Description:Lists all the results from the scan of a specific artifact.
Since: 3.59.4
Security:Requires a valid user with the "Read" permissions.
Usage: GET /xray/api/v1/{category}/results?repo={repo}&path={path}
Query parameters:
repo -repository name
path -path to artifact
Pagination and Ordering: Setting pagination and ordering parameters is optional. The list of parameters includes:
page_num: Starting from 1 to any number of pages. default=1.
num_of_rows: Starting from 1 to any number of rows that are included in a page. default=10
order_by: status, jfrog_severity, exposure_id, description, file_path, cwe, fix_cost, outcomes
direction: asc/desc
Filters: Use the supported fields below to filter results. E.g. ?cwe=CWE-798,CWE-799
status
jfrog_severity
cwe
fix_cost
outcomes
Search:Input string will be searched for in the results' "description".
Produces: application/json
Sample Request 1
GET /api/v1/applications/results?repo=my_repo&path=/backend/latest/manifest.json
Sample Response 1
{
"data": [
{
"status": "to_fix",
"jfrog_severity": "high",
"id": "EXP-1058-00001",
"description": "Node.js does not enforce TLS on all web communications",
"abbreviation": "REQ.WEB.NODE-JS.TLS",
"cwe": {
"cwe_id": "CWE-319",
"cwe_name": "Cleartext Transmission of Sensitive Information"
},
"outcomes": [
"Traffic interception",
"Traffic manipulation"
],
"fix_cost": "medium"
},
...
],
"total_count": 10
}Sample Request 2
GET /api/v1/secrets/results?repo=my_repo&path=/backend/latest/manifest.json&search=Python&order_by=fix_cost&status=to_fix&cwe=CWE-798
Sample Response 2
{
"data": [
{
"status": "to_fix",
"jfrog_severity": "low",
"id": "EXP-1519-00001",
"description": "Hardcoded random buffer was found (Python)",
"abbreviation": "REQ.PYTHON.HARDCODED-SECRETS",
"cwe": {
"cwe_id": "CWE-798",
"cwe_name": "Use of Hard-coded Credentials"
},
"outcomes": [
"Credential extraction"
],
"fix_cost": "low"
}
],
"total_count": 1
}