Serverless Vulnerabilities - CrowdStrike/falconpy GitHub Wiki
| Operation ID | Description | ||||
|---|---|---|---|---|---|
|
Retrieve all lambda vulnerabilities that match the given query and return in the SARIF format. | ||||
WARNING
client_idandclient_secretare keyword arguments that contain your CrowdStrike API credentials. Please note that all examples below do not hard code these values. (These values are ingested as strings.)CrowdStrike does not recommend hard coding API credentials or customer identifiers within source code.
Retrieve all lambda vulnerabilities that match the given query and return in the SARIF format.
get_vulnerabilities
| Method | Route |
|---|---|
/lambdas/combined/vulnerabilities/sarif/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| filter | query | string | Filter lambda vulnerabilities using a query in Falcon Query Language (FQL).Supported filters: application_name,application_name_version,cid,cloud_account_id,cloud_account_name,cloud_provider,cve_id,cvss_base_score,exprt_rating,first_seen_timestamp,function_name,function_resource_id,is_supported,is_valid_asset_id,layer,region,runtime,severity,timestamp,type | ||
| limit | query | integer | The upper-bound on the number of records to retrieve. | ||
| offset | query | integer | The offset from where to begin. | ||
| parameters | query | dictionary | Full query string parameters payload in JSON format. | ||
| sort | query | string | The fields to sort the records on. Supported columns: [application_name application_name_version cid cloud_account_id cloud_account_name cloud_provider cve_id cvss_base_score exprt_rating first_seen_timestamp function_resource_id is_supported layer region runtime severity timestamp type] |
from falconpy import ServerlessVulnerabilities
falcon = ServerlessVulnerabilities(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.get_vulnerabilities(filter="string",
limit=integer,
offset=integer,
sort="string"
)
print(response)from falconpy import ServerlessVulnerabilities
falcon = ServerlessVulnerabilities(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.GetCombinedVulnerabilitiesSARIF(filter="string",
limit=integer,
offset=integer,
sort="string"
)
print(response)from falconpy import APIHarnessV2
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("GetCombinedVulnerabilitiesSARIF",
filter="string",
limit=integer,
offset=integer,
sort="string"
)
print(response)
