Description: Get specific content in an Exposures report.
Security: Requires a user with the Manage Reports role.
Usage: POST /xray/api/v1/reports/exposures/{id}
Produces: application/json
Path Parameters
Name | Type | Required/Optional | Description |
---|---|---|---|
| int | Required | Requested report id |
Pagination Query Parameters
Parameter | Description |
---|---|
| desc/asc |
| Number of pages to present |
| Number of rows per page |
| Order of presentation |
Response Body
Name | Type | Description |
---|---|---|
| int | Total number of rows |
| object<Report Row> | Report row list |
Report Row
Name | Type | Description |
---|---|---|
| string | One of [ |
| string | JFrog severity level. |
| string | The exposure id. i.e. |
| string | The exposure description |
| string | The path of the file where the exposure was found |
| string | The exposure location within the file. i.e. |
| string | The name of the repository where the Artifact is stored |
| string | The name of the Artifact |
| string | CWE i.e. |
| string | The evidence that was found |
| string | The scanner's origin. One of [ |
| string | Token provider (for token only) |
| string | If the token validation feature is enabled, this would be the result if trying to authenticate the token with the provider. One of [ |
| string | Token provider metadata. |
Response Codes
Status Code | Description |
---|---|
200 | OK |
400 | Bad request - Required fields are missing |
403 | Permission denied |
404 | Not found |
500 | Internal server error |
Sample Request
{{base_url}}/xray/api/v1/reports/exposures/3?direction=asc&page_num=1&num_of_rows=10
Successful Response Sample
200 OK
{ "total_rows": 2, "rows": [ { "category": "secrets", "jfrog_severity": "high", "exposures_id": "EXP-1235-00001", "description": "Plaintext API keys found", "file_path": "/exposures/req.secret.keys.py", "location": "Line Number: 2", "repository": "louis-vv18-exposures-report", "impacted_artifact": "docker://xmas:regular_louis_f42172", "cwe": "CWE-256", "evidence": "SqcyD**********", "origin": "jfrog", "provider": "aws_access" }, { "category": "secrets", "jfrog_severity": "high", "exposures_id": "EXP-1235-00002", "description": "Plaintext API keys found", "file_path": "/exposures/req.secret.keys.py", "location": "Line Number: 3", "repository": "louis-vv18-exposures-report", "impacted_artifact": "docker://xmas:regular_louis_f42172", "cwe": "CWE-256", "evidence": "gho_D**********", "origin": "jfrog", "provider": "github" } ] }