finding_addon.proto 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990
  1. // Copyright 2019 Google LLC.
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. //
  15. syntax = "proto3";
  16. package google.cloud.websecurityscanner.v1beta;
  17. option csharp_namespace = "Google.Cloud.WebSecurityScanner.V1Beta";
  18. option go_package = "google.golang.org/genproto/googleapis/cloud/websecurityscanner/v1beta;websecurityscanner";
  19. option java_multiple_files = true;
  20. option java_outer_classname = "FindingAddonProto";
  21. option java_package = "com.google.cloud.websecurityscanner.v1beta";
  22. option php_namespace = "Google\\Cloud\\WebSecurityScanner\\V1beta";
  23. option ruby_package = "Google::Cloud::WebSecurityScanner::V1beta";
  24. // ! Information about a vulnerability with an HTML.
  25. message Form {
  26. // ! The URI where to send the form when it's submitted.
  27. string action_uri = 1;
  28. // ! The names of form fields related to the vulnerability.
  29. repeated string fields = 2;
  30. }
  31. // Information reported for an outdated library.
  32. message OutdatedLibrary {
  33. // The name of the outdated library.
  34. string library_name = 1;
  35. // The version number.
  36. string version = 2;
  37. // URLs to learn more information about the vulnerabilities in the library.
  38. repeated string learn_more_urls = 3;
  39. }
  40. // Information regarding any resource causing the vulnerability such
  41. // as JavaScript sources, image, audio files, etc.
  42. message ViolatingResource {
  43. // The MIME type of this resource.
  44. string content_type = 1;
  45. // URL of this violating resource.
  46. string resource_url = 2;
  47. }
  48. // Information about vulnerable request parameters.
  49. message VulnerableParameters {
  50. // The vulnerable parameter names.
  51. repeated string parameter_names = 1;
  52. }
  53. // Information about vulnerable or missing HTTP Headers.
  54. message VulnerableHeaders {
  55. // Describes a HTTP Header.
  56. message Header {
  57. // Header name.
  58. string name = 1;
  59. // Header value.
  60. string value = 2;
  61. }
  62. // List of vulnerable headers.
  63. repeated Header headers = 1;
  64. // List of missing headers.
  65. repeated Header missing_headers = 2;
  66. }
  67. // Information reported for an XSS.
  68. message Xss {
  69. // Stack traces leading to the point where the XSS occurred.
  70. repeated string stack_traces = 1;
  71. // An error message generated by a javascript breakage.
  72. string error_message = 2;
  73. }