"ZoneList\": [\n {\n \"Text\": \"广州\",\n \"Value\": \"ap-guangzhou\"\n },\n {\n \"Text\": \"上海\",\n \"Value\": \"ap-shanghai\"\n },\n {\n \"Text\": \"北京\",\n \"Value\": \"ap-beijing\"\n },\n {\n \"Text\": \"成都\",\n \"Value\": \"ap-chengdu\"\n },\n {\n \"Text\": \"南京\",\n \"Value\": \"ap-nanjing\"\n }\n ]\n }\n}",
|
80
|
-
"title": "cvm列表"
|
77
|
+
"document": "获取cvm列表",
|
78
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeCVMAssets\n<公共请求参数>\n\n{\n \"Filter\": {\n \"Filters\": [\n {\n \"Name\": \"ProtectStatus\",\n \"Values\": [\n \"4\"\n ],\n \"OperatorType\": 7\n },\n {\n \"Name\": \"TimeRange\",\n \"Values\": [\n \"2\"\n ],\n \"OperatorType\": 7\n }\n ],\n \"Limit\": 10,\n \"Offset\": 0,\n \"Order\": \"desc\",\n \"By\": \"AssetCreateTime\"\n },\n \"MemberId\": [\n \"mem-5b28e2010c18f07a\"\n ]\n}",
|
79
|
+
"output": "{\n \"Response\": {\n \"AppIdList\": [\n {\n \"Text\": \"125000001\",\n \"Value\": \"130200001\"\n }\n ],\n \"AssetMapInstanceTypeList\": [\n {\n \"Text\": \"主机\",\n \"Value\": \"Instance\",\n \"InstanceTypeList\": [\n {\n \"Text\": \"CVM\",\n \"Value\": \"CVM\"\n }\n ]\n }\n ],\n \"AssetTypeList\": [\n {\n \"Text\": \"CVM\",\n \"Value\": \"CVM\"\n }\n ],\n \"Data\": [\n {\n \"AssetId\": \"ins-ggrnxdwj\",\n \"AssetName\": \"主机测试2-win\",\n \"PublicIp\": \"139.*.*.171\",\n \"PrivateIp\": \"172.16.0.9\",\n \"Tag\": [\n {\n \"Name\": \"name1\",\n \"Value\": \"value1\"\n }\n ],\n \"IsCore\": 2,\n \"AssetType\": \"CVM\",\n \"Region\": \"ap-chengdu\",\n \"AvailableArea\": \"成都一区\",\n \"Os\": \"Windows Server 2012 R2 数据中心版 64位中文版\",\n \"VpcId\": \"vpc-pr0wcl5e\",\n \"VpcName\": \"fengqqian\",\n \"OsName\": \"Windows Server 2012 R2 数据中心版 64位中文版\",\n \"CPUInfo\": \"AMD EPYC 7K83 64-Core Processor\",\n \"CPUSize\": 2,\n \"CPULoad\": \"未知\",\n \"MemorySize\": \"4GB\",\n \"MemoryLoad\": \"34.21%\",\n \"DiskSize\": \"49GB\",\n \"DiskLoad\": \"29.13%\",\n \"PartitionCount\": 2,\n \"AppId\": 1302396215,\n \"Uin\": \"100014592178\",\n \"SubnetId\": \"subnet-hn32qgp5\",\n \"SubnetName\": \"fengsub\",\n \"InstanceUuid\": \"82727b6e-3676-4660-ac4e-c281dba1b23f\",\n \"InstanceQUuid\": \"82727b6e-3676-4660-ac4e-c281dba1b23f\",\n \"NickName\": \"nickname\",\n \"AccountCount\": \"2\",\n \"ProcessCount\": \"41\",\n \"AppCount\": \"1\",\n \"PortCount\": 19,\n \"InBandwidth\": \"0bps\",\n \"OutBandwidth\": \"0bps\",\n \"InFlow\": \"0B\",\n \"OutFlow\": \"0B\",\n \"PortRisk\": 0,\n \"VulnerabilityRisk\": 0,\n \"ConfigurationRisk\": 52,\n \"LastScanTime\": \"2024-10-30 05:02:29\",\n \"AssetCreateTime\": \"2024-10-28 19:36:43\",\n \"BASAgentStatus\": -1,\n \"CWPStatus\": 4,\n \"ProtectStatus\": 4,\n \"Attack\": 0,\n \"Access\": 0,\n \"Intercept\": 0,\n \"NetWorkOut\": 0,\n \"RiskExposure\": 0,\n \"ScanTask\": 1,\n \"MemberId\": \"mem-625c522c0913c901\",\n \"IsNewAsset\": 0,\n \"CVMStatus\": 1,\n \"CVMAgentStatus\": 1,\n \"DefenseModel\": 1,\n \"TatStatus\": 1,\n \"AgentStatus\": 1,\n \"CloseDefenseCount\": 0,\n \"CpuTrend\": [\n {\n \"Key\": \"2024-10-29 07:45:16\",\n \"Value\": \"0.5208333\"\n },\n {\n \"Key\": \"2024-10-29 23:43:52\",\n \"Value\": \"0.26041666\"\n }\n ],\n \"MemoryTrend\": [\n {\n \"Key\": \"2024-10-29 07:45:16\",\n \"Value\": \"24\"\n },\n {\n \"Key\": \"2024-10-29 23:43:52\",\n \"Value\": \"32\"\n }\n ],\n \"InstanceState\": \"RUNNING\",\n \"SecurityGroupIds\": [\n \"sg-ijs188uj\"\n ],\n \"AgentCpuPer\": 0,\n \"AgentMemRss\": 26088,\n \"RealAppid\": 0,\n \"CloudType\": 0,\n \"OfflineTime\": \"2024-10-29 23:43:52\"\n },\n {\n \"AssetId\": \"ins-m1xkxkv4\",\n \"AssetName\": \"linux-arm-foo\",\n \"PublicIp\": \"119.*.*.202\",\n \"PrivateIp\": \"10.10.0.48\",\n \"Tag\": [\n {\n \"Name\": \"name1\",\n \"Value\": \"value1\"\n }\n ],\n \"IsCore\": 2,\n \"AssetType\": \"CVM\",\n \"Region\": \"ap-guangzhou\",\n \"AvailableArea\": \"广州六区\",\n \"Os\": \"Ubuntu 18.04(arm64)\",\n \"VpcId\": \"vpc-fw2ndu5f\",\n \"VpcName\": \"arm-vpc\",\n \"OsName\": \"Ubuntu 18.04(arm64)\",\n \"CPUInfo\": \"AMD EPYC 7K83 64-Core Processor\",\n \"CPUSize\": 2,\n \"CPULoad\": \"低\",\n \"MemorySize\": \"4GB\",\n \"MemoryLoad\": \"14.41%\",\n \"DiskSize\": \"146GB\",\n \"DiskLoad\": \"36.94%\",\n \"PartitionCount\": 5,\n \"AppId\": 1302396215,\n \"Uin\": \"100014592178\",\n \"SubnetId\": \"subnet-jol7wxbs\",\n \"SubnetName\": \"fengsub\",\n \"InstanceUuid\": \"e868e2da-8c44-4037-b4dd-daf790edf7a4\",\n \"InstanceQUuid\": \"e868e2da-8c44-4037-b4dd-daf790edf7a4\",\n \"NickName\": \"声声乌龙\",\n \"AccountCount\": \"32\",\n \"ProcessCount\": \"34\",\n \"AppCount\": \"5\",\n \"PortCount\": 7,\n \"InBandwidth\": \"0bps\",\n \"OutBandwidth\": \"0bps\",\n \"InFlow\": \"0B\",\n \"OutFlow\": \"0B\",\n \"PortRisk\": 0,\n \"VulnerabilityRisk\": 0,\n \"ConfigurationRisk\": 1,\n \"LastScanTime\": \"2024-10-30 05:02:29\",\n \"AssetCreateTime\": \"2024-09-26 11:28:19\",\n \"BASAgentStatus\": 0,\n \"CWPStatus\": 4,\n \"ProtectStatus\": 4,\n \"Attack\": 0,\n \"Access\": 0,\n \"Intercept\": 0,\n \"NetWorkOut\": 0,\n \"RiskExposure\": 0,\n \"ScanTask\": 14,\n \"MemberId\": \"mem-625c522c0913c901\",\n \"IsNewAsset\": 0,\n \"CVMStatus\": 1,\n \"CVMAgentStatus\": 1,\n \"DefenseModel\": 1,\n \"TatStatus\": 1,\n \"AgentStatus\": 1,\n \"CloseDefenseCount\": 0,\n \"CpuTrend\": [\n {\n \"Key\": \"2024-10-29 07:45:16\",\n \"Value\": \"0.5208333\"\n },\n {\n \"Key\": \"2024-10-29 23:43:52\",\n \"Value\": \"0.26041666\"\n }\n ],\n \"MemoryTrend\": [\n {\n \"Key\": \"2024-10-29 07:45:16\",\n \"Value\": \"24\"\n },\n {\n \"Key\": \"2024-10-29 23:43:52\",\n \"Value\": \"32\"\n }\n ],\n \"InstanceState\": \"RUNNING\",\n \"SecurityGroupIds\": [\n \"sg-biz3919h\"\n ],\n \"AgentCpuPer\": 0,\n \"AgentMemRss\": 0,\n \"RealAppid\": 0,\n \"CloudType\": 0,\n \"OfflineTime\": \"2024-10-\"\n },\n {\n \"AssetId\": \"ins-p7x4hn7p\",\n \"AssetName\": \"自动化测试\",\n \"PublicIp\": \"132.*.*.102\",\n \"PrivateIp\": \"10.0.0.11\",\n \"Tag\": [\n {\n \"Name\": \"name1\",\n \"Value\": \"value1\"\n }\n ],\n \"IsCore\": 2,\n \"AssetType\": \"CVM\",\n \"Region\": \"ap-chengdu\",\n \"AvailableArea\": \"成都一区\",\n \"Os\": \"TencentOS Server 3.1 (TK4)\",\n \"VpcId\": \"vpc-iozrpgxo\",\n \"VpcName\": \"自动化测试\",\n \"OsName\": \"TencentOS Server 3.1 (TK4)\",\n \"CPUInfo\": \"Intel(R) Xeon(R) Platinum 8255C CPU @ 2.50GHz\",\n \"CPUSize\": 2,\n \"CPULoad\": \"低\",\n \"MemorySize\": \"2GB\",\n \"MemoryLoad\": \"22.72%\",\n \"DiskSize\": \"49GB\",\n \"DiskLoad\": \"18.62%\",\n \"PartitionCount\": 1,\n \"AppId\": 1302396215,\n \"Uin\": \"100014592178\",\n \"SubnetId\": \"subnet-5fect5mp\",\n \"SubnetName\": \"fengsub1\",\n \"InstanceUuid\": \"7a6eaa66-0f21-45c1-a33c-d89ca32d2866\",\n \"InstanceQUuid\": \"7a6eaa66-0f21-45c1-a33c-d89ca32d2866\",\n \"NickName\": \"声声乌龙\",\n \"AccountCount\": \"32\",\n \"ProcessCount\": \"30\",\n \"AppCount\": \"5\",\n \"PortCount\": 4,\n \"InBandwidth\": \"0bps\",\n \"OutBandwidth\": \"0bps\",\n \"InFlow\": \"0B\",\n \"OutFlow\": \"0B\",\n \"PortRisk\": 0,\n \"VulnerabilityRisk\": 0,\n \"ConfigurationRisk\": 7,\n \"LastScanTime\": \"2024-10-30 05:02:29\",\n \"AssetCreateTime\": \"2024-09-09 20:34:02\",\n \"BASAgentStatus\": 1,\n \"CWPStatus\": 4,\n \"ProtectStatus\": 4,\n \"Attack\": 0,\n \"Access\": 0,\n \"Intercept\": 0,\n \"NetWorkOut\": 0,\n \"RiskExposure\": 0,\n \"ScanTask\": 24,\n \"MemberId\": \"mem-625c522c0913c901\",\n \"IsNewAsset\": 0,\n \"CVMStatus\": 1,\n \"CVMAgentStatus\": 1,\n \"DefenseModel\": 1,\n \"TatStatus\": 1,\n \"AgentStatus\": 1,\n \"CloseDefenseCount\": 0,\n \"CpuTrend\": [\n {\n \"Key\": \"2024-10-29 07:45:16\",\n \"Value\": \"0.5208333\"\n },\n {\n \"Key\": \"2024-10-29 23:43:52\",\n \"Value\": \"0.26041666\"\n }\n ],\n \"MemoryTrend\": [\n {\n \"Key\": \"2024-10-29 07:45:16\",\n \"Value\": \"24\"\n },\n {\n \"Key\": \"2024-10-29 23:43:52\",\n \"Value\": \"32\"\n }\n ],\n \"InstanceState\": \"RUNNING\",\n \"SecurityGroupIds\": [\n \"sg-ijs188uj\"\n ],\n \"AgentCpuPer\": 1.50754,\n \"AgentMemRss\": 124244,\n \"RealAppid\": 0,\n \"CloudType\": 0,\n \"OfflineTime\": \"2024-10-03 11:29:11\"\n }\n ],\n \"DefenseStatusList\": [\n {\n \"Text\": \"基础版未防护\",\n \"Value\": \"2\"\n },\n {\n \"Text\": \"旗舰版防护中\",\n \"Value\": \"4\"\n }\n ],\n \"IpTypeList\": [\n {\n \"Text\": \"公网资产\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"私网资产\",\n \"Value\": \"0\"\n }\n ],\n \"OsList\": [\n {\n \"Text\": \"CentOS\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"Windows Server\",\n \"Value\": \"6\"\n },\n {\n \"Text\": \"TencentOS\",\n \"Value\": \"7\"\n },\n {\n \"Text\": \"Ubuntu\",\n \"Value\": \"5\"\n },\n {\n \"Text\": \"CoreOS\",\n \"Value\": \"8\"\n },\n {\n \"Text\": \"Debian\",\n \"Value\": \"2\"\n }\n ],\n \"ProtectStatusList\": [\n {\n \"Text\": \"未安装\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"基础版防护中\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"普惠版防护中\",\n \"Value\": \"2\"\n },\n {\n \"Text\": \"专业版防护中\",\n \"Value\": \"3\"\n },\n {\n \"Text\": \"旗舰版防护中\",\n \"Value\": \"4\"\n },\n {\n \"Text\": \"已离线\",\n \"Value\": \"5\"\n },\n {\n \"Text\": \"已关机\",\n \"Value\": \"6\"\n }\n ],\n \"PublicPrivateAttr\": [\n {\n \"Text\": \"内网服务\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"公网服务\",\n \"Value\": \"1\"\n }\n ],\n \"RegionList\": [\n {\n \"Text\": \"上海\",\n \"Value\": \"ap-shanghai\"\n },\n {\n \"Text\": \"成都\",\n \"Value\": \"ap-chengdu\"\n },\n {\n \"Text\": \"硅谷\",\n \"Value\": \"na-siliconvalley\"\n },\n {\n \"Text\": \"北京\",\n \"Value\": \"ap-beijing\"\n },\n {\n \"Text\": \"广州\",\n \"Value\": \"ap-guangzhou\"\n }\n ],\n \"RequestId\": \"4a537d7d-0562-4fe8-8f62-6028777279eb\",\n \"SystemTypeList\": [\n {\n \"Text\": \"linux\",\n \"Value\": \"linux\"\n },\n {\n \"Text\": \"windows\",\n \"Value\": \"windows\"\n }\n ],\n \"Total\": 3,\n \"VpcList\": [\n {\n \"Text\": \"li-vr\",\n \"Value\": \"vpc-gu5j0xuy\"\n },\n {\n \"Text\": \"fengqqian\",\n \"Value\": \"vpc-pr0wcl5e\"\n },\n {\n \"Text\": \"Default-VPC\",\n \"Value\": \"vpc-6bmvfm3h\"\n },\n {\n \"Text\": \"li-跨账号2\",\n \"Value\": \"vpc-1hezruby\"\n },\n {\n \"Text\": \"fengqqian2\",\n \"Value\": \"vpc-fw2ndu5f\"\n },\n {\n \"Text\": \"fengqqian\",\n \"Value\": \"vpc-294np9d5\"\n },\n {\n \"Text\": \"自动化测试请勿删除\",\n \"Value\": \"vpc-iozrpgxo\"\n },\n {\n \"Text\": \"Default-VPC\",\n \"Value\": \"vpc-ommo5hlv\"\n },\n {\n \"Text\": \"vpc-gz-0\",\n \"Value\": \"vpc-68t3zm89\"\n }\n ],\n \"ZoneList\": [\n {\n \"Text\": \"上海五区\",\n \"Value\": \"ap-shanghai-5\"\n },\n {\n \"Text\": \"成都一区\",\n \"Value\": \"ap-chengdu-1\"\n },\n {\n \"Text\": \"硅谷一区\",\n \"Value\": \"na-siliconvalley-1\"\n },\n {\n \"Text\": \"北京七区\",\n \"Value\": \"ap-beijing-7\"\n },\n {\n \"Text\": \"广州六区\",\n \"Value\": \"ap-guangzhou-6\"\n },\n {\n \"Text\": \"广州三区\",\n \"Value\": \"ap-guangzhou-3\"\n }\n ]\n }\n}",
|
80
|
+
"title": "获取cvm列表"
|
81
81
|
}
|
82
82
|
],
|
83
83
|
"DescribeClusterPodAssets": [
|
84
84
|
{
|
85
|
-
"document": "
|
86
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeClusterPodAssets\n<公共请求参数>\n\n{\n \"
|
87
|
-
"output": "{\n \"Response\": {\n \"
|
88
|
-
"title": "
|
85
|
+
"document": "集群pod列表",
|
86
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeClusterPodAssets\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-68b8087a65268000\"\n ],\n \"Filter\": {\n \"Limit\": 1,\n \"Offset\": 0\n }\n}",
|
87
|
+
"output": "{\n \"Response\": {\n \"AppIdList\": [\n {\n \"Text\": \"1302396211\",\n \"Value\": \"1302396211\"\n }\n ],\n \"Data\": [\n {\n \"AppId\": 1302396211,\n \"AssetId\": \"002a244ad33***6b7ec01b91ae63a9\",\n \"AssetName\": \"kubernetes-proxy-6dd44f7b74-mqf4n\",\n \"ClusterId\": \"cls-0hdxu91s\",\n \"ClusterName\": \"yancyw\",\n \"ContainerCount\": 1,\n \"InstanceCreateTime\": \"2024-08-22 21:45:10\",\n \"IsCore\": 2,\n \"IsNewAsset\": 0,\n \"MachineId\": \"ins-0hdxu91s\",\n \"MachineName\": \"my-vm\",\n \"Namespace\": \"default\",\n \"Nick\": \"声声乌龙\",\n \"PodIp\": \"10.**.0.**\",\n \"PrivateIp\": \"10.**.0.**\",\n \"PublicIp\": \"118.**.**.**\",\n \"Region\": \"ap-guangzhou\",\n \"ServiceCount\": 1,\n \"Status\": \"Running\",\n \"Uin\": \"100014111178\"\n }\n ],\n \"NamespaceList\": [\n {\n \"Text\": \"default\",\n \"Value\": \"default\"\n },\n {\n \"Text\": \"kube-system\",\n \"Value\": \"kube-system\"\n },\n {\n \"Text\": \"tcss\",\n \"Value\": \"tcss\"\n }\n ],\n \"PodStatusList\": [\n {\n \"Text\": \"running\",\n \"Value\": \"running\"\n },\n {\n \"Text\": \"succeeded\",\n \"Value\": \"succeeded\"\n }\n ],\n \"RegionList\": [\n {\n \"Text\": \"广州\",\n \"Value\": \"ap-guangzhou\"\n }\n ],\n \"RequestId\": \"077d335a-f2c7-4f20-884a-9700086f3608\",\n \"TotalCount\": 27\n }\n}",
|
88
|
+
"title": "集群pod列表"
|
89
89
|
}
|
90
90
|
],
|
91
91
|
"DescribeDbAssetInfo": [
|
92
92
|
{
|
93
93
|
"document": "接口测试",
|
94
|
-
"input": "{\n
|
95
|
-
"output": "{\n \"Response\": {\n \"Data\": {\n \"AssetId\": \"cdb-nbq22l65\",\n \"AssetName\": \"cdb379810\",\n \"AssetType\": \"MYSQL\",\n \"CFWProtectLevel\": 1,\n \"CFWStatus\": 1,\n \"PrivateIp\": \"192.168.1.11:3306\",\n \"PublicIp\": \"\",\n \"Region\": \"ap-guangzhou\",\n \"Tag\":
|
94
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeDbAssetInfo\n<公共请求参数>\n\n{\n \"AssetId\": \"cdb-nbq22l65\"\n}",
|
95
|
+
"output": "{\n \"Response\": {\n \"Data\": {\n \"AssetId\": \"cdb-nbq22l65\",\n \"AssetName\": \"cdb379810\",\n \"AssetType\": \"MYSQL\",\n \"CFWProtectLevel\": 1,\n \"CFWStatus\": 1,\n \"PrivateIp\": \"192.168.1.11:3306\",\n \"PublicIp\": \"1.1.1.1\",\n \"Region\": \"ap-guangzhou\",\n \"Tag\": [\n {\n \"Name\": \"andy\",\n \"Value\": \"1.214\"\n }\n ],\n \"VpcId\": \"vpc-ds7fl5xn\",\n \"VpcName\": \"illnggao-01\"\n },\n \"RequestId\": \"d5a9e4b1-7007-4b6d-a35b-54ebfd16f8fc\"\n }\n}",
|
96
96
|
"title": "接口测试"
|
97
97
|
}
|
98
98
|
],
|
99
99
|
"DescribeDbAssets": [
|
100
100
|
{
|
101
101
|
"document": "",
|
102
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeDbAssets\n<公共请求参数>\n\n{\n \"
|
103
|
-
"output": "{\n \"Response\": {\n \"
|
102
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeDbAssets\n<公共请求参数>\n\n{\n \"Filter\": {\n \"Filters\": [\n {\n \"Name\": \"Status\",\n \"Values\": [\n \"1\"\n ],\n \"OperatorType\": 7\n },\n {\n \"Name\": \"TimeRange\",\n \"Values\": [\n \"2\"\n ],\n \"OperatorType\": 7\n }\n ],\n \"Limit\": 10,\n \"Offset\": 0,\n \"Order\": \"desc\",\n \"By\": \"AssetCreateTime\"\n },\n \"MemberId\": [\n \"mem-625225cc0913c901\"\n ]\n}",
|
103
|
+
"output": "{\n \"Response\": {\n \"AppIdList\": [\n {\n \"Text\": \"130215132961\",\n \"Value\": \"130215132961\"\n }\n ],\n \"AssetTypeList\": [\n {\n \"Text\": \"MySQL\",\n \"Value\": \"MYSQL\"\n },\n {\n \"Text\": \"PostgreSQL\",\n \"Value\": \"POSTGRES\"\n },\n {\n \"Text\": \"MariaDB\",\n \"Value\": \"MARIADB\"\n }\n ],\n \"Data\": [\n {\n \"AssetId\": \"postgres-n3rvf26b\",\n \"AssetType\": \"POSTGRES\",\n \"Region\": \"ap-guangzhou\",\n \"VpcName\": \"li-用完删\",\n \"ConfigurationRisk\": 1,\n \"AssetName\": \"Unnamed\",\n \"VpcId\": \"vpc-ewf1aiej\",\n \"Domain\": \"example.foo2.com\",\n \"AssetCreateTime\": \"2024-01-30 16:17:21\",\n \"LastScanTime\": \"2024-10-30 05:02:29\",\n \"Attack\": 0,\n \"Access\": 0,\n \"ScanTask\": 28,\n \"AppId\": 130215132961,\n \"Uin\": \"10001459297899\",\n \"NickName\": \"声声乌龙2\",\n \"Port\": 0,\n \"Tag\": [\n {\n \"Name\": \"new\",\n \"Value\": \"sign\"\n },\n {\n \"Name\": \"业务测试\",\n \"Value\": \"业务测试数据\"\n }\n ],\n \"PrivateIp\": \"192.168.222.101:5432\",\n \"PublicIp\": \"1.1.1.1\",\n \"Status\": 1,\n \"IsCore\": 2,\n \"IsNewAsset\": 0\n },\n {\n \"AssetId\": \"tdsql-kfbdnfy9\",\n \"AssetType\": \"MARIADB\",\n \"Region\": \"ap-guangzhou\",\n \"VpcName\": \"li-用完删\",\n \"ConfigurationRisk\": 1,\n \"AssetName\": \"tdsql-kfbdnfy9\",\n \"VpcId\": \"vpc-ewf1aiej\",\n \"Domain\": \"example.foo.com\",\n \"AssetCreateTime\": \"2024-01-30 16:12:58\",\n \"LastScanTime\": \"2024-10-30 05:02:29\",\n \"Attack\": 0,\n \"Access\": 0,\n \"ScanTask\": 28,\n \"AppId\": 130215132961,\n \"Uin\": \"10001459297899\",\n \"NickName\": \"声声乌龙2\",\n \"Port\": 0,\n \"Tag\": [\n {\n \"Name\": \"new\",\n \"Value\": \"sign\"\n }\n ],\n \"PrivateIp\": \"192.168.222.104:3306\",\n \"PublicIp\": \"1.1.1.1\",\n \"Status\": 1,\n \"IsCore\": 2,\n \"IsNewAsset\": 0\n },\n {\n \"AssetId\": \"cdb-4dckmpb7\",\n \"AssetType\": \"MYSQL\",\n \"Region\": \"ap-guangzhou\",\n \"VpcName\": \"li-用完删\",\n \"ConfigurationRisk\": 5,\n \"AssetName\": \"cdb419972\",\n \"VpcId\": \"vpc-ewf1aiej\",\n \"Domain\": \"example.foo1.com\",\n \"AssetCreateTime\": \"2024-01-30 15:45:08\",\n \"LastScanTime\": \"2024-10-30 05:02:29\",\n \"Attack\": 0,\n \"Access\": 0,\n \"ScanTask\": 28,\n \"AppId\": 130215132961,\n \"Uin\": \"10001459297899\",\n \"NickName\": \"声声乌龙2\",\n \"Port\": 0,\n \"Tag\": [\n {\n \"Name\": \"new\",\n \"Value\": \"sign\"\n }\n ],\n \"PrivateIp\": \"192.168.222.103:3306\",\n \"PublicIp\": \"1.1.1.1\",\n \"Status\": 1,\n \"IsCore\": 2,\n \"IsNewAsset\": 0\n }\n ],\n \"PublicPrivateAttr\": [\n {\n \"Text\": \"内网服务\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"公网服务\",\n \"Value\": \"1\"\n }\n ],\n \"RegionList\": [\n {\n \"Text\": \"广州\",\n \"Value\": \"ap-guangzhou\"\n }\n ],\n \"RequestId\": \"1eca062f-ccb9-44c4-b43c-eda42b62607e\",\n \"Total\": 3,\n \"VpcList\": [\n {\n \"Text\": \"Default-VPC\",\n \"Value\": \"vpc-ommo5hlv\"\n },\n {\n \"Text\": \"li-用完删\",\n \"Value\": \"vpc-ewf1aiej\"\n },\n {\n \"Text\": \"fengqqian2\",\n \"Value\": \"vpc-fw2ndu5f\"\n }\n ]\n }\n}",
|
104
104
|
"title": "数据库资产列表查询"
|
105
105
|
}
|
106
106
|
],
|
107
107
|
"DescribeDomainAssets": [
|
108
108
|
{
|
109
109
|
"document": "接口示例",
|
110
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeDomainAssets\n<公共请求参数>\n\n{\n \"
|
111
|
-
"output": "{\n \"Response\": {\n \"AssetLocationList\": [],\n \"Data\":
|
110
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeDomainAssets\n<公共请求参数>\n\n{\n \"Filter\": {\n \"Filters\": [\n {\n \"Name\": \"WAFStatus\",\n \"Values\": [\n \"1\"\n ],\n \"OperatorType\": 7\n },\n {\n \"Name\": \"TimeRange\",\n \"Values\": [\n \"2\"\n ],\n \"OperatorType\": 7\n }\n ],\n \"Limit\": 10,\n \"Offset\": 0,\n \"Order\": \"desc\",\n \"By\": \"AssetCreateTime\"\n },\n \"MemberId\": [\n \"mem-62522c05c913c901\"\n ]\n}",
|
111
|
+
"output": "{\n \"Response\": {\n \"AssetLocationList\": [\n {\n \"Text\": \"其他\",\n \"Value\": \"2\"\n }\n ],\n \"Data\": [\n {\n \"AssetId\": [\n \"book.szzucieva.com\"\n ],\n \"AssetName\": [\n \"book.szzucieva.com\"\n ],\n \"SubDomain\": \"book.szzucieva.com\",\n \"SourceType\": \"未知\",\n \"BotAccessCount\": 0,\n \"BotCount\": 0,\n \"WebAttack\": 0,\n \"PortRisk\": 0,\n \"VulnerabilityRisk\": 0,\n \"WeakPassword\": 0,\n \"WebContentRisk\": 0,\n \"ServiceRisk\": 0,\n \"WAFStatus\": 1,\n \"AssetType\": [\n \"未知\"\n ],\n \"AssetCreateTime\": \"2024-08-31 06:01:18\",\n \"Region\": [\n \"other\"\n ],\n \"SeverIp\": [\n \"**************\"\n ],\n \"AppId\": 1302396219625,\n \"Uin\": \"100014592145978\",\n \"NickName\": \"生生乌龙\",\n \"IsCore\": 2,\n \"IsCloud\": 3,\n \"Attack\": 0,\n \"Access\": 0,\n \"Intercept\": 0,\n \"InBandwidth\": \"0bps\",\n \"OutBandwidth\": \"0bps\",\n \"InFlow\": \"0B\",\n \"OutFlow\": \"0B\",\n \"LastScanTime\": \"2024-10-30 05:02:29\",\n \"ConfigurationRisk\": 0,\n \"ScanTask\": 0,\n \"Tag\": [\n {\n \"Name\": \"name1\",\n \"Value\": \"value1\"\n }\n ],\n \"MemberId\": \"mem-625c229153c9c001\",\n \"CCAttack\": 0,\n \"IsNewAsset\": 0,\n \"VerifyDomain\": \"verify.te.foo1.***.dxoyxy.top\",\n \"VerifyTXTRecord\": \"verify/cnkj1bn2k4n124n14n12\",\n \"VerifyStatus\": 0\n },\n {\n \"AssetId\": [\n \"docker.dzoxyxy.top\"\n ],\n \"AssetName\": [\n \"docker.dzoxyxy.top\"\n ],\n \"SubDomain\": \"docker.dzoxyxy.top\",\n \"SourceType\": \"未知\",\n \"BotAccessCount\": 0,\n \"BotCount\": 0,\n \"WebAttack\": 0,\n \"PortRisk\": 0,\n \"VulnerabilityRisk\": 0,\n \"WeakPassword\": 0,\n \"WebContentRisk\": 0,\n \"ServiceRisk\": 0,\n \"WAFStatus\": 1,\n \"AssetType\": [],\n \"AssetCreateTime\": \"2023-12-14 11:06:37\",\n \"Region\": [\n \"other\"\n ],\n \"SeverIp\": [\n \"43.165.126.15\"\n ],\n \"AppId\": 1302396219625,\n \"Uin\": \"100014592145978\",\n \"NickName\": \"生生乌龙\",\n \"IsCore\": 2,\n \"IsCloud\": 2,\n \"Attack\": 0,\n \"Access\": 0,\n \"Intercept\": 0,\n \"InBandwidth\": \"0bps\",\n \"OutBandwidth\": \"0bps\",\n \"InFlow\": \"0B\",\n \"OutFlow\": \"0B\",\n \"LastScanTime\": \"2024-10-30 05:02:29\",\n \"ConfigurationRisk\": 0,\n \"ScanTask\": 31,\n \"Tag\": [\n {\n \"Name\": \"name1\",\n \"Value\": \"value1\"\n }\n ],\n \"MemberId\": \"mem-625c229153c9c001\",\n \"CCAttack\": 0,\n \"IsNewAsset\": 0,\n \"VerifyDomain\": \"verify.te.foo3.***.dxoyxy.top\",\n \"VerifyTXTRecord\": \"verify/qnwofhqocnasonr31cv3ir414j21pj4p12j41u0921u\",\n \"VerifyStatus\": 0\n },\n {\n \"AssetId\": [\n \"example.te.dxoyxy.top\"\n ],\n \"AssetName\": [\n \"example.te.dxoyxy.top\"\n ],\n \"SubDomain\": \"example.te.dxoyxy.top\",\n \"SourceType\": \"未知\",\n \"BotAccessCount\": 0,\n \"BotCount\": 0,\n \"WebAttack\": 0,\n \"PortRisk\": 0,\n \"VulnerabilityRisk\": 0,\n \"WeakPassword\": 0,\n \"WebContentRisk\": 0,\n \"ServiceRisk\": 0,\n \"WAFStatus\": 1,\n \"AssetType\": [],\n \"AssetCreateTime\": \"2023-12-14 11:30:07\",\n \"Region\": [\n \"other\"\n ],\n \"SeverIp\": [\n \"43.137.128.53\"\n ],\n \"AppId\": 1302396219625,\n \"Uin\": \"100014592145978\",\n \"NickName\": \"生生乌龙\",\n \"IsCore\": 2,\n \"IsCloud\": 2,\n \"Attack\": 0,\n \"Access\": 0,\n \"Intercept\": 0,\n \"InBandwidth\": \"0bps\",\n \"OutBandwidth\": \"0bps\",\n \"InFlow\": \"0B\",\n \"OutFlow\": \"0B\",\n \"LastScanTime\": \"2024-10-30 05:02:29\",\n \"ConfigurationRisk\": 0,\n \"ScanTask\": 31,\n \"Tag\": [\n {\n \"Name\": \"name1\",\n \"Value\": \"value1\"\n }\n ],\n \"MemberId\": \"mem-625c229153c9c001\",\n \"CCAttack\": 0,\n \"IsNewAsset\": 0,\n \"VerifyDomain\": \"verify.te.foo.***.dxoyxy.top\",\n \"VerifyTXTRecord\": \"verify/qnwofhqoir414j21pj4p12j41u0921u\",\n \"VerifyStatus\": 0\n }\n ],\n \"DefenseStatusList\": [\n {\n \"Text\": \"已防护\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"未防护\",\n \"Value\": \"5\"\n }\n ],\n \"RegionList\": [\n {\n \"Text\": \"未知\",\n \"Value\": \"other\"\n }\n ],\n \"RequestId\": \"ddca49aa-8aaf-4525-b2ff-fdd6fe7d1d20\",\n \"SourceTypeList\": [\n {\n \"Text\": \"未知\",\n \"Value\": \"unknown\"\n }\n ],\n \"Total\": 3\n }\n}",
|
112
112
|
"title": "接口示例"
|
113
113
|
}
|
114
114
|
],
|
115
115
|
"DescribeGatewayAssets": [
|
116
116
|
{
|
117
|
-
"document": "
|
118
|
-
"input": "
|
119
|
-
"output": "{\n \"Response\": {\n \"
|
120
|
-
"title": "
|
117
|
+
"document": "示例",
|
118
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeGatewayAssets\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-68b8087a65268000\",\n \"mem-tencent-522badef8ad96a4d\"\n ]\n}",
|
119
|
+
"output": "{\n \"Response\": {\n \"AppIdList\": [\n {\n \"Text\": \"1827324\",\n \"Value\": \"1827324\"\n },\n {\n \"Text\": \"1302396215\",\n \"Value\": \"1302396215\"\n }\n ],\n \"AssetTypeList\": [\n {\n \"Text\": \"NATFW\",\n \"Value\": \"NATFW\"\n },\n {\n \"Text\": \"NAT\",\n \"Value\": \"NAT\"\n },\n {\n \"Text\": \"PROBE\",\n \"Value\": \"PROBE\"\n },\n {\n \"Text\": \"CLB\",\n \"Value\": \"CLB\"\n }\n ],\n \"Data\": [\n {\n \"AddressIPV6\": \"27::1\",\n \"AppId\": \"1827324\",\n \"AssetId\": \"cfwnat-a2b9957b\",\n \"AssetName\": \"autoDev\",\n \"AssetType\": \"NATFW\",\n \"ConfigureRisk\": 0,\n \"CreateTime\": \"2022-11-28 01:30:55\",\n \"EngineRegion\": \"sg\",\n \"ExposedPort\": 0,\n \"ExposedVUL\": 0,\n \"InboundCumulativeFlow\": \"352.00KB\",\n \"InboundPeakBandwidth\": \"1.75Kbps\",\n \"IsCore\": 1,\n \"IsNewAsset\": 0,\n \"LastScanTime\": \"2024-08-22 21:45:10\",\n \"NetworkAttack\": 0,\n \"Nick\": \"master\",\n \"OutboundCumulativeFlow\": \"38.67KB\",\n \"OutboundPeakBandwidth\": \"272.00bps\",\n \"PrivateIp\": \"172.0.12.3\",\n \"PublicIp\": \"1.**.***.59\",\n \"Region\": \"ap-shanghai\",\n \"RiskExposure\": 0,\n \"ScanTask\": 0,\n \"Status\": \"1\",\n \"Tag\": [\n {\n \"Name\": \"name1\",\n \"Value\": \"value1\"\n }\n ],\n \"Uin\": \"18146\",\n \"VpcId\": \"vpc-omoo5lv\",\n \"VpcName\": \"vpc-omoo5lv\"\n }\n ],\n \"RegionList\": [\n {\n \"Text\": \"上海\",\n \"Value\": \"ap-shanghai\"\n },\n {\n \"Text\": \"北京\",\n \"Value\": \"ap-beijing\"\n },\n {\n \"Text\": \"广州\",\n \"Value\": \"ap-guangzhou\"\n }\n ],\n \"RequestId\": \"7cf2ba3d-87ad-4691-a374-fd92ec11d9c8\",\n \"TotalCount\": 6,\n \"VpcList\": [\n {\n \"Text\": \"fengqqian3\",\n \"Value\": \"vpc-m819242\"\n },\n {\n \"Text\": \"fengqqian2\",\n \"Value\": \"vpc-fw2dus5f\"\n },\n {\n \"Text\": \"Default-VPC\",\n \"Value\": \"vpc-omoo5lv\"\n }\n ]\n }\n}",
|
120
|
+
"title": "示例"
|
121
121
|
}
|
122
122
|
],
|
123
123
|
"DescribeListenerList": [
|
124
124
|
{
|
125
125
|
"document": "示例1",
|
126
126
|
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeListenerList\n<公共请求参数>\n\n{}",
|
127
|
-
"output": "{\n \"Response\": {\n \"Data\": [\n {\n \"Domain\": \"www.
|
127
|
+
"output": "{\n \"Response\": {\n \"Data\": [\n {\n \"Domain\": \"www.example.tcsip0420.com,www.example.waf0420.com\",\n \"ListenerId\": \"lbl-5n1jiwjo\",\n \"ListenerName\": \"80\",\n \"LoadBalancerDomain\": \"lb-d24ssr-142edaa.sg-tencent.comclb.\",\n \"LoadBalancerId\": \"lb-pflq0j2e\",\n \"LoadBalancerName\": \"lb-642137c1\",\n \"LoadBalancerType\": \"OPEN\",\n \"NumericalVpcId\": 2783729,\n \"Protocol\": \"HTTP\",\n \"Region\": \"gz\",\n \"VPort\": 80,\n \"Vip\": \"1.14.234.167\",\n \"Zone\": \"ap-guangzhou-6\"\n },\n {\n \"Domain\": \"81.71.21.14,,81.71.21.14,,81.71.21.14,,81.71.21.14,,81.71.21.14,,81.71.21.14,,81.71.21.14,,81.71.21.14,\",\n \"ListenerId\": \"lbl-c2tgl6w0\",\n \"ListenerName\": \"web\",\n \"LoadBalancerDomain\": \"lb-d24ssr-142edaa.sg-tencent.comclb.\",\n \"LoadBalancerId\": \"lb-meckpdk0\",\n \"LoadBalancerName\": \"lsy\",\n \"LoadBalancerType\": \"OPEN\",\n \"NumericalVpcId\": 8246908,\n \"Protocol\": \"HTTP\",\n \"Region\": \"gz\",\n \"VPort\": 80,\n \"Vip\": \"81.71.21.14\",\n \"Zone\": \"ap-guangzhou-4\"\n },\n {\n \"Domain\": \"1.15.159.154,,1.15.159.154,,1.15.159.154,,1.15.159.154,,1.15.159.154,,1.15.159.154,,1.15.159.154,,1.15.159.154,\",\n \"ListenerId\": \"lbl-gkydcakh\",\n \"ListenerName\": \"lb-alert\",\n \"LoadBalancerDomain\": \"lb-d24ssr-142edaa.sg-tencent.comclb.\",\n \"LoadBalancerId\": \"lb-bf5sfyqz\",\n \"LoadBalancerName\": \"autot_HoneyPot\",\n \"LoadBalancerType\": \"OPEN\",\n \"NumericalVpcId\": 3888171,\n \"Protocol\": \"HTTP\",\n \"Region\": \"sh\",\n \"VPort\": 8000,\n \"Vip\": \"1.15.159.154\",\n \"Zone\": \"ap-shanghai-2\"\n },\n {\n \"Domain\": \"echo.example.com\",\n \"ListenerId\": \"lbl-mlrg4y76\",\n \"ListenerName\": \"lb-foo\",\n \"LoadBalancerDomain\": \"lb-d24ssr-142edaa.sg-tencent.comclb.\",\n \"LoadBalancerId\": \"lb-pflq0j2e\",\n \"LoadBalancerName\": \"lb-642137c1\",\n \"LoadBalancerType\": \"OPEN\",\n \"NumericalVpcId\": 2783729,\n \"Protocol\": \"HTTP\",\n \"Region\": \"gz\",\n \"VPort\": 8080,\n \"Vip\": \"1.14.234.167\",\n \"Zone\": \"ap-guangzhou-6\"\n }\n ],\n \"RequestId\": \"3f2d43d2-e003-4872-8953-18d080e98c1d\",\n \"Total\": 4\n }\n}",
|
128
128
|
"title": "示例1"
|
129
129
|
}
|
130
130
|
],
|
131
131
|
"DescribeNICAssets": [
|
132
132
|
{
|
133
|
-
"document": "
|
134
|
-
"input": "
|
135
|
-
"output": "{\n \"Response\": {\n \"
|
136
|
-
"title": "
|
133
|
+
"document": "获取网卡列表",
|
134
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNICAssets\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-688033\",\n \"mem-tencent-52d96a4d\"\n ],\n \"Filter\": {\n \"Limit\": 1\n }\n}",
|
135
|
+
"output": "{\n \"Response\": {\n \"AppIdList\": [\n {\n \"Text\": \"2421\",\n \"Value\": \"2421\"\n },\n {\n \"Text\": \"1894\",\n \"Value\": \"1894\"\n }\n ],\n \"AssetTypeList\": [\n {\n \"Text\": \"ENI\",\n \"Value\": \"ENI\"\n }\n ],\n \"Data\": [\n {\n \"AppId\": \"15651\",\n \"AssetId\": \"eni-45xmwr0j\",\n \"AssetName\": \"未命名\",\n \"AssetType\": \"ENI\",\n \"ConfigureRisk\": 0,\n \"CreateTime\": \"2023-11-23 19:58:39\",\n \"ExposedPort\": 0,\n \"ExposedVUL\": 0,\n \"InboundCumulativeFlow\": \"0B\",\n \"InboundPeakBandwidth\": \"0bps\",\n \"IsCore\": 1,\n \"IsNewAsset\": 0,\n \"LastScanTime\": \"2024-10-12 16:33:37\",\n \"NetworkAttack\": 0,\n \"Nick\": \"焦糖小蛋糕\",\n \"OutboundCumulativeFlow\": \"0B\",\n \"OutboundPeakBandwidth\": \"0bps\",\n \"PrivateIp\": \"172.16.0.6\",\n \"PublicIp\": \"1.1.1.1\",\n \"Region\": \"ap-guangzhou\",\n \"ScanTask\": 8,\n \"Tag\": null,\n \"Uin\": \"10446\",\n \"VpcId\": \"vpc-hbe549z5\",\n \"VpcName\": \"league-vpc-2\"\n }\n ],\n \"RegionList\": [\n {\n \"Text\": \"广州\",\n \"Value\": \"ap-guangzhou\"\n },\n {\n \"Text\": \"南京\",\n \"Value\": \"ap-nanjing\"\n },\n {\n \"Text\": \"上海\",\n \"Value\": \"ap-shanghai\"\n }\n ],\n \"RequestId\": \"00369b23-b4da-446f-8d07-7ee691d237a4\",\n \"TotalCount\": 7,\n \"VpcList\": [\n {\n \"Text\": \"league-vpc-2\",\n \"Value\": \"vpc-hdbed9z5\"\n },\n {\n \"Text\": \"vpc-gz-0\",\n \"Value\": \"vpc-63z25m89\"\n }\n ]\n }\n}",
|
136
|
+
"title": "获取网卡列表"
|
137
137
|
}
|
138
138
|
],
|
139
139
|
"DescribeOrganizationUserInfo": [
|
140
140
|
{
|
141
141
|
"document": "查询集团账号用户列表",
|
142
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeOrganizationUserInfo\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"
|
143
|
-
"output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"Data\": [\n {\n \"Uin\": \"
|
142
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeOrganizationUserInfo\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-5b28e2010c18f07a\"\n ],\n \"Filter\": {\n \"Limit\": 10,\n \"Offset\": 0,\n \"Order\": \"SubUserCount\",\n \"By\": \"desc\",\n \"Filters\": [\n {\n \"Name\": \"NickName\",\n \"Values\": [\n \"Andy\"\n ],\n \"OperatorType\": 7\n }\n ]\n },\n \"NotSupportCloud\": true\n}",
|
143
|
+
"output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"Data\": [\n {\n \"Uin\": \"100014592178\",\n \"AppId\": \"1302396000\",\n \"NickName\": \"Andy\",\n \"NodeName\": \"Root\",\n \"CFWProtect\": \"Ultimate\",\n \"WAFProtect\": \"Advanced\",\n \"CWPProtect\": \"Ultimate\",\n \"CSIPProtect\": \"Ultimate\",\n \"Role\": \"admin\",\n \"MemberId\": \"mem-68b8087a65268000\",\n \"JoinType\": \"create\",\n \"AssetCount\": 1235,\n \"RiskCount\": 1599,\n \"AttackCount\": 1839,\n \"SubUserCount\": 11,\n \"Enable\": 1,\n \"QuotaConsumer\": 1,\n \"CloudType\": 0,\n \"PermissionList\": [\n \"readhost\"\n ],\n \"AuthType\": 0,\n \"SyncFrequency\": 0,\n \"IsExpired\": false,\n \"TcMemberType\": 0,\n \"JoinTypeInfo\": \"sub account\"\n }\n ],\n \"JoinTypeLst\": [\n {\n \"Text\": \"集团账号\",\n \"Value\": \"0\"\n }\n ],\n \"RequestId\": \"f9184c15-9721-456d-8ca0-4263967b5ead\"\n }\n}",
|
144
144
|
"title": "查询集团账号用户列表"
|
145
145
|
}
|
146
146
|
],
|
147
147
|
"DescribePublicIpAssets": [
|
148
148
|
{
|
149
149
|
"document": "",
|
150
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribePublicIpAssets\n<公共请求参数>\n\n{\n \"
|
151
|
-
"output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AssetId\": \"
|
150
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribePublicIpAssets\n<公共请求参数>\n\n{\n \"Filter\": {\n \"Filters\": [\n {\n \"Name\": \"CFWStatus\",\n \"Values\": [\n \"1\"\n ],\n \"OperatorType\": 7\n },\n {\n \"Name\": \"TimeRange\",\n \"Values\": [\n \"2\"\n ],\n \"OperatorType\": 7\n }\n ],\n \"Limit\": 10,\n \"Offset\": 20,\n \"Order\": \"desc\",\n \"By\": \"AssetCreateTime\"\n },\n \"MemberId\": [\n \"mem-62509c52c13c9201\"\n ]\n}",
|
151
|
+
"output": "{\n \"Response\": {\n \"AppIdList\": [\n {\n \"Text\": \"1302396212401\",\n \"Value\": \"1302396212401\"\n }\n ],\n \"AssetLocationList\": [\n {\n \"Text\": \"腾讯云\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"其他\",\n \"Value\": \"2\"\n }\n ],\n \"AssetTypeList\": [\n {\n \"Text\": \"非腾讯云主机\",\n \"Value\": \"OTHER\"\n },\n {\n \"Text\": \"CVM\",\n \"Value\": \"CVM\"\n },\n {\n \"Text\": \"HAVIP\",\n \"Value\": \"HAVIP\"\n },\n {\n \"Text\": \"CLB\",\n \"Value\": \"CLB\"\n },\n {\n \"Text\": \"未知\",\n \"Value\": \"unknown\"\n }\n ],\n \"Data\": [\n {\n \"AssetId\": \"ins-mlyxc7ds\",\n \"AssetName\": \"cluster-node-10.26\",\n \"PublicIp\": \"106.52.96.220\",\n \"PublicIpType\": 1,\n \"Region\": \"ap-guangzhou\",\n \"AssetType\": \"CVM\",\n \"InBandwidth\": \"0bps\",\n \"OutBandwidth\": \"0bps\",\n \"InFlow\": \"0B\",\n \"OutFlow\": \"0B\",\n \"Access\": 0,\n \"Attack\": 0,\n \"PortRisk\": 0,\n \"VulnerabilityRisk\": 2,\n \"WeakPassword\": 0,\n \"WebContentRisk\": 0,\n \"RiskExposure\": 0,\n \"CFWStatus\": 1,\n \"AssetCreateTime\": \"2023-10-26 15:56:48\",\n \"VpcId\": \"vpc-ommo5hlv\",\n \"VpcName\": \"Default-VPC\",\n \"AppId\": 1302396212401,\n \"Uin\": \"10001459211278\",\n \"NickName\": \"生生乌龙\",\n \"IsCore\": 2,\n \"IsCloud\": 1,\n \"Intercept\": 0,\n \"LastScanTime\": \"2024-10-30 05:02:29\",\n \"ConfigurationRisk\": 3,\n \"ScanTask\": 31,\n \"Tag\": [\n {\n \"Name\": \"name1\",\n \"Value\": \"value1\"\n }\n ],\n \"AddressId\": \"eip-26c8hjt6\",\n \"MemberId\": \"mem-625c522c0913c901\",\n \"IsNewAsset\": 0,\n \"VerifyStatus\": 0\n },\n {\n \"AssetId\": \"asset-k2vqoh1\",\n \"AssetName\": \"asset-k2vqoh1\",\n \"PublicIp\": \"43.138.240.106\",\n \"PublicIpType\": 0,\n \"Region\": \"other\",\n \"AssetType\": \"未知\",\n \"InBandwidth\": \"0bps\",\n \"OutBandwidth\": \"0bps\",\n \"InFlow\": \"0B\",\n \"OutFlow\": \"0B\",\n \"Access\": 0,\n \"Attack\": 0,\n \"PortRisk\": 0,\n \"VulnerabilityRisk\": 0,\n \"WeakPassword\": 0,\n \"WebContentRisk\": 0,\n \"RiskExposure\": 0,\n \"CFWStatus\": 1,\n \"AssetCreateTime\": \"2023-10-11 17:23:31\",\n \"VpcId\": \"asset-k2vqoh1\",\n \"VpcName\": \"asset-k2vqoh1\",\n \"AppId\": 1302396212401,\n \"Uin\": \"10001459211278\",\n \"NickName\": \"生生乌龙\",\n \"IsCore\": 2,\n \"IsCloud\": 2,\n \"Intercept\": 0,\n \"LastScanTime\": \"2024-10-30 05:02:29\",\n \"ConfigurationRisk\": 0,\n \"ScanTask\": 31,\n \"Tag\": [\n {\n \"Name\": \"name1\",\n \"Value\": \"value1\"\n }\n ],\n \"AddressId\": \"asset-k2vqoh1\",\n \"MemberId\": \"mem-625c522c0913c901\",\n \"IsNewAsset\": 0,\n \"VerifyStatus\": 0\n },\n {\n \"AssetId\": \"asset-k2vqoh1\",\n \"AssetName\": \"asset-k2vqoh1\",\n \"PublicIp\": \"39.108.14.10\",\n \"PublicIpType\": 0,\n \"Region\": \"other\",\n \"AssetType\": \"未知\",\n \"InBandwidth\": \"0bps\",\n \"OutBandwidth\": \"0bps\",\n \"InFlow\": \"0B\",\n \"OutFlow\": \"0B\",\n \"Access\": 0,\n \"Attack\": 0,\n \"PortRisk\": 0,\n \"VulnerabilityRisk\": 0,\n \"WeakPassword\": 0,\n \"WebContentRisk\": 0,\n \"RiskExposure\": 0,\n \"CFWStatus\": 1,\n \"AssetCreateTime\": \"2023-09-06 11:03:28\",\n \"VpcId\": \"asset-k2vqoh1\",\n \"VpcName\": \"asset-k2vqoh1\",\n \"AppId\": 1302396212401,\n \"Uin\": \"10001459211278\",\n \"NickName\": \"生生乌龙\",\n \"IsCore\": 2,\n \"IsCloud\": 3,\n \"Intercept\": 0,\n \"LastScanTime\": \"2024-10-30 05:02:29\",\n \"ConfigurationRisk\": 0,\n \"ScanTask\": 0,\n \"Tag\": [\n {\n \"Name\": \"name1\",\n \"Value\": \"value1\"\n }\n ],\n \"AddressId\": \"asset-k2vqoh1\",\n \"MemberId\": \"mem-625c522c0913c901\",\n \"IsNewAsset\": 0,\n \"VerifyStatus\": 0\n },\n {\n \"AssetId\": \"havip-8h56wnzs\",\n \"AssetName\": \"NAT安全网关HaVip_请勿删改\",\n \"PublicIp\": \"114.132.124.142\",\n \"PublicIpType\": 2,\n \"Region\": \"ap-guangzhou\",\n \"AssetType\": \"HAVIP\",\n \"InBandwidth\": \"0bps\",\n \"OutBandwidth\": \"0bps\",\n \"InFlow\": \"0B\",\n \"OutFlow\": \"0B\",\n \"Access\": 0,\n \"Attack\": 0,\n \"PortRisk\": 0,\n \"VulnerabilityRisk\": 0,\n \"WeakPassword\": 0,\n \"WebContentRisk\": 0,\n \"RiskExposure\": 0,\n \"CFWStatus\": 1,\n \"AssetCreateTime\": \"2023-06-02 10:16:33\",\n \"VpcId\": \"asset-k2vqoh1\",\n \"VpcName\": \"asset-k2vqoh1\",\n \"AppId\": 1302396212401,\n \"Uin\": \"10001459211278\",\n \"NickName\": \"生生乌龙\",\n \"IsCore\": 1,\n \"IsCloud\": 1,\n \"Intercept\": 0,\n \"LastScanTime\": \"2024-10-30 05:02:29\",\n \"ConfigurationRisk\": 0,\n \"ScanTask\": 35,\n \"Tag\": [\n {\n \"Name\": \"name1\",\n \"Value\": \"value1\"\n }\n ],\n \"AddressId\": \"eip-egkkeona\",\n \"MemberId\": \"mem-625c522c0913c901\",\n \"IsNewAsset\": 0,\n \"VerifyStatus\": 0\n }\n ],\n \"DefenseStatusList\": [\n {\n \"Text\": \"未防护\",\n \"Value\": \"1\"\n }\n ],\n \"IpTypeList\": [\n {\n \"Text\": \"公网IP\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"弹性IP\",\n \"Value\": \"2\"\n },\n {\n \"Text\": \"未知\",\n \"Value\": \"0\"\n }\n ],\n \"RegionList\": [\n {\n \"Text\": \"广州\",\n \"Value\": \"ap-guangzhou\"\n },\n {\n \"Text\": \"成都\",\n \"Value\": \"ap-chengdu\"\n },\n {\n \"Text\": \"上海\",\n \"Value\": \"ap-shanghai\"\n },\n {\n \"Text\": \"未知\",\n \"Value\": \"other\"\n },\n {\n \"Text\": \"硅谷\",\n \"Value\": \"na-siliconvalley\"\n }\n ],\n \"RequestId\": \"27eb54eb-f654-4bae-bcce-278568d140bb\",\n \"Total\": 4\n }\n}",
|
152
152
|
"title": "资产查询"
|
153
153
|
}
|
154
154
|
],
|
155
155
|
"DescribeRiskCenterAssetViewCFGRiskList": [
|
156
156
|
{
|
157
|
-
"document": "
|
158
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskCenterAssetViewCFGRiskList\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"
|
159
|
-
"output": "{\n \"Response\": {\n \"
|
160
|
-
"title": "
|
157
|
+
"document": "获取资产视角的配置风险列表",
|
158
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskCenterAssetViewCFGRiskList\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-68b8087a65268000\"\n ],\n \"Filter\": {\n \"Limit\": 1,\n \"Offset\": 0\n }\n}",
|
159
|
+
"output": "{\n \"Response\": {\n \"CFGNameLists\": [\n {\n \"Text\": \"检查\\\"拒绝作为批处理作业登录\\\"策略是否包含Guests\",\n \"Value\": \"检查\\\"拒绝作为批处理作业登录\\\"策略是否包含Guests\"\n },\n {\n \"Text\": \"应启用安全审计功能,审计覆盖到每个用户,对重要的用户行为和重要安全事件进行审计\",\n \"Value\": \"应启用安全审计功能,审计覆盖到每个用户,对重要的用户行为和重要安全事件进行审计\"\n },\n {\n \"Text\": \"检查\\\"账号锁定阈值\\\"是否大于0并且小于等于10\",\n \"Value\": \"检查\\\"账号锁定阈值\\\"是否大于0并且小于等于10\"\n },\n {\n \"Text\": \"检查\\\"拒绝通过远程桌面服务登录\\\"策略是否设置\",\n \"Value\": \"检查\\\"拒绝通过远程桌面服务登录\\\"策略是否设置\"\n },\n {\n \"Text\": \"禁止SSH空密码用户登录\",\n \"Value\": \"禁止SSH空密码用户登录\"\n }\n ],\n \"CheckTypeLists\": [\n {\n \"Text\": \"CentOS基线检查\",\n \"Value\": \"CentOS基线检查\"\n },\n {\n \"Text\": \"国际标准-CentOS 7安全基线检查Level1\",\n \"Value\": \"国际标准-CentOS 7安全基线检查Level1\"\n },\n {\n \"Text\": \"账号安全\",\n \"Value\": \"账号安全\"\n },\n {\n \"Text\": \"Docker Daemon 2375 管理端口开启\",\n \"Value\": \"Docker Daemon 2375 管理端口开启\"\n },\n {\n \"Text\": \"国际标准-Windows 2012 R2安全基线检查\",\n \"Value\": \"国际标准-Windows 2012 R2安全基线检查\"\n },\n {\n \"Text\": \"国际标准-CentOS 7安全基线检查Level2\",\n \"Value\": \"国际标准-CentOS 7安全基线检查Level2\"\n },\n {\n \"Text\": \"等保三级-Windows 2012 R2安全基线检查\",\n \"Value\": \"等保三级-Windows 2012 R2安全基线检查\"\n },\n {\n \"Text\": \"网络安全\",\n \"Value\": \"网络安全\"\n },\n {\n \"Text\": \"数据安全\",\n \"Value\": \"数据安全\"\n },\n {\n \"Text\": \"等保三级-CentOS 7安全基线检查\",\n \"Value\": \"等保三级-CentOS 7安全基线检查\"\n },\n {\n \"Text\": \"基础安全\",\n \"Value\": \"基础安全\"\n },\n {\n \"Text\": \"Nginx安全基线检查\",\n \"Value\": \"Nginx安全基线检查\"\n },\n {\n \"Text\": \"等保二级-CentOS 7安全基线检查\",\n \"Value\": \"等保二级-CentOS 7安全基线检查\"\n },\n {\n \"Text\": \"Linux安全基线检查\",\n \"Value\": \"Linux安全基线检查\"\n }\n ],\n \"Data\": [\n {\n \"AffectAsset\": \"1*.**.132.***\",\n \"AppId\": \"1302133215\",\n \"CFGDescribe\": \"为了实现集群管理,Docker 提供了远程管理接口。Docker Daemon 作为守护进程,运行在后台,可以执行发送到管理接口上的 Docker 命令。正是因为错误的使用了 Docker 远端 2375 接口,引起安全漏洞。\",\n \"CFGFix\": \"关闭 2375 端口,使用加密的远程管理端口 2376。\\n如果已通过安全组或者防火墙进行该端口的访问IP限制,请忽略。\",\n \"CFGHelpURL\": \"url.***.com\",\n \"CFGName\": \"Docker Daemon 2375 管理端口开启\",\n \"CFGSTD\": \"none\",\n \"CheckType\": \"Docker Daemon 2375 管理端口开启\",\n \"ClbId\": \"clb-***\",\n \"FirstTime\": \"2024-09-18 10:30:14\",\n \"From\": \"主机检测\",\n \"Id\": \"067691ed696bf9***c7076e9a126b\",\n \"Index\": \"d90439359e*****a74ee616d226a713f\",\n \"InstanceId\": \"ins-elxffb4w\",\n \"InstanceName\": \"安全中心x主机自动化机器\",\n \"InstanceType\": \"CVM\",\n \"Level\": \"high\",\n \"Nick\": \"声声乌龙\",\n \"RecentTime\": \"2024-10-25 11:36:49\",\n \"Status\": 0,\n \"Uin\": \"100011122178\"\n }\n ],\n \"FromLists\": [\n {\n \"Text\": \"云安全中心\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"主机检测\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"容器检测\",\n \"Value\": \"5\"\n }\n ],\n \"InstanceTypeLists\": [\n {\n \"Text\": \"CVM\",\n \"Value\": \"CVM\"\n },\n {\n \"Text\": \"其他\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"子账号\",\n \"Value\": \"2\"\n },\n {\n \"Text\": \"协作者\",\n \"Value\": \"4\"\n },\n {\n \"Text\": \"CDB\",\n \"Value\": \"CDB\"\n },\n {\n \"Text\": \"CBS\",\n \"Value\": \"CBS\"\n },\n {\n \"Text\": \"ACL\",\n \"Value\": \"ACL\"\n },\n {\n \"Text\": \"COS\",\n \"Value\": \"COS\"\n },\n {\n \"Text\": \"POSTGRES\",\n \"Value\": \"POSTGRES\"\n },\n {\n \"Text\": \"LISTENER\",\n \"Value\": \"LISTENER\"\n },\n {\n \"Text\": \"MARIADB\",\n \"Value\": \"MARIADB\"\n },\n {\n \"Text\": \"SECURITYGROUP\",\n \"Value\": \"SECURITYGROUP\"\n },\n {\n \"Text\": \"TKECLUSTER\",\n \"Value\": \"TKECLUSTER\"\n },\n {\n \"Text\": \"APIGATEWAY\",\n \"Value\": \"APIGATEWAY\"\n },\n {\n \"Text\": \"SUBNET\",\n \"Value\": \"SUBNET\"\n },\n {\n \"Text\": \"CLB\",\n \"Value\": \"CLB\"\n }\n ],\n \"LevelLists\": [\n {\n \"Text\": \"严重\",\n \"Value\": \"extreme\"\n },\n {\n \"Text\": \"高危\",\n \"Value\": \"high\"\n },\n {\n \"Text\": \"中危\",\n \"Value\": \"middle\"\n },\n {\n \"Text\": \"低危\",\n \"Value\": \"low\"\n },\n {\n \"Text\": \"提示\",\n \"Value\": \"info\"\n }\n ],\n \"RequestId\": \"5effc83e-cef5-4fa7-ab35-8a97cf9b9f12\",\n \"StatusLists\": [\n {\n \"Text\": \"未处理\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"已处置\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"已忽略\",\n \"Value\": \"2\"\n },\n {\n \"Text\": \"已封禁\",\n \"Value\": \"3\"\n }\n ],\n \"TotalCount\": 746\n }\n}",
|
160
|
+
"title": "获取资产视角的配置风险列表"
|
161
161
|
}
|
162
162
|
],
|
163
163
|
"DescribeRiskCenterAssetViewPortRiskList": [
|
164
164
|
{
|
165
165
|
"document": "获取资产视角的端口风险列表",
|
166
166
|
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskCenterAssetViewPortRiskList\n<公共请求参数>\n\n{\n \"Filter\": {\n \"Limit\": 1\n }\n}",
|
167
|
-
"output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AffectAsset\": \"1.1.1.1\",\n \"AppId\": \"
|
167
|
+
"output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AffectAsset\": \"1.1.1.1\",\n \"AppId\": \"23445189\",\n \"Component\": \"OpenSSH\",\n \"FirstTime\": \"2024-04-19 16:14:02\",\n \"From\": \"云安全中心\",\n \"Id\": \"b6d76******\",\n \"Index\": \"1654******\",\n \"InstanceId\": \"ins-*****\",\n \"InstanceName\": \"cvm1\",\n \"InstanceType\": \"CVM\",\n \"Level\": \"middle\",\n \"Nick\": \"nickname\",\n \"Port\": 22,\n \"Protocol\": \"tcp\",\n \"RecentTime\": \"2024-06-07 14:22:58\",\n \"Service\": \"ssh\",\n \"Status\": 3,\n \"Suggestion\": 1,\n \"Uin\": \"22446133890\"\n }\n ],\n \"FromLists\": [\n {\n \"Text\": \"云安全中心\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"流量感知\",\n \"Value\": \"3\"\n }\n ],\n \"InstanceTypeLists\": [\n {\n \"Text\": \"CLB\",\n \"Value\": \"CLB\"\n },\n {\n \"Text\": \"CVM\",\n \"Value\": \"CVM\"\n },\n {\n \"Text\": \"EIP\",\n \"Value\": \"EIP\"\n },\n {\n \"Text\": \"VPN\",\n \"Value\": \"VPN\"\n },\n {\n \"Text\": \"NAT\",\n \"Value\": \"NAT\"\n },\n {\n \"Text\": \"OTHER\",\n \"Value\": \"OTHER\"\n },\n {\n \"Text\": \"LH\",\n \"Value\": \"LH\"\n },\n {\n \"Text\": \"HAVIP\",\n \"Value\": \"HAVIP\"\n },\n {\n \"Text\": \"NATFW\",\n \"Value\": \"NATFW\"\n },\n {\n \"Text\": \"未知\",\n \"Value\": \"unknown\"\n },\n {\n \"Text\": \"PROBE\",\n \"Value\": \"PROBE\"\n },\n {\n \"Text\": \"TSE\",\n \"Value\": \"TSE\"\n },\n {\n \"Text\": \"EC2\",\n \"Value\": \"EC2\"\n }\n ],\n \"LevelLists\": [\n {\n \"Text\": \"严重\",\n \"Value\": \"extreme\"\n },\n {\n \"Text\": \"高危\",\n \"Value\": \"high\"\n },\n {\n \"Text\": \"中危\",\n \"Value\": \"middle\"\n },\n {\n \"Text\": \"低危\",\n \"Value\": \"low\"\n },\n {\n \"Text\": \"提示\",\n \"Value\": \"info\"\n }\n ],\n \"RequestId\": \"c95a495b-e2cb-4449-b101-1848c421aadd\",\n \"StatusLists\": [\n {\n \"Text\": \"已封禁\",\n \"Value\": \"3\"\n },\n {\n \"Text\": \"未处理\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"标记已处置\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"已忽略\",\n \"Value\": \"2\"\n }\n ],\n \"SuggestionLists\": [\n {\n \"Text\": \"保持现状\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"限制访问\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"封禁端口\",\n \"Value\": \"2\"\n }\n ],\n \"TotalCount\": 42\n }\n}",
|
168
168
|
"title": "获取资产视角的端口风险列表"
|
169
169
|
}
|
170
170
|
],
|
171
171
|
"DescribeRiskCenterAssetViewVULRiskList": [
|
172
172
|
{
|
173
|
-
"document": "
|
174
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskCenterAssetViewVULRiskList\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"
|
175
|
-
"output": "{\n \"Response\": {\n \"
|
176
|
-
"title": "
|
173
|
+
"document": "获取资产视角的漏洞风险列表",
|
174
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskCenterAssetViewVULRiskList\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-68b8087a65268000\"\n ],\n \"Filter\": {\n \"Limit\": 1,\n \"Offset\": 0\n }\n}",
|
175
|
+
"output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AffectAsset\": \"ins-9527\",\n \"AppId\": \"1302111215\",\n \"AppName\": \"libcurl-minimal,curl\",\n \"AppVersion\": \"7.61.1-18.el8\",\n \"CVE\": \"CVE-2023-27536\",\n \"CWPVersion\": 0,\n \"Component\": \"curl,libcurl-minimal\",\n \"Describe\": \"describe info\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2024-08-29 00:10:36\",\n \"Fix\": \"建议关注厂商公告或升级到最新版本。\\n建议您更新当前系统或软件至最新版,完成漏洞的修复。\",\n \"From\": \"容器检测\",\n \"Id\": \"11fc83d411bad6***71e4f9ef862dc\",\n \"Index\": \"5f31127***99f4ae379c0880d43c285\",\n \"InstanceId\": \"sha256:5d***dc976460b***c8a1ad043720b***fc16c52c45d4847e53fadb6\",\n \"InstanceName\": \"centos\",\n \"InstanceType\": \"Local\",\n \"InstanceUUID\": \"3cbf2d8f-c40a-452a-92ec-140f9b2d29a2\",\n \"IsSupportDetect\": false,\n \"IsSupportRepair\": false,\n \"Level\": \"extreme\",\n \"Nick\": \"声声乌龙\",\n \"POCId\": \"pcmgr-407***\",\n \"Payload\": \"7.61.1-18.el8\",\n \"Port\": \"80\",\n \"RecentTime\": \"2024-10-30 11:20:39\",\n \"References\": \"https://hackerone.com/reports/1895135\",\n \"Service\": \"service\",\n \"Status\": 0,\n \"Uin\": \"10001122178\",\n \"VULName\": \"Curl 身份认证绕过漏洞(CVE-2023-27536)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"http://url\"\n }\n ],\n \"FromLists\": [\n {\n \"Text\": \"云安全中心\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"主机检测\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"容器检测\",\n \"Value\": \"5\"\n }\n ],\n \"InstanceTypeLists\": [\n {\n \"Text\": \"托管集群\",\n \"Value\": \"managed_cluster\"\n },\n {\n \"Text\": \"CVM\",\n \"Value\": \"CVM\"\n },\n {\n \"Text\": \"本地镜像\",\n \"Value\": \"Local\"\n },\n {\n \"Text\": \"CLB\",\n \"Value\": \"CLB\"\n }\n ],\n \"LevelLists\": [\n {\n \"Text\": \"严重\",\n \"Value\": \"extreme\"\n },\n {\n \"Text\": \"高危\",\n \"Value\": \"high\"\n },\n {\n \"Text\": \"中危\",\n \"Value\": \"middle\"\n },\n {\n \"Text\": \"低危\",\n \"Value\": \"low\"\n },\n {\n \"Text\": \"提示\",\n \"Value\": \"info\"\n }\n ],\n \"RequestId\": \"efdf251a-7f1a-4b9b-8e61-a19fc018ffa9\",\n \"StatusLists\": [\n {\n \"Text\": \"未处理\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"标记已处置\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"已忽略\",\n \"Value\": \"2\"\n },\n {\n \"Text\": \"已修复\",\n \"Value\": \"3\"\n }\n ],\n \"TotalCount\": 532,\n \"VULTypeLists\": [\n {\n \"Text\": \"信息泄漏\",\n \"Value\": \"信息泄漏\"\n },\n {\n \"Text\": \"处理逻辑错误\",\n \"Value\": \"处理逻辑错误\"\n },\n {\n \"Text\": \"其他\",\n \"Value\": \"其他\"\n },\n {\n \"Text\": \"路径遍历\",\n \"Value\": \"路径遍历\"\n },\n {\n \"Text\": \"授权问题\",\n \"Value\": \"授权问题\"\n },\n {\n \"Text\": \"注入漏洞\",\n \"Value\": \"注入漏洞\"\n },\n {\n \"Text\": \"代码注入\",\n \"Value\": \"代码注入\"\n },\n {\n \"Text\": \"缓冲区溢出\",\n \"Value\": \"缓冲区溢出\"\n },\n {\n \"Text\": \"配置错误\",\n \"Value\": \"配置错误\"\n },\n {\n \"Text\": \"加密问题\",\n \"Value\": \"加密问题\"\n },\n {\n \"Text\": \"跨站脚本\",\n \"Value\": \"跨站脚本\"\n },\n {\n \"Text\": \"命令注入\",\n \"Value\": \"命令注入\"\n }\n ]\n }\n}",
|
176
|
+
"title": "获取资产视角的漏洞风险列表"
|
177
177
|
}
|
178
178
|
],
|
179
179
|
"DescribeRiskCenterAssetViewWeakPasswordRiskList": [
|
180
180
|
{
|
181
|
-
"document": "
|
182
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskCenterAssetViewWeakPasswordRiskList\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"
|
183
|
-
"output": "{\n \"Response\": {\n \"
|
184
|
-
"title": "
|
181
|
+
"document": "获取资产视角的弱口令风险列表",
|
182
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskCenterAssetViewWeakPasswordRiskList\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-68b8087a65268000\"\n ],\n \"Filter\": {\n \"Limit\": 1,\n \"Offset\": 0\n }\n}",
|
183
|
+
"output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AffectAsset\": \"132.**.176.**\",\n \"AppId\": \"1302396215\",\n \"Component\": \"nginx\",\n \"FirstTime\": \"2024-10-28 06:05:21\",\n \"Fix\": \"修改对应用户的密码为足够强度的密码。\",\n \"From\": \"主机检测\",\n \"Id\": \"0bf10**a9d58***6ec5c7bfee04b\",\n \"Index\": \"cb07e221846d***4c42bb40***b0c37\",\n \"InstanceId\": \"ins-p7x4hn7p\",\n \"InstanceName\": \"cfw自动化\",\n \"InstanceType\": \"CVM\",\n \"Level\": \"high\",\n \"Nick\": \"声声乌龙\",\n \"PasswordType\": \"Linux系统弱口令检测\",\n \"Payload\": \"系统中存在弱口令: {\\\"hack\\\": \\\"pass******\\\"}\",\n \"RecentTime\": \"2024-10-30 06:03:26\",\n \"Service\": \"service\",\n \"Status\": 0,\n \"Uin\": \"100014592178\",\n \"VULType\": \"Linux系统弱口令检测\",\n \"VULURL\": \"http://url\"\n }\n ],\n \"FromLists\": [\n {\n \"Text\": \"主机检测\",\n \"Value\": \"1\"\n }\n ],\n \"InstanceTypeLists\": [\n {\n \"Text\": \"CVM\",\n \"Value\": \"CVM\"\n }\n ],\n \"LevelLists\": [\n {\n \"Text\": \"严重\",\n \"Value\": \"extreme\"\n },\n {\n \"Text\": \"高危\",\n \"Value\": \"high\"\n },\n {\n \"Text\": \"中危\",\n \"Value\": \"middle\"\n },\n {\n \"Text\": \"低危\",\n \"Value\": \"low\"\n },\n {\n \"Text\": \"提示\",\n \"Value\": \"info\"\n }\n ],\n \"PasswordTypeLists\": [\n {\n \"Text\": \"Linux系统弱口令检测\",\n \"Value\": \"Linux系统弱口令检测\"\n }\n ],\n \"RequestId\": \"c1696722-47c5-48d5-919d-ecdba8414b23\",\n \"StatusLists\": [\n {\n \"Text\": \"未处理\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"已处置\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"已忽略\",\n \"Value\": \"2\"\n },\n {\n \"Text\": \"已封禁\",\n \"Value\": \"3\"\n }\n ],\n \"TotalCount\": 1\n }\n}",
|
184
|
+
"title": "获取资产视角的弱口令风险列表"
|
185
185
|
}
|
186
186
|
],
|
187
187
|
"DescribeRiskCenterPortViewPortRiskList": [
|
188
188
|
{
|
189
|
-
"document": "
|
190
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskCenterPortViewPortRiskList\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"
|
191
|
-
"output": "{\n \"Response\": {\n \"
|
192
|
-
"title": "
|
189
|
+
"document": "获取端口视角的端口风险列表",
|
190
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskCenterPortViewPortRiskList\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-68b8087a65268000\",\n \"mem-tencent-522badef8ad96a4d\"\n ],\n \"Filter\": {\n \"Limit\": 1,\n \"Offset\": 0\n }\n}",
|
191
|
+
"output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AffectAssetCount\": \"2\",\n \"AppId\": \"188651\",\n \"Component\": \"web\",\n \"FirstTime\": \"2024-07-07 12:05:29\",\n \"From\": \"云安全中心\",\n \"Id\": \"13f3cf8c53147c4183e6910\",\n \"Index\": \"13f3cf8c847c4183e6910\",\n \"Level\": \"middle\",\n \"Nick\": \"蛋糕\",\n \"NoHandleCount\": 1,\n \"Port\": 443,\n \"Protocol\": \"tcp\",\n \"RecentTime\": \"2024-08-13 11:21:02\",\n \"Service\": \"https,unknown\",\n \"Suggestion\": 1,\n \"Uin\": \"10088646\"\n }\n ],\n \"FromLists\": [\n {\n \"Text\": \"云安全中心\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"流量感知\",\n \"Value\": \"3\"\n }\n ],\n \"LevelLists\": [\n {\n \"Text\": \"严重\",\n \"Value\": \"extreme\"\n },\n {\n \"Text\": \"高危\",\n \"Value\": \"high\"\n },\n {\n \"Text\": \"中危\",\n \"Value\": \"middle\"\n },\n {\n \"Text\": \"低危\",\n \"Value\": \"low\"\n },\n {\n \"Text\": \"提示\",\n \"Value\": \"info\"\n }\n ],\n \"RequestId\": \"13ed0f9d-5052-431d-b789-75bdf1e390bc\",\n \"SuggestionLists\": [\n {\n \"Text\": \"保持现状\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"限制访问\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"封禁端口\",\n \"Value\": \"2\"\n }\n ],\n \"TotalCount\": 3\n }\n}",
|
192
|
+
"title": "获取端口视角的端口风险列表"
|
193
193
|
}
|
194
194
|
],
|
195
195
|
"DescribeRiskCenterServerRiskList": [
|
196
196
|
{
|
197
197
|
"document": "获取风险服务列表",
|
198
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskCenterServerRiskList\n<公共请求参数>\n\n{\n \"
|
199
|
-
"output": "{\n \"Response\": {\n \"
|
198
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskCenterServerRiskList\n<公共请求参数>\n\n{\n \"Filter\": {\n \"Limit\": 1\n }\n}",
|
199
|
+
"output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AffectAsset\": \"81.**.38.139\",\n \"AppId\": \"1300448058\",\n \"Component\": \"Nginx,web\",\n \"FirstTime\": \"2024-02-18 14:56:48\",\n \"Id\": \"420e19687d33478479bf700459191135\",\n \"Index\": \"15888fd9c1ef73436cc95f04aa7b1d02\",\n \"InstanceId\": \"ins-17ye5f**\",\n \"InstanceName\": \"name\",\n \"InstanceType\": \"CVM\",\n \"Level\": \"info\",\n \"Nick\": \"天空***\",\n \"Port\": 80,\n \"Protocol\": \"tcp\",\n \"RecentTime\": \"2024-10-23 20:09:18\",\n \"RiskDetails\": \"detail info\",\n \"RiskList\": [\n {\n \"Title\": \"未授权访问\",\n \"Body\": \"如果未受管理员授权,可能会被未经授权的人登录和访问\"\n },\n {\n \"Title\": \"服务器被攻击\",\n \"Body\": \" WebLogic 可能会被攻击者利用,最终导致整个服务器被攻击\"\n }\n ],\n \"Service\": \"Nginx,web\",\n \"ServiceSnapshot\": \"https://csip-url2pic-1300616671.cos.ap-guangzhou.myqcloud.com/default/picture.png\",\n \"ServiceTag\": \"Page for the Nginx HTTP Server on TencentOS Linux\",\n \"Status\": 0,\n \"StatusCode\": \"200\",\n \"Suggestion\": \"suggestion\",\n \"SuggestionList\": [\n {\n \"Title\": \"禁用未授权访问\",\n \"Body\": \"应禁止 WebLogic 未授权的访问,通常可以通过固定的 IP 地址或者域名来做到\"\n },\n {\n \"Title\": \"更新 WebLogic\",\n \"Body\": \"WebLogic 应及时更新到最新的版本,来避免存在的漏洞被攻击者利用\"\n },\n {\n \"Title\": \"定期审计\",\n \"Body\": \"定期审计 WebLogic 的日志,可以及时发现不正常的访问行为\"\n }\n ],\n \"Uin\": \"100011616646\",\n \"Url\": \"http://81.**.38.**:80\"\n }\n ],\n \"InstanceTypeLists\": [\n {\n \"Text\": \"HAVIP\",\n \"Value\": \"HAVIP\"\n },\n {\n \"Text\": \"CVM\",\n \"Value\": \"CVM\"\n }\n ],\n \"RequestId\": \"d0ae0a47-b4b9-4c55-b493-c2ffeac9b355\",\n \"TotalCount\": 11\n }\n}",
|
200
200
|
"title": "获取风险服务列表"
|
201
201
|
}
|
202
202
|
],
|
203
203
|
"DescribeRiskCenterVULViewVULRiskList": [
|
204
204
|
{
|
205
205
|
"document": "获取漏洞视角的漏洞风险列表",
|
206
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskCenterVULViewVULRiskList\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"
|
207
|
-
"output": "{\n \"Response\": {\n \"
|
206
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskCenterVULViewVULRiskList\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-68b8087a65268000\"\n ],\n \"Filter\": {\n \"Limit\": 1,\n \"Offset\": 0\n }\n}",
|
207
|
+
"output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AffectAssetCount\": 1,\n \"AppId\": \"1315\",\n \"AppName\": \"perl\",\n \"AppVersion\": \"5.20.2-3+deb8u6\",\n \"CVE\": \"CVE-2017-12883\",\n \"Component\": \"perl\",\n \"Describe\": \"describe info\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2024-09-12 14:50:06\",\n \"Fix\": \"升级到最新无漏洞版本\\n建议您更新当前系统或软件至最新版,完成漏洞的修复。\",\n \"From\": \"容器检测\",\n \"Id\": \"0468eaa3505cf5ae9889a052\",\n \"Index\": \"0468ea5ae551fb98659a052\",\n \"Level\": \"extreme\",\n \"Nick\": \"声声乌龙\",\n \"NoHandleCount\": 1,\n \"Payload\": \"5.20.2-3+deb8u6\",\n \"Port\": \"80\",\n \"RecentTime\": \"2024-10-30 11:20:38\",\n \"References\": \"http://mirror.cucumberlinux.com/cucumber/cucumber-1.0/source/lang-base/perl/patches/CVE-2017-12883.patch\",\n \"Uin\": \"100178\",\n \"VULName\": \"PERL regular expression解析器缓冲区错误漏洞(CVE-2017-12883)\",\n \"VULType\": \"缓冲区溢出\",\n \"VULURL\": \"/usr/bin\"\n }\n ],\n \"FromLists\": [\n {\n \"Text\": \"云安全中心\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"主机检测\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"容器检测\",\n \"Value\": \"5\"\n }\n ],\n \"LevelLists\": [\n {\n \"Text\": \"中危\",\n \"Value\": \"middle\"\n },\n {\n \"Text\": \"低危\",\n \"Value\": \"low\"\n },\n {\n \"Text\": \"提示\",\n \"Value\": \"info\"\n },\n {\n \"Text\": \"严重\",\n \"Value\": \"extreme\"\n },\n {\n \"Text\": \"高危\",\n \"Value\": \"high\"\n }\n ],\n \"RequestId\": \"848fbdea-ba54-4f46-aaaa-7f70f823b977\",\n \"TotalCount\": 460,\n \"VULTypeLists\": [\n {\n \"Text\": \"信息泄漏\",\n \"Value\": \"信息泄漏\"\n },\n {\n \"Text\": \"处理逻辑错误\",\n \"Value\": \"处理逻辑错误\"\n },\n {\n \"Text\": \"其他\",\n \"Value\": \"其他\"\n },\n {\n \"Text\": \"路径遍历\",\n \"Value\": \"路径遍历\"\n },\n {\n \"Text\": \"授权问题\",\n \"Value\": \"授权问题\"\n },\n {\n \"Text\": \"注入漏洞\",\n \"Value\": \"注入漏洞\"\n },\n {\n \"Text\": \"代码注入\",\n \"Value\": \"代码注入\"\n },\n {\n \"Text\": \"缓冲区溢出\",\n \"Value\": \"缓冲区溢出\"\n },\n {\n \"Text\": \"配置错误\",\n \"Value\": \"配置错误\"\n },\n {\n \"Text\": \"加密问题\",\n \"Value\": \"加密问题\"\n },\n {\n \"Text\": \"跨站脚本\",\n \"Value\": \"跨站脚本\"\n },\n {\n \"Text\": \"命令注入\",\n \"Value\": \"命令注入\"\n }\n ]\n }\n}",
|
208
208
|
"title": "获取漏洞视角的漏洞风险列表"
|
209
209
|
}
|
210
210
|
],
|
211
211
|
"DescribeRiskCenterWebsiteRiskList": [
|
212
212
|
{
|
213
213
|
"document": "获取内容风险列表",
|
214
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskCenterWebsiteRiskList\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"
|
215
|
-
"output": "{\n \"Response\": {\n \"
|
214
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskCenterWebsiteRiskList\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-68b8087a65268000\",\n \"mem-tencent-522badef8ad96a4d\"\n ],\n \"Filter\": {\n \"Limit\": 10,\n \"Offset\": 1\n }\n}",
|
215
|
+
"output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AffectAsset\": \"1.1.1.1\",\n \"Level\": \"high\",\n \"RecentTime\": \"2022-10-10 00:00:00\",\n \"FirstTime\": \"2022-10-10 00:00:00\",\n \"Status\": 0,\n \"Id\": \"id-wq142\",\n \"Index\": \"index-33wrt\",\n \"InstanceId\": \"ins-******\",\n \"InstanceName\": \"instance name\",\n \"AppId\": \"130********\",\n \"Nick\": \"nickname\",\n \"Uin\": \"100*********\",\n \"URL\": \"http://example.com\",\n \"URLPath\": \"url*******\",\n \"InstanceType\": \"CVM\",\n \"DetectEngine\": \"engine1\",\n \"ResultDescribe\": \"result info\",\n \"SourceURL\": \"http://example.com\",\n \"SourceURLPath\": \"path\"\n }\n ],\n \"DetectEngineLists\": [\n {\n \"Text\": \"vss\",\n \"Value\": \"vss\"\n }\n ],\n \"InstanceTypeLists\": [\n {\n \"Text\": \"托管集群\",\n \"Value\": \"managed_cluster\"\n },\n {\n \"Text\": \"CVM\",\n \"Value\": \"CVM\"\n },\n {\n \"Text\": \"本地镜像\",\n \"Value\": \"Local\"\n },\n {\n \"Text\": \"CLB\",\n \"Value\": \"CLB\"\n }\n ],\n \"LevelLists\": [\n {\n \"Text\": \"严重\",\n \"Value\": \"extreme\"\n },\n {\n \"Text\": \"高危\",\n \"Value\": \"high\"\n },\n {\n \"Text\": \"中危\",\n \"Value\": \"middle\"\n },\n {\n \"Text\": \"低危\",\n \"Value\": \"low\"\n },\n {\n \"Text\": \"提示\",\n \"Value\": \"info\"\n }\n ],\n \"RequestId\": \"6fcf6762-9729-49c4-8bbd-7812ecdca062\",\n \"StatusLists\": [\n {\n \"Text\": \"已忽略\",\n \"Value\": \"2\"\n },\n {\n \"Text\": \"已封禁\",\n \"Value\": \"3\"\n },\n {\n \"Text\": \"未处理\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"已处置\",\n \"Value\": \"1\"\n }\n ],\n \"TotalCount\": 0\n }\n}",
|
216
216
|
"title": "获取内容风险列表"
|
217
217
|
}
|
218
218
|
],
|
@@ -226,26 +226,26 @@
|
|
226
226
|
],
|
227
227
|
"DescribeScanTaskList": [
|
228
228
|
{
|
229
|
-
"document": "
|
230
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeScanTaskList\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"
|
231
|
-
"output": "{\n \"Response\": {\n \"
|
232
|
-
"title": "
|
229
|
+
"document": "查询任务列表",
|
230
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeScanTaskList\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-68b8087a65268000\",\n \"mem-tencent-522badef8ad96a4d\"\n ],\n \"Filter\": {\n \"Limit\": 1\n }\n}",
|
231
|
+
"output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AppId\": \"1302396215\",\n \"AssetNumber\": 1,\n \"Assets\": [\n {\n \"Asset\": \"ins-0cl9wvfx\",\n \"AssetName\": \"kevan-**\",\n \"AssetType\": \"Instance\",\n \"InstanceType\": \"CVM\",\n \"Region\": \"ap-shanghai\"\n }\n ],\n \"CSPMTaskId\": \"CspmTaskId-fa844539-e15c-4e29-9981-2e632477addf\",\n \"CSPMTaskProcess\": 100,\n \"CWPBlId\": \"cwpblt_oxrasjb6\",\n \"CWPBlProcess\": 100,\n \"CWPPOCId\": \"1\",\n \"CWPPOCProcess\": 0,\n \"CompleteAssetNumber\": 1,\n \"CompleteNumber\": 1,\n \"EndTime\": \"2024-10-30 11:23:50\",\n \"ErrorCode\": 0,\n \"ErrorInfo\": \"ok\",\n \"Frequency\": 0,\n \"InsertTime\": \"2024-10-30 11:18:09\",\n \"IsDelete\": 1,\n \"IsFree\": 0,\n \"Percent\": 100,\n \"PredictEndTime\": \"2024-10-30 11:18:09\",\n \"PredictTime\": 6,\n \"ReportNumber\": 1,\n \"RiskCount\": 0,\n \"ScanAssetType\": 1,\n \"ScanFrom\": \"csip\",\n \"ScanItem\": \"port,poc,weakpass,configrisk,exposedserver\",\n \"ScanPlanContent\": \"59 59 23 */1 * * *\",\n \"ScanStatus\": 2,\n \"SelfDefiningAssets\": [\n \"1.1.1.1\"\n ],\n \"SourceType\": 0,\n \"StartDay\": -1,\n \"StartTime\": \"2024-10-30 11:18:09\",\n \"TaskId\": \"rmis-sv6we7ol\",\n \"TaskMode\": 2,\n \"TaskName\": \"advance_select_csip\",\n \"TaskType\": 1,\n \"UIN\": \"100014592178\",\n \"UserName\": \"声声乌龙\",\n \"VSSTaskId\": \"mis-****\",\n \"VSSTaskProcess\": 0\n }\n ],\n \"RequestId\": \"d32ed248-d824-4893-9cda-9530eced4bd1\",\n \"TaskModeList\": [\n {\n \"Text\": \"标准体检\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"快速体检\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"高级体检\",\n \"Value\": \"2\"\n }\n ],\n \"TotalCount\": 229,\n \"UINList\": [\n \"100011949846\",\n \"100014592178\"\n ]\n }\n}",
|
232
|
+
"title": "查询任务列表"
|
233
233
|
}
|
234
234
|
],
|
235
235
|
"DescribeSearchBugInfo": [
|
236
236
|
{
|
237
|
-
"document": "
|
238
|
-
"input": "
|
239
|
-
"output": "{\n \"Response\": {\n \"Data\": {\n \"
|
240
|
-
"title": "
|
237
|
+
"document": "查询应急漏洞信息",
|
238
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSearchBugInfo\n<公共请求参数>\n\n{\n \"Id\": \"1\"\n}",
|
239
|
+
"output": "{\n \"Response\": {\n \"Data\": {\n \"CFWPatch\": \"1\",\n \"CWPFix\": 0,\n \"CWPScan\": \"0\",\n \"CveId\": \"CVE-2024-0884\",\n \"DataAsset\": [\n {\n \"AppID\": \"12435623\",\n \"CVEId\": \"CVE-2012-0023\",\n \"IsScan\": 1,\n \"InfluenceAsset\": 45,\n \"NotRepairAsset\": 33,\n \"NotProtectAsset\": 24,\n \"TaskId\": \"mis-qbskll7i\",\n \"TaskPercent\": 100,\n \"TaskTime\": \"1630291892\",\n \"ScanTime\": \"2022-1-12\"\n }\n ],\n \"DataBug\": [\n {\n \"CVEId\": \"CVE-2023-22518\",\n \"CVSSScore\": \"9.8\",\n \"CreateTime\": \"2023-12-17T11:25:43+08:00\",\n \"Fix\": \"1、目前官方已有可更新版本,建议受影响用户升级至如下对应固定版本:\\nAtlassian Confluence >= 7.19.16\\nAtlassian Confluence >= 8.3.4\\nAtlassian Confluence >= 8.4.4\\nAtlassian Confluence >= 8.5.3\\nAtlassian Confluence >= 8.6.1\\n参考链接:https://www.atlassian.com/software/confluence/download-archives\\n2、缓解方案\\t\\n(1) 参考以下链接备份实例:https://confluence.atlassian.com/doc/production-backup-strategy-38797389.html;\\n(2) 设置ACL限制外部可访问IP;\\n(3) 建议结合业务实际情况,酌情从互联网上删除实例,直到可以进行升级。\",\n \"Id\": 1012504,\n \"ImpactCOMPENT\": \"(atlassian) confluence\",\n \"ImpactOs\": \"debian\",\n \"ImpactVersion\": \"version<7.19.16,8.0.0<=version<8.3.4,8.4.0<=version<8.4.4,8.5.0<=version<8.5.3,8.6.0<=version<8.6.1\",\n \"IsPublish\": 1,\n \"Level\": \"extreme\",\n \"PatchId\": \"pcmgr-452553\",\n \"ProSupport\": 0,\n \"Reference\": \"url\",\n \"ReleaseTime\": \"2023-10-30 16:09:48\",\n \"SubCategory\": \"权限提升\",\n \"Tag\": \"NETWORK,POC,KNOWN_EXPLOITED,APP\",\n \"UpdateTime\": \"2023-12-17T11:25:43+08:00\",\n \"VULCategory\": 54,\n \"VULDescribe\": \"Confluence 是由 Atlassian 开发的知识管理与协同软件,旨在帮助团队协作、共享信息和创建文档。Confluence Data Center/Server 受影响版本中存在身份验证不当漏洞,未经身份验证的攻击者可构造恶意的请求提升权限,进而命令执行等。\",\n \"VULName\": \"Atlassian Confluence Data Center and Server 权限绕过漏洞(CVE-2023-22518)\"\n }\n ],\n \"DataSupport\": [\n {\n \"VSSScan\": true,\n \"CWPScan\": \"1\",\n \"CFWPatch\": \"1\",\n \"WafPatch\": 1,\n \"CWPFix\": 1,\n \"CveId\": \"CVE-2024-1889\"\n }\n ],\n \"StateCode\": \"1\",\n \"VSSScan\": true,\n \"WafPatch\": 1\n },\n \"RequestId\": \"ea962c2c-4d97-4412-9e3b-db533b59592b\",\n \"ReturnCode\": 0,\n \"ReturnMsg\": \"Success\"\n }\n}",
|
240
|
+
"title": "查询漏洞信息"
|
241
241
|
}
|
242
242
|
],
|
243
243
|
"DescribeSubnetAssets": [
|
244
244
|
{
|
245
|
-
"document": "
|
246
|
-
"input": "
|
247
|
-
"output": "{\n \"Response\": {\n \"
|
248
|
-
"title": "
|
245
|
+
"document": "获取子网列表",
|
246
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSubnetAssets\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-68b8087a65268000\"\n ],\n \"Filter\": {\n \"Limit\": 1,\n \"Offset\": 0\n }\n}",
|
247
|
+
"output": "{\n \"Response\": {\n \"AppIdList\": [\n {\n \"Text\": \"1827324\",\n \"Value\": \"1827324\"\n }\n ],\n \"Data\": [\n {\n \"AppId\": \"1827324\",\n \"AssetId\": \"subnet-0pptyoj8\",\n \"AssetName\": \"sub2\",\n \"AvailableIp\": 253,\n \"CIDR\": \"192.168.25.0/24\",\n \"CVM\": 0,\n \"ConfigureRisk\": 1,\n \"CreateTime\": \"2024-06-12 18:01:54\",\n \"IsCore\": 2,\n \"IsNewAsset\": 0,\n \"LastScanTime\": \"2024-10-30 11:16:07\",\n \"Nick\": \"yooyan\",\n \"Region\": \"ap-guangzhou\",\n \"ScanTask\": 193,\n \"Tag\": null,\n \"Uin\": \"100014592178\",\n \"VpcId\": \"vpc-9eoyt5v\",\n \"VpcName\": \"feoyian2\",\n \"Zone\": \"ap-guangzhou-6\"\n }\n ],\n \"RegionList\": [\n {\n \"Text\": \"广州\",\n \"Value\": \"ap-guangzhou\"\n }\n ],\n \"RequestId\": \"0604124a-7416-408c-9c70-793880a82005\",\n \"TotalCount\": 54,\n \"VpcList\": [\n {\n \"Text\": \"vpc_c2\",\n \"Value\": \"vpc-2toy3vhb\"\n },\n {\n \"Text\": \"vpc-gz-0\",\n \"Value\": \"vpc-68toym89\"\n }\n ],\n \"ZoneList\": [\n {\n \"Text\": \"广州六区\",\n \"Value\": \"ap-guangzhou-6\"\n },\n {\n \"Text\": \"广州三区\",\n \"Value\": \"ap-guangzhou-3\"\n }\n ]\n }\n}",
|
248
|
+
"title": "获取子网列表"
|
249
249
|
}
|
250
250
|
],
|
251
251
|
"DescribeTaskLogList": [
|
@@ -259,89 +259,89 @@
|
|
259
259
|
"DescribeTaskLogURL": [
|
260
260
|
{
|
261
261
|
"document": "获取报告下载的临时链接",
|
262
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeTaskLogURL\n<公共请求参数>\n\n{\n \"
|
263
|
-
"output": "{\n \"Response\": {\n \"Data\": [\n {\n \"URL\": \"
|
262
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeTaskLogURL\n<公共请求参数>\n\n{\n \"ReportItemKeyList\": [\n {\n \"TaskLogList\": [\n \"rpt-****\"\n ]\n }\n ],\n \"Type\": 0,\n \"ReportTaskIdList\": [\n {\n \"AppId\": \"1302****\",\n \"TaskIdList\": [\n \"rmis-****\"\n ]\n }\n ]\n}",
|
263
|
+
"output": "{\n \"Response\": {\n \"Data\": [\n {\n \"URL\": \"https://yuzhi-tasklog-pdf-1300616671.cos.ap-guangzhou.myqcloud.com/****.pdf\",\n \"LogId\": \"rpt-****\",\n \"TaskLogName\": \"标准体检_*****\",\n \"AppId\": \"1302****\"\n }\n ],\n \"RequestId\": \"7429061e-dabd-e1ee-e135-43364c7bb15d\"\n }\n}",
|
264
264
|
"title": "获取报告下载的临时链接"
|
265
265
|
}
|
266
266
|
],
|
267
267
|
"DescribeTopAttackInfo": [
|
268
268
|
{
|
269
269
|
"document": "",
|
270
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeTopAttackInfo\n<公共请求参数>\n\n{\n \"
|
271
|
-
"output": "{\n \"Response\": {\n \"TopAttackInfo\": [\n {\n \"Name\": \"漏洞攻击\",\n \"Count\":
|
270
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeTopAttackInfo\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-tencent-1f94db8d0x231e0\"\n ]\n}",
|
271
|
+
"output": "{\n \"Response\": {\n \"TopAttackInfo\": [\n {\n \"Name\": \"漏洞攻击\",\n \"Count\": 13\n }\n ],\n \"RequestId\": \"ab168264-2afb-4c51-bfb5-d8e24e0a03ac\"\n }\n}",
|
272
272
|
"title": "查询TOP攻击信息示例"
|
273
273
|
}
|
274
274
|
],
|
275
275
|
"DescribeVULRiskAdvanceCFGList": [
|
276
276
|
{
|
277
|
-
"document": "
|
278
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVULRiskAdvanceCFGList\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"
|
279
|
-
"output": "{\n \"Response\": {\n \"
|
277
|
+
"document": "查询漏洞风险高级配置",
|
278
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVULRiskAdvanceCFGList\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-68b8087a65268000\"\n ],\n \"Filter\": {\n \"Limit\": 1,\n \"Offset\": 0\n }\n}",
|
279
|
+
"output": "{\n \"Response\": {\n \"CheckFromLists\": [\n {\n \"Text\": \"云安全中心\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"主机检测\",\n \"Value\": \"1\"\n }\n ],\n \"Data\": [\n {\n \"AttackHeat\": \"0\",\n \"CVE\": \"CVE-2024-45507\",\n \"CVSS\": \"9.8\",\n \"CheckFrom\": \"cpe\",\n \"EMGCVulType\": 1,\n \"Enable\": 0,\n \"FixMethod\": [\n \"建议您更新当前系统或软件至最新版\"\n ],\n \"ImpactComponent\": \"(apache) ofbiz\",\n \"ImpactVersion\": \"version<18.12.16\",\n \"RecentScanTime\": \"2024-10-11 00:00:00\",\n \"References\": \"https://ofbiz.apache.org/download.html,https://ofbiz.apache.org/security.html,https://issues.apache.org/jira/browse/OFBIZ-13132,https://lists.apache.org/thread/o90dd9lbk1hh3t2557t2y2qvrh92p7wy\",\n \"ReleaseTime\": \"2024-09-04 17:15:00\",\n \"RiskId\": \"4c57121fa47a0d493ca934f6fa1bda31\",\n \"RiskLevel\": \"extreme\",\n \"ServiceSupport\": [\n {\n \"IsSupport\": true,\n \"ServiceName\": \"cfw\",\n \"SupportHandledCount\": 0,\n \"SupportTotalCount\": 0\n },\n {\n \"IsSupport\": true,\n \"ServiceName\": \"cwp_detect\",\n \"SupportHandledCount\": 0,\n \"SupportTotalCount\": 0\n },\n {\n \"IsSupport\": true,\n \"ServiceName\": \"vss\",\n \"SupportHandledCount\": 0,\n \"SupportTotalCount\": 0\n }\n ],\n \"VULDescribe\": \"Apache OFBiz是美国阿帕奇(Apache)基金会的一套企业资源计划(ERP)系统。该系统提供了一整套基于Java的Web应用程序组件和工具。 Apache OFBiz 18.12.16之前版本存在代码问题漏洞,该漏洞源于容易受到服务端请求伪造和代码注入攻击。\",\n \"VULName\": \"Apache OFBiz SSRF到远程代码执行漏洞(CVE-2024-45507)\",\n \"VULTag\": [\n \"该漏洞可以远程利用\",\n \"该漏洞有poc\",\n \"该漏洞可作为应用组件漏洞检出\"\n ],\n \"VULType\": \"代码注入\"\n }\n ],\n \"RequestId\": \"b6826e70-03cf-4a5c-8796-1f943a5a76ab\",\n \"RiskLevelLists\": [\n {\n \"Text\": \"提示\",\n \"Value\": \"info\"\n },\n {\n \"Text\": \"严重\",\n \"Value\": \"extreme\"\n },\n {\n \"Text\": \"高危\",\n \"Value\": \"high\"\n },\n {\n \"Text\": \"中危\",\n \"Value\": \"middle\"\n },\n {\n \"Text\": \"低危\",\n \"Value\": \"low\"\n }\n ],\n \"TotalCount\": 10,\n \"VULTypeLists\": [\n {\n \"Text\": \"越界读取\",\n \"Value\": \"越界读取\"\n },\n {\n \"Text\": \"竞争条件\",\n \"Value\": \"竞争条件\"\n },\n {\n \"Text\": \"代码注入\",\n \"Value\": \"代码注入\"\n },\n {\n \"Text\": \"目录穿越 \",\n \"Value\": \"目录穿越 \"\n }\n ],\n \"VulTagList\": [\n {\n \"Text\": \"该漏洞可以远程利用\",\n \"Value\": \"该漏洞可以远程利用\"\n },\n {\n \"Text\": \"该漏洞有exp\",\n \"Value\": \"该漏洞有exp\"\n },\n {\n \"Text\": \"该漏洞仅能本地利用\",\n \"Value\": \"该漏洞仅能本地利用\"\n },\n {\n \"Text\": \"该漏洞可作为系统组件漏洞检出\",\n \"Value\": \"该漏洞可作为系统组件漏洞检出\"\n },\n {\n \"Text\": \"该漏洞可作为应用组件漏洞检出\",\n \"Value\": \"该漏洞可作为应用组件漏洞检出\"\n },\n {\n \"Text\": \"应急\",\n \"Value\": \"应急\"\n },\n {\n \"Text\": \"必修\",\n \"Value\": \"必修\"\n },\n {\n \"Text\": \"该漏洞存在在野利用或在野攻击\",\n \"Value\": \"该漏洞存在在野利用或在野攻击\"\n },\n {\n \"Text\": \"该漏洞有poc\",\n \"Value\": \"该漏洞有poc\"\n }\n ]\n }\n}",
|
280
280
|
"title": "查询漏洞风险高级配置"
|
281
281
|
}
|
282
282
|
],
|
283
283
|
"DescribeVULRiskDetail": [
|
284
284
|
{
|
285
|
-
"document": "
|
285
|
+
"document": "获取漏洞展开详情",
|
286
286
|
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVULRiskDetail\n<公共请求参数>\n\n{\n \"PCMGRId\": \"pcmgr-33429\"\n}",
|
287
|
-
"output": "{\n \"Response\": {\n \"QuestionId\": \"
|
288
|
-
"title": "
|
287
|
+
"output": "{\n \"Response\": {\n \"QuestionId\": \"id-21b41oi\",\n \"RequestId\": \"46d36ab9-84d0-4ad1-bc9f-284742f231b9\",\n \"ServiceSupport\": [\n {\n \"IsSupport\": false,\n \"ServiceName\": \"cfw_waf_virtual\",\n \"SupportHandledCount\": 0,\n \"SupportTotalCount\": 0\n },\n {\n \"IsSupport\": false,\n \"ServiceName\": \"cwp_detect\",\n \"SupportHandledCount\": 0,\n \"SupportTotalCount\": 0\n },\n {\n \"IsSupport\": false,\n \"ServiceName\": \"cwp_defense\",\n \"SupportHandledCount\": 0,\n \"SupportTotalCount\": 0\n },\n {\n \"IsSupport\": false,\n \"ServiceName\": \"cwp_fix\",\n \"SupportHandledCount\": 0,\n \"SupportTotalCount\": 0\n }\n ],\n \"SessionId\": \"12040124\",\n \"VulData\": {\n \"Describe\": \"Vim存在输入验证漏洞。由于没有正确的过滤转义字符,从7.2.010到7.x的Vim 3.0不能正确地转义字符,这使得用户辅助攻击者可以(1)通过在包含“;”的行上输入K击键来执行任意的shell命令。(分号)后接命令,或通过在(2)“ Ctrl-]”(控制小括号)或(3)“ g]”(g小括号)后输入参数来执行任意Ex命令)击键顺序,与CVE-2008-2712的问题不同。\",\n \"Fix\": \" 建议您更新当前系统或软件至最新版,完成漏洞的修复。参考链接:https://www.vim.org/download.php\",\n \"ImpactComponent\": [\n {\n \"Component\": \"vim\",\n \"Version\": \"1.0.1\"\n }\n ],\n \"References\": \"http://ftp.vim.org/pub/vim/patches/7.2/7.2.010,http://groups.google.com/group/vim_dev/attach/9290f26f9bc11b33/K-arbitrary-command-execution.patch.v3?part=2,http://groups.google.com/group/vim_dev/attach/dd32ad3a84f36bb2/K-arbitrary-command-execution.patch?part=2,http://groups.google.com/group/vim_dev/browse_thread/thread/1434d0812b5c817e/6ad2d5b50a96668e,http://groups.google.com/group/vim_dev/msg/9290f26f9bc11b33,http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html,http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html,http://secunia.com/advisories/31592,http://secunia.com/advisories/32222,http://secunia.com/advisories/32858,http://secunia.com/advisories/32864,http://secunia.com/advisories/33410,http://support.apple.com/kb/HT3216,http://support.apple.com/kb/HT4077,http://support.avaya.com/elmodocs2/security/ASA-2008-457.htm,http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm,http://www.mandriva.com/security/advisories?name=MDVSA-2008:236,http://www.openwall.com/lists/oss-security/2008/09/11/3,http://www.openwall.com/lists/oss-security/2008/09/11/4,http://www.openwall.com/lists/oss-security/2008/09/16/5,http://www.openwall.com/lists/oss-security/2008/09/16/6,http://www.rdancer.org/vulnerablevim-K.html,http://www.redhat.com/support/errata/RHSA-2008-0580.html,http://www.redhat.com/support/errata/RHSA-2008-0617.html,http://www.redhat.com/support/errata/RHSA-2008-0618.html,http://www.securityfocus.com/archive/1/495662,http://www.securityfocus.com/archive/1/495703,http://www.securityfocus.com/archive/1/502322/100/0/threaded,http://www.securityfocus.com/bid/30795,http://www.securityfocus.com/bid/31681,http://www.ubuntu.com/usn/USN-712-1,http://www.vmware.com/security/advisories/VMSA-2009-0004.html,http://www.vupen.com/english/advisories/2008/2780,http://www.vupen.com/english/advisories/2009/0033,http://www.vupen.com/english/advisories/2009/0904,https://bugzilla.redhat.com/show_bug.cgi?id=461927,https://exchange.xforce.ibmcloud.com/vulnerabilities/44626,https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10894,https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5812\"\n },\n \"VulTrend\": [\n {\n \"AffectAssetCount\": 0,\n \"AffectUserCount\": 0,\n \"AttackCount\": 0,\n \"Date\": \"2023-12-05\"\n },\n {\n \"AffectAssetCount\": 0,\n \"AffectUserCount\": 0,\n \"AttackCount\": 0,\n \"Date\": \"2023-12-06\"\n },\n {\n \"AffectAssetCount\": 0,\n \"AffectUserCount\": 0,\n \"AttackCount\": 0,\n \"Date\": \"2023-12-07\"\n },\n {\n \"AffectAssetCount\": 0,\n \"AffectUserCount\": 0,\n \"AttackCount\": 0,\n \"Date\": \"2023-12-08\"\n },\n {\n \"AffectAssetCount\": 0,\n \"AffectUserCount\": 0,\n \"AttackCount\": 0,\n \"Date\": \"2023-12-09\"\n },\n {\n \"AffectAssetCount\": 0,\n \"AffectUserCount\": 0,\n \"AttackCount\": 0,\n \"Date\": \"2023-12-10\"\n },\n {\n \"AffectAssetCount\": 0,\n \"AffectUserCount\": 0,\n \"AttackCount\": 0,\n \"Date\": \"2023-12-11\"\n }\n ]\n }\n}",
|
288
|
+
"title": "获取漏洞展开详情"
|
289
289
|
}
|
290
290
|
],
|
291
291
|
"DescribeVpcAssets": [
|
292
292
|
{
|
293
|
-
"document": "
|
294
|
-
"input": "
|
295
|
-
"output": "{\n \"Response\": {\n \"
|
296
|
-
"title": "
|
293
|
+
"document": "获取vpc列表",
|
294
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVpcAssets\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-68b8087a65268000\"\n ],\n \"Filter\": {\n \"Limit\": 1,\n \"Offset\": 0\n }\n}",
|
295
|
+
"output": "{\n \"Response\": {\n \"AppIdList\": [\n {\n \"Text\": \"1302111215\",\n \"Value\": \"1302111215\"\n }\n ],\n \"Data\": [\n {\n \"AppId\": \"1302111215\",\n \"AssetId\": \"vpc-1hezruby\",\n \"AssetName\": \"li-跨账号2\",\n \"CIDR\": \"172.16.0.0/16\",\n \"CVM\": 3,\n \"ConnectedVpc\": 0,\n \"CreateTime\": \"2024-08-27 10:22:36\",\n \"DNS\": [\n \"183.**.**.19\",\n \"183.**.**.98\"\n ],\n \"IsCore\": 1,\n \"IsNewAsset\": 0,\n \"Nick\": \"声声乌龙\",\n \"Region\": \"ap-beijing\",\n \"Subnet\": 1,\n \"Tag\": null,\n \"Uin\": \"100014125178\"\n }\n ],\n \"RegionList\": [\n {\n \"Text\": \"广州\",\n \"Value\": \"ap-guangzhou\"\n },\n {\n \"Text\": \"重庆\",\n \"Value\": \"ap-chongqing\"\n }\n ],\n \"RequestId\": \"25e46c79-08c5-4582-9952-eee1245bbbb2\",\n \"TotalCount\": 35,\n \"VpcList\": [\n {\n \"Text\": \"vpc_c8\",\n \"Value\": \"vpc-2pu5xuk1\"\n },\n {\n \"Text\": \"vpc_c2\",\n \"Value\": \"vpc-2t0l3vhb\"\n }\n ]\n }\n}",
|
296
|
+
"title": "获取vpc列表"
|
297
297
|
}
|
298
298
|
],
|
299
299
|
"DescribeVulViewVulRiskList": [
|
300
300
|
{
|
301
|
-
"document": "
|
301
|
+
"document": "获取漏洞视角的漏洞风险列表",
|
302
302
|
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulViewVulRiskList\n<公共请求参数>\n\n{}",
|
303
|
-
"output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AffectAssetCount\": 1,\n \"AppId\": \"1300448058\",\n \"AppName\": \"-\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2019-25032\",\n \"Component\": \"-\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-10-30 15:02:23\",\n \"From\": \"主机检测\",\n \"Index\": \"04c52dbf64c927a11b15840089e8f1d3\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"NoHandleCount\": 0,\n \"PCMGRId\": \"\",\n \"Payload\": \"\",\n \"Port\": \"-\",\n \"RecentTime\": \"2023-11-29 14:43:07\",\n \"RiskId\": \"04c52dbf64c927a11b15840089e8f1d3\",\n \"Uin\": \"\",\n \"VULName\": \"Unbound 输入验证错误漏洞 (CVE-2019-25032)\",\n \"VULType\": \"处理逻辑错误\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAssetCount\": 1,\n \"AppId\": \"1300448058\",\n \"AppName\": \"-\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2018-25009\",\n \"Component\": \"-\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-12-07 17:22:17\",\n \"From\": \"主机检测\",\n \"Index\": \"07c7249d578bb771121cdf5b6e7c6e54\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"NoHandleCount\": 0,\n \"PCMGRId\": \"\",\n \"Payload\": \"\",\n \"Port\": \"-\",\n \"RecentTime\": \"2023-12-07 17:22:17\",\n \"RiskId\": \"07c7249d578bb771121cdf5b6e7c6e54\",\n \"Uin\": \"\",\n \"VULName\": \"libwebp 缓冲区错误漏洞(CVE-2018-25009)\",\n \"VULType\": \"缓冲区溢出\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAssetCount\": 1,\n \"AppId\": \"1300448058\",\n \"AppName\": \"-\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2021-20231\",\n \"Component\": \"-\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-12-07 17:22:17\",\n \"From\": \"主机检测\",\n \"Index\": \"0dddd68a2edcb52ee7c6ee7641a0fffa\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"NoHandleCount\": 0,\n \"PCMGRId\": \"\",\n \"Payload\": \"\",\n \"Port\": \"-\",\n \"RecentTime\": \"2023-12-07 17:22:17\",\n \"RiskId\": \"0dddd68a2edcb52ee7c6ee7641a0fffa\",\n \"Uin\": \"\",\n \"VULName\": \"GnuTLS 资源管理错误漏洞(CVE-2021-20231)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAssetCount\": 1,\n \"AppId\": \"1300448058\",\n \"AppName\": \"-\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2020-36331\",\n \"Component\": \"-\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-12-07 17:22:17\",\n \"From\": \"主机检测\",\n \"Index\": \"0f256323945289d6d94372a23c639064\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"NoHandleCount\": 0,\n \"PCMGRId\": \"\",\n \"Payload\": \"\",\n \"Port\": \"-\",\n \"RecentTime\": \"2023-12-07 17:22:17\",\n \"RiskId\": \"0f256323945289d6d94372a23c639064\",\n \"Uin\": \"\",\n \"VULName\": \"libwebp 缓冲区错误漏洞(CVE-2020-36331)\",\n \"VULType\": \"缓冲区溢出\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAssetCount\": 3,\n \"AppId\": \"1300448058\",\n \"AppName\": \"OpenSSH\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2020-15778\",\n \"Component\": \"OpenSSH\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"Index\": \"1498f23a853529b3be8cf554629e4533\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"NoHandleCount\": 0,\n \"PCMGRId\": \"\",\n \"Payload\": \"OpenSSH/7.4,OpenSSH/8.0\",\n \"Port\": \"22\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"1498f23a853529b3be8cf554629e4533\",\n \"Uin\": \"\",\n \"VULName\": \"OpenSSH 命令注入漏洞(CVE-2020-15778)\",\n \"VULType\": \"命令注入\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAssetCount\": 2,\n \"AppId\": \"1300448058\",\n \"AppName\": \"-\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2021-3520\",\n \"Component\": \"-\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-10-27 10:28:30\",\n \"From\": \"主机检测\",\n \"Index\": \"16f4ce6bfc81bf53176ef3a6351099ed\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"NoHandleCount\": 0,\n \"PCMGRId\": \"\",\n \"Payload\": \"\",\n \"Port\": \"-\",\n \"RecentTime\": \"2023-12-07 17:22:18\",\n \"RiskId\": \"16f4ce6bfc81bf53176ef3a6351099ed\",\n \"Uin\": \"\",\n \"VULName\": \"LZ4 安全漏洞 (CVE-2021-3520)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAssetCount\": 2,\n \"AppId\": \"1300448058\",\n \"AppName\": \"-\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2020-9895\",\n \"Component\": \"-\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-10-27 10:28:30\",\n \"From\": \"主机检测\",\n \"Index\": \"18321f689397785f8cb79c60c6aabae8\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"NoHandleCount\": 0,\n \"PCMGRId\": \"\",\n \"Payload\": \"\",\n \"Port\": \"-\",\n \"RecentTime\": \"2023-12-07 17:22:18\",\n \"RiskId\": \"18321f689397785f8cb79c60c6aabae8\",\n \"Uin\": \"\",\n \"VULName\": \"WebKit组件安全漏洞 (CVE-2020-9895)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAssetCount\": 2,\n \"AppId\": \"1300448058\",\n \"AppName\": \"-\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2019-3822\",\n \"Component\": \"-\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-10-27 10:28:30\",\n \"From\": \"主机检测\",\n \"Index\": \"1de2ea2fdeba33f60237e63ba1796a7a\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"NoHandleCount\": 0,\n \"PCMGRId\": \"\",\n \"Payload\": \"\",\n \"Port\": \"-\",\n \"RecentTime\": \"2023-12-07 17:22:18\",\n \"RiskId\": \"1de2ea2fdeba33f60237e63ba1796a7a\",\n \"Uin\": \"\",\n \"VULName\": \"Haxx libcurl 缓冲区错误漏洞 (CVE-2019-3822)\",\n \"VULType\": \"缓冲区溢出\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAssetCount\": 1,\n \"AppId\": \"1300448058\",\n \"AppName\": \"-\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2019-25042\",\n \"Component\": \"-\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-10-30 15:02:23\",\n \"From\": \"主机检测\",\n \"Index\": \"21ecf9ac58582f15794dab5ee37bcef1\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"NoHandleCount\": 0,\n \"PCMGRId\": \"\",\n \"Payload\": \"\",\n \"Port\": \"-\",\n \"RecentTime\": \"2023-11-29 14:43:07\",\n \"RiskId\": \"21ecf9ac58582f15794dab5ee37bcef1\",\n \"Uin\": \"\",\n \"VULName\": \"Unbound 缓冲区错误漏洞 (CVE-2019-25042)\",\n \"VULType\": \"缓冲区溢出\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAssetCount\": 2,\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2019-9511\",\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"Index\": \"28d5b79163e64cd046e6537131ea9e08\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"NoHandleCount\": 0,\n \"PCMGRId\": \"\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"28d5b79163e64cd046e6537131ea9e08\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 安全漏洞(CVE-2019-9511)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n }\n ],\n \"FromLists\": [\n {\n \"Text\": \"云安全中心\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"主机检测\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"容器检测\",\n \"Value\": \"5\"\n }\n ],\n \"LevelLists\": [\n {\n \"Text\": \"中危\",\n \"Value\": \"middle\"\n },\n {\n \"Text\": \"低危\",\n \"Value\": \"low\"\n },\n {\n \"Text\": \"提示\",\n \"Value\": \"info\"\n },\n {\n \"Text\": \"严重\",\n \"Value\": \"extreme\"\n },\n {\n \"Text\": \"高危\",\n \"Value\": \"high\"\n }\n ],\n \"RequestId\": \"470926c1-52bf-46fb-bc00-be5d1b8cba9f\",\n \"Tags\": [\n {\n \"Text\": \"该漏洞有poc\",\n \"Value\": \"POC\"\n },\n {\n \"Text\": \"必修\",\n \"Value\": \"IS_SUGGEST\"\n },\n {\n \"Text\": \"该漏洞有exp\",\n \"Value\": \"EXP\"\n },\n {\n \"Text\": \"该漏洞存在在野利用或在野攻击\",\n \"Value\": \"KNOWN_EXPLOITED\"\n },\n {\n \"Text\": \"该漏洞仅能本地利用\",\n \"Value\": \"LOCAL\"\n },\n {\n \"Text\": \"该漏洞可作为系统组件漏洞检出\",\n \"Value\": \"SYS\"\n },\n {\n \"Text\": \"该漏洞可作为应用组件漏洞检出\",\n \"Value\": \"APP\"\n },\n {\n \"Text\": \"应急\",\n \"Value\": \"IS_EMERGENCY\"\n },\n {\n \"Text\": \"该漏洞可以远程利用\",\n \"Value\": \"NETWORK\"\n }\n ],\n \"TotalCount\": 672,\n \"VULTypeLists\": [\n {\n \"Text\": \"处理逻辑错误\",\n \"Value\": \"处理逻辑错误\"\n }\n ]\n }\n}",
|
304
|
-
"title": "
|
303
|
+
"output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AffectAssetCount\": 1,\n \"AppId\": \"1300448058\",\n \"AppName\": \"app_andy\",\n \"AppVersion\": \"v1.0.0.1\",\n \"CVE\": \"CVE-2019-25032\",\n \"Component\": \"Unbound\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-10-30 15:02:23\",\n \"From\": \"主机检测\",\n \"Index\": \"04c52dbf64c927a11b15840089e8f1d3\",\n \"Level\": \"high\",\n \"Nick\": \"andy\",\n \"NoHandleCount\": 0,\n \"PCMGRId\": \"pcmgr-n12on4o1n\",\n \"Payload\": \"bnd12iu41i\",\n \"Port\": \"621\",\n \"RecentTime\": \"2023-11-29 14:43:07\",\n \"RiskId\": \"04c52dbf64c927a11b15840089e8f1d3\",\n \"Uin\": \"1092741621\",\n \"VULName\": \"Unbound 输入验证错误漏洞 (CVE-2019-25032)\",\n \"VULType\": \"处理逻辑错误\",\n \"VULURL\": \"/hello/echo\"\n }\n ],\n \"FromLists\": [\n {\n \"Text\": \"云安全中心\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"主机检测\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"容器检测\",\n \"Value\": \"5\"\n }\n ],\n \"LevelLists\": [\n {\n \"Text\": \"中危\",\n \"Value\": \"middle\"\n },\n {\n \"Text\": \"低危\",\n \"Value\": \"low\"\n },\n {\n \"Text\": \"提示\",\n \"Value\": \"info\"\n },\n {\n \"Text\": \"严重\",\n \"Value\": \"extreme\"\n },\n {\n \"Text\": \"高危\",\n \"Value\": \"high\"\n }\n ],\n \"RequestId\": \"470926c1-52bf-46fb-bc00-be5d1b8cba9f\",\n \"Tags\": [\n {\n \"Text\": \"该漏洞有poc\",\n \"Value\": \"POC\"\n },\n {\n \"Text\": \"应急\",\n \"Value\": \"IS_EMERGENCY\"\n },\n {\n \"Text\": \"该漏洞可以远程利用\",\n \"Value\": \"NETWORK\"\n }\n ],\n \"TotalCount\": 672,\n \"VULTypeLists\": [\n {\n \"Text\": \"处理逻辑错误\",\n \"Value\": \"处理逻辑错误\"\n }\n ]\n }\n}",
|
304
|
+
"title": "获取漏洞视角的漏洞风险列表"
|
305
305
|
}
|
306
306
|
],
|
307
307
|
"ModifyOrganizationAccountStatus": [
|
308
308
|
{
|
309
309
|
"document": "修改集团账号状态",
|
310
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyOrganizationAccountStatus\n<公共请求参数>\n\n{\n \"Status\":
|
311
|
-
"output": "{\n \"Response\": {\n \"Status\": 0,\n \"RequestId\": \"
|
310
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyOrganizationAccountStatus\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-5b28e2010c18f07a\"\n ],\n \"Status\": 1\n}",
|
311
|
+
"output": "{\n \"Response\": {\n \"Status\": 0,\n \"RequestId\": \"f9184c15-9721-456d-8ca0-4263967b5ead\"\n }\n}",
|
312
312
|
"title": "修改集团账号状态"
|
313
313
|
}
|
314
314
|
],
|
315
315
|
"ModifyRiskCenterRiskStatus": [
|
316
316
|
{
|
317
317
|
"document": "修改风险中心风险状态",
|
318
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyRiskCenterRiskStatus\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"
|
319
|
-
"output": "{\n \"Response\": {\n \"RequestId\": \"
|
318
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyRiskCenterRiskStatus\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-68b8087a65268000\"\n ],\n \"RiskStatusKeys\": [\n {\n \"Id\": \"fc41d3fb2\",\n \"PublicIPDomain\": \"172.*.0.**\",\n \"InstanceId\": \"ins-ari443\",\n \"AppId\": \"23583341\"\n }\n ],\n \"Status\": 1,\n \"Type\": 1\n}",
|
319
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"7cf2ba3d-87ad-4691-a374-fd92ec11d9c8\"\n }\n}",
|
320
320
|
"title": "修改风险中心风险状态"
|
321
321
|
}
|
322
322
|
],
|
323
323
|
"ModifyRiskCenterScanTask": [
|
324
324
|
{
|
325
325
|
"document": "修改风险中心扫描任务",
|
326
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyRiskCenterScanTask\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"
|
327
|
-
"output": "{\n \"Response\": {\n \"TaskId\": \"
|
326
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyRiskCenterScanTask\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-fe191feeedcc2567\"\n ],\n \"TaskName\": \"asset scan task\",\n \"Assets\": [\n {\n \"AssetName\": \"cvm-t1\",\n \"InstanceType\": \"CVM\",\n \"AssetType\": \"Instance\",\n \"Asset\": \"ins-mx19k3r4\",\n \"Region\": \"guangzhou\"\n }\n ],\n \"ScanAssetType\": 0,\n \"ScanItem\": [\n \"port\"\n ],\n \"ScanPlanType\": 0,\n \"ScanPlanContent\": \"38 53 11 */1 * * *\",\n \"SelfDefiningAssets\": [\n \"120.53.53.53\"\n ],\n \"TaskId\": \"rmis-112hq236\",\n \"TaskAdvanceCFG\": {\n \"PortRisk\": [\n {\n \"PortSets\": \"80\",\n \"CheckType\": 0,\n \"Detail\": \"port info\",\n \"Enable\": 0\n }\n ],\n \"VulRisk\": [\n {\n \"RiskId\": \"fc41d3fb24eb96a6dfb12c68e20ebf4b\",\n \"Enable\": 0\n }\n ],\n \"WeakPwdRisk\": [\n {\n \"CheckItemId\": 151,\n \"Enable\": 0\n }\n ],\n \"CFGRisk\": [\n {\n \"ItemId\": \"161\",\n \"Enable\": 0,\n \"ResourceType\": \"CentOS7\"\n }\n ]\n },\n \"TaskMode\": 0\n}",
|
327
|
+
"output": "{\n \"Response\": {\n \"TaskId\": \"rmis-112hq236\",\n \"Status\": 0,\n \"RequestId\": \"f9184c15-9721-456d-8ca0-4263967b5ead\"\n }\n}",
|
328
328
|
"title": "修改风险中心扫描任务"
|
329
329
|
}
|
330
330
|
],
|
331
331
|
"StopRiskCenterTask": [
|
332
332
|
{
|
333
333
|
"document": "停止扫风险中心扫描任务",
|
334
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: StopRiskCenterTask\n<公共请求参数>\n\n{\n \"
|
335
|
-
"output": "{\n \"Response\": {\n \"Status\": 0,\n \"RequestId\": \"
|
334
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: StopRiskCenterTask\n<公共请求参数>\n\n{\n \"TaskIdList\": [\n {\n \"TaskId\": \"rmis-******\"\n }\n ]\n}",
|
335
|
+
"output": "{\n \"Response\": {\n \"Status\": 0,\n \"RequestId\": \"7c9179a6-1dbe-4ee6-933c-c53f5d3bb0d4\"\n }\n}",
|
336
336
|
"title": "停止扫风险中心扫描任务"
|
337
337
|
}
|
338
338
|
],
|
339
339
|
"UpdateAlertStatusList": [
|
340
340
|
{
|
341
341
|
"document": "",
|
342
|
-
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateAlertStatusList\n<公共请求参数>\n\n{\n \"
|
343
|
-
"output": "{\n \"Response\": {\n \"
|
344
|
-
"title": "
|
342
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateAlertStatusList\n<公共请求参数>\n\n{\n \"MemberId\": [\n \"mem-tencent-4120f232321129\"\n ],\n \"OperateType\": 3,\n \"ID\": [\n {\n \"AppId\": \"1235123242\",\n \"Type\": \"ActiveOutbound\",\n \"SubType\": \"MaliciousRequest\",\n \"Source\": \"CWP\",\n \"Name\": \"访问恶意地址或域名\",\n \"Key\": \"WRzIsdfMPkmukkUdsfsXfpZu\",\n \"Date\": \"2024-10-30T00:00:00+08:00\"\n }\n ]\n}",
|
343
|
+
"output": "{\n \"Response\": {\n \"Code\": \"0\",\n \"Msg\": \"success\",\n \"RequestId\": \"fa5de592-7926-4e69-8ebe-00d1a7d6df55\"\n }\n}",
|
344
|
+
"title": "批量处理告警状态"
|
345
345
|
}
|
346
346
|
]
|
347
347
|
},
|