Internet Explorer is no longer supported. Many things will still work, but your experience will be degraded and some things won't function. Please use a modern browser such as Edge, Chrome, or Firefox.

Assess Vulnerabilities

view on GitHub

Assess Vulnerabilities is available as both a pgutil command and an HTTP Request, and will assess a vulnerability according to the specified query arguments.

Command Specification (CLI)

The vulns assess command is used to assess a vulnerability.

The --id, and --type options are always required.

Assessing a vulnerability requires the vulnerability id (e.g. PGV-1234567) and assessment type (e.g. blocked):

pgutil vulns assess --id=PGV-1234567  --type=blocked  --comment="Package non-compliant" --policy=myPolicy

HTTP Request Specification

To assess a vulnerability, simply POST to the URL with a vulnerability id, assessment type, comment and policy parameters, and an appropriate API Key.

POST api/sca/assess[?id=«vulnerability-id»][&type=«assessment-type»][&comment=«comment»][&policy=«policy-name»]

Note that the comment and policy parameters are optional.

HTTP Response Specification

The vulnerability will be assessed on a successful 200 response. A 403 response indicates a missing, unknown, or unauthorized API Key.