diff --git a/openapi.json b/openapi.json index 1dfe231d..1ea8ab96 100644 --- a/openapi.json +++ b/openapi.json @@ -13814,6 +13814,302 @@ "x-readme": {} } }, + "/orgs/{org_slug}/full-scans/{full_scan_id}/format/csv": { + "post": { + "tags": [ + "Full Scans" + ], + "summary": "Export CSV of alerts for full scan", + "operationId": "getOrgFullScanCsv", + "parameters": [ + { + "name": "org_slug", + "in": "path", + "required": true, + "description": "The slug of the organization", + "schema": { + "type": "string" + } + }, + { + "name": "full_scan_id", + "in": "path", + "required": true, + "description": "The ID of the full scan", + "schema": { + "type": "string" + } + }, + { + "name": "include_alert_priority_details", + "in": "query", + "required": false, + "description": "Control which alert priority fields to include in the response. Set to \"true\" to include all fields, \"false\" to exclude all fields, or specify individual fields like \"components,formula\" to include only those fields.", + "schema": { + "oneOf": [ + { + "type": "boolean", + "default": false + }, + { + "type": "array", + "items": { + "type": "string", + "enum": [ + "component", + "formula" + ] + } + } + ], + "default": false + } + }, + { + "name": "include_license_details", + "in": "query", + "required": true, + "description": "Include license details in the response.", + "schema": { + "type": "boolean", + "default": false + } + } + ], + "requestBody": { + "content": { + "application/json": { + "schema": { + "type": "object", + "additionalProperties": false, + "properties": { + "filters": { + "type": "array", + "items": { + "type": "object", + "additionalProperties": false, + "description": "", + "properties": { + "id": { + "type": "string", + "description": "", + "default": "" + }, + "value": { + "type": "array", + "items": { + "type": "string", + "description": "", + "default": "" + }, + "description": "" + } + }, + "required": [ + "id", + "value" + ] + }, + "description": "" + } + } + } + } + }, + "required": false + }, + "security": [ + { + "bearerAuth": [ + "full-scans:list" + ] + }, + { + "basicAuth": [ + "full-scans:list" + ] + } + ], + "description": "Export a CSV file containing all alerts from a full scan.\n\nThe CSV includes details about each alert and the affected packages.\nYou can optionally filter using the request body \"filters\" array. Supported filter IDs include:\n- alert.action (error|warn|monitor|ignore)\n- alert.type\n- alert.category\n- alert.severity (low|medium|middle|high|critical or 0-3)\n- artifact.type (purl type, e.g. npm, pypi)\n- dependency.type (direct|transitive)\n- dependency.scope (dev|normal)\n- dependency.usage (used|unused)\n- manifest.file\n\nThis endpoint consumes 1 unit of your quota.\n\nThis endpoint requires the following org token scopes:\n- full-scans:list", + "responses": { + "200": { + "content": { + "text/csv": {} + }, + "description": "CSV export of alerts" + }, + "400": { + "$ref": "#/components/responses/SocketBadRequest" + }, + "401": { + "$ref": "#/components/responses/SocketUnauthorized" + }, + "403": { + "$ref": "#/components/responses/SocketForbidden" + }, + "404": { + "$ref": "#/components/responses/SocketNotFoundResponse" + }, + "429": { + "$ref": "#/components/responses/SocketTooManyRequestsResponse" + } + }, + "x-readme": {} + } + }, + "/orgs/{org_slug}/full-scans/{full_scan_id}/format/pdf": { + "post": { + "tags": [ + "Full Scans" + ], + "summary": "Generate PDF report for full scan", + "operationId": "getOrgFullScanPdf", + "parameters": [ + { + "name": "org_slug", + "in": "path", + "required": true, + "description": "The slug of the organization", + "schema": { + "type": "string" + } + }, + { + "name": "full_scan_id", + "in": "path", + "required": true, + "description": "The ID of the full scan", + "schema": { + "type": "string" + } + }, + { + "name": "include_alert_priority_details", + "in": "query", + "required": false, + "description": "Control which alert priority fields to include in the response. Set to \"true\" to include all fields, \"false\" to exclude all fields, or specify individual fields like \"components,formula\" to include only those fields.", + "schema": { + "oneOf": [ + { + "type": "boolean", + "default": false + }, + { + "type": "array", + "items": { + "type": "string", + "enum": [ + "component", + "formula" + ] + } + } + ], + "default": false + } + }, + { + "name": "include_license_details", + "in": "query", + "required": true, + "description": "Include license details in the response.", + "schema": { + "type": "boolean", + "default": false + } + } + ], + "requestBody": { + "content": { + "application/json": { + "schema": { + "type": "object", + "additionalProperties": false, + "properties": { + "filters": { + "type": "array", + "items": { + "type": "object", + "additionalProperties": false, + "description": "", + "properties": { + "id": { + "type": "string", + "description": "", + "default": "" + }, + "value": { + "type": "array", + "items": { + "type": "string", + "description": "", + "default": "" + }, + "description": "" + } + }, + "required": [ + "id", + "value" + ] + }, + "description": "" + }, + "groupBy": { + "type": "string", + "description": "", + "default": "" + }, + "additionalInformation": { + "type": "string", + "description": "", + "default": "" + } + } + } + } + }, + "required": false + }, + "security": [ + { + "bearerAuth": [ + "full-scans:list" + ] + }, + { + "basicAuth": [ + "full-scans:list" + ] + } + ], + "description": "Generate a PDF report for all alerts in a full scan.\n\nThis endpoint streams a PDF document containing all alerts found in the full scan,\nwith optional filtering and grouping options.\n\nSupported request body filter IDs include:\n- alert.action (error|warn|monitor|ignore)\n- alert.type\n- alert.category\n- alert.severity (low|medium|middle|high|critical or 0-3)\n- artifact.type (purl type, e.g. npm, pypi)\n- dependency.type (direct|transitive)\n- dependency.scope (dev|normal)\n- dependency.usage (used|unused)\n- manifest.file\n\nThis endpoint consumes 1 unit of your quota.\n\nThis endpoint requires the following org token scopes:\n- full-scans:list", + "responses": { + "200": { + "content": { + "application/pdf": {} + }, + "description": "PDF report of alerts" + }, + "400": { + "$ref": "#/components/responses/SocketBadRequest" + }, + "401": { + "$ref": "#/components/responses/SocketUnauthorized" + }, + "403": { + "$ref": "#/components/responses/SocketForbidden" + }, + "404": { + "$ref": "#/components/responses/SocketNotFoundResponse" + }, + "429": { + "$ref": "#/components/responses/SocketTooManyRequestsResponse" + } + }, + "x-readme": {} + } + }, "/orgs/{org_slug}/export/cdx/{id}": { "get": { "tags": [ @@ -16371,7 +16667,7 @@ }, "package_version": { "type": "string", - "description": "The package version associated with the triage state", + "description": "The package version associated with the triage state, it can contain a * suffix for wildcard matching", "default": "", "nullable": true }, @@ -16467,6 +16763,16 @@ "schema": { "type": "string" } + }, + { + "name": "force", + "in": "query", + "required": false, + "description": "Set to true to force broad triage updates, these are triages lacking a specific alertKey or granular artifact information which may have limited introspection to see what they apply to.", + "schema": { + "type": "string", + "default": "false" + } } ], "requestBody": { @@ -16486,32 +16792,38 @@ "uuid": { "type": "string", "description": "", - "default": "" + "default": "", + "nullable": true }, "packageType": { "type": "string", "description": "", - "default": "" + "default": "", + "nullable": true }, "packageNamespace": { "type": "string", "description": "", - "default": "" + "default": "", + "nullable": true }, "packageName": { "type": "string", "description": "", - "default": "" + "default": "", + "nullable": true }, "packageVersion": { "type": "string", "description": "", - "default": "" + "default": "", + "nullable": true }, "alertKey": { "type": "string", "description": "", - "default": "" + "default": "", + "nullable": true }, "note": { "type": "string", @@ -16555,9 +16867,9 @@ ] } ], - "description": "Update triage actions on organizaton alerts.\n\nThis endpoint consumes 1 unit of your quota.\n\nThis endpoint requires the following org token scopes:\n- triage:alerts-update", + "description": "Update triage actions on organization alerts.\n\nThis endpoint consumes 1 unit of your quota.\n\nThis endpoint requires the following org token scopes:\n- triage:alerts-update", "responses": { - "202": { + "200": { "content": { "application/json": { "schema": { @@ -16598,6 +16910,88 @@ "x-readme": {} } }, + "/orgs/{org_slug}/triage/alerts/{uuid}": { + "delete": { + "tags": [ + "Triage" + ], + "summary": "Delete Org Alert Triage", + "operationId": "deleteOrgAlertTriage", + "parameters": [ + { + "name": "org_slug", + "in": "path", + "required": true, + "description": "The slug of the organization", + "schema": { + "type": "string" + } + }, + { + "name": "uuid", + "in": "path", + "required": true, + "description": "The UUID of the alert triage entry to delete", + "schema": { + "type": "string" + } + } + ], + "security": [ + { + "bearerAuth": [ + "triage:alerts-update" + ] + }, + { + "basicAuth": [ + "triage:alerts-update" + ] + } + ], + "description": "Delete a specific triage rule by UUID.\n\nThis endpoint consumes 1 unit of your quota.\n\nThis endpoint requires the following org token scopes:\n- triage:alerts-update", + "responses": { + "200": { + "content": { + "application/json": { + "schema": { + "type": "object", + "additionalProperties": false, + "description": "", + "properties": { + "result": { + "type": "string", + "description": "", + "default": "" + } + }, + "required": [ + "result" + ] + } + } + }, + "description": "Deleted Alert Triage" + }, + "400": { + "$ref": "#/components/responses/SocketBadRequest" + }, + "401": { + "$ref": "#/components/responses/SocketUnauthorized" + }, + "403": { + "$ref": "#/components/responses/SocketForbidden" + }, + "404": { + "$ref": "#/components/responses/SocketNotFoundResponse" + }, + "429": { + "$ref": "#/components/responses/SocketTooManyRequestsResponse" + } + }, + "x-readme": {} + } + }, "/orgs/{org_slug}/repos": { "get": { "tags": [ @@ -32867,6 +33261,24 @@ "type": "string" } }, + { + "name": "filters.cvePatchStatus", + "in": "query", + "required": false, + "description": "Comma-separated list of patch statuses (\"patch_unavailable\", \"patch_available\", or \"patch_applied\") that should be included", + "schema": { + "type": "string" + } + }, + { + "name": "filters.cvePatchStatus.notIn", + "in": "query", + "required": false, + "description": "Comma-separated list of patch statuses (\"patch_unavailable\", \"patch_available\", or \"patch_applied\") that should be excluded", + "schema": { + "type": "string" + } + }, { "name": "filters.dependencyDead", "in": "query", @@ -33638,6 +34050,24 @@ }, "description": "Comma-separated list of artifact types (e.g. \"npm\", \"pypi\", \"gem\", \"maven\", \"golang\", etc.) that should be excluded" }, + "cvePatchStatus": { + "type": "array", + "items": { + "type": "string", + "description": "", + "default": "" + }, + "description": "Comma-separated list of patch statuses (\"patch_unavailable\", \"patch_available\", or \"patch_applied\") that should be included" + }, + "cvePatchStatus.notIn": { + "type": "array", + "items": { + "type": "string", + "description": "", + "default": "" + }, + "description": "Comma-separated list of patch statuses (\"patch_unavailable\", \"patch_available\", or \"patch_applied\") that should be excluded" + }, "dependencyDead": { "type": "array", "items": { @@ -33800,7 +34230,7 @@ "name": "aggregation.fields", "in": "query", "required": false, - "description": "Comma-separated list of fields that should be used for count aggregation (allowed: alertSeverity,repoSlug,repoFullName,repoLabels,alertType,artifactType,alertAction,alertActionSourceType,alertFixType,alertCategory,alertCveId,alertCveTitle,alertCweId,alertCweName,alertReachabilityType,alertReachabilityAnalysisType,alertPriority,alertKEV,alertEPSS,dependencyDirect,dependencyDev,dependencyDead)", + "description": "Comma-separated list of fields that should be used for count aggregation (allowed: alertSeverity,repoSlug,repoFullName,repoLabels,alertType,artifactType,alertAction,alertActionSourceType,alertFixType,alertCategory,alertCveId,alertCveTitle,alertCweId,alertCweName,alertReachabilityType,cvePatchStatus,alertReachabilityAnalysisType,alertPriority,alertKEV,alertEPSS,dependencyDirect,dependencyDev,dependencyDead)", "schema": { "type": "string", "default": "" @@ -34114,6 +34544,24 @@ "type": "string" } }, + { + "name": "filters.cvePatchStatus", + "in": "query", + "required": false, + "description": "Comma-separated list of patch statuses (\"patch_unavailable\", \"patch_available\", or \"patch_applied\") that should be included", + "schema": { + "type": "string" + } + }, + { + "name": "filters.cvePatchStatus.notIn", + "in": "query", + "required": false, + "description": "Comma-separated list of patch statuses (\"patch_unavailable\", \"patch_available\", or \"patch_applied\") that should be excluded", + "schema": { + "type": "string" + } + }, { "name": "filters.dependencyDead", "in": "query", @@ -34610,6 +35058,24 @@ }, "description": "Comma-separated list of artifact types (e.g. \"npm\", \"pypi\", \"gem\", \"maven\", \"golang\", etc.) that should be excluded" }, + "cvePatchStatus": { + "type": "array", + "items": { + "type": "string", + "description": "", + "default": "" + }, + "description": "Comma-separated list of patch statuses (\"patch_unavailable\", \"patch_available\", or \"patch_applied\") that should be included" + }, + "cvePatchStatus.notIn": { + "type": "array", + "items": { + "type": "string", + "description": "", + "default": "" + }, + "description": "Comma-separated list of patch statuses (\"patch_unavailable\", \"patch_available\", or \"patch_applied\") that should be excluded" + }, "dependencyDead": { "type": "array", "items": { @@ -35790,6 +36256,7 @@ "CreateArtifact", "CreateLabel", "CreateWebhook", + "DeleteAlertTriage", "DeleteApiToken", "DeleteFullScan", "DeleteLabel", @@ -36105,6 +36572,8 @@ "socket-basics:read", "telemetry-policy", "telemetry-policy:update", + "telemetry-events", + "telemetry-events:list", "threat-feed", "threat-feed:list", "triage", @@ -36548,6 +37017,8 @@ "socket-basics:read", "telemetry-policy", "telemetry-policy:update", + "telemetry-events", + "telemetry-events:list", "threat-feed", "threat-feed:list", "triage", @@ -36729,6 +37200,8 @@ "socket-basics:read", "telemetry-policy", "telemetry-policy:update", + "telemetry-events", + "telemetry-events:list", "threat-feed", "threat-feed:list", "triage", @@ -39698,6 +40171,24 @@ "type": "string" } }, + { + "name": "filters.cvePatchStatus", + "in": "query", + "required": false, + "description": "Comma-separated list of patch statuses (\"patch_unavailable\", \"patch_available\", or \"patch_applied\") that should be included", + "schema": { + "type": "string" + } + }, + { + "name": "filters.cvePatchStatus.notIn", + "in": "query", + "required": false, + "description": "Comma-separated list of patch statuses (\"patch_unavailable\", \"patch_available\", or \"patch_applied\") that should be excluded", + "schema": { + "type": "string" + } + }, { "name": "filters.dependencyDead", "in": "query", @@ -40859,6 +41350,24 @@ }, "description": "Comma-separated list of artifact types (e.g. \"npm\", \"pypi\", \"gem\", \"maven\", \"golang\", etc.) that should be excluded" }, + "cvePatchStatus": { + "type": "array", + "items": { + "type": "string", + "description": "", + "default": "" + }, + "description": "Comma-separated list of patch statuses (\"patch_unavailable\", \"patch_available\", or \"patch_applied\") that should be included" + }, + "cvePatchStatus.notIn": { + "type": "array", + "items": { + "type": "string", + "description": "", + "default": "" + }, + "description": "Comma-separated list of patch statuses (\"patch_unavailable\", \"patch_available\", or \"patch_applied\") that should be excluded" + }, "dependencyDead": { "type": "array", "items": { diff --git a/types/api.d.ts b/types/api.d.ts index 9a8f12b9..0c376354 100644 --- a/types/api.d.ts +++ b/types/api.d.ts @@ -257,6 +257,56 @@ export interface paths { */ post: operations['rescanOrgFullScan'] } + '/orgs/{org_slug}/full-scans/{full_scan_id}/format/csv': { + /** + * Export CSV of alerts for full scan + * @description Export a CSV file containing all alerts from a full scan. + * + * The CSV includes details about each alert and the affected packages. + * You can optionally filter using the request body "filters" array. Supported filter IDs include: + * - alert.action (error|warn|monitor|ignore) + * - alert.type + * - alert.category + * - alert.severity (low|medium|middle|high|critical or 0-3) + * - artifact.type (purl type, e.g. npm, pypi) + * - dependency.type (direct|transitive) + * - dependency.scope (dev|normal) + * - dependency.usage (used|unused) + * - manifest.file + * + * This endpoint consumes 1 unit of your quota. + * + * This endpoint requires the following org token scopes: + * - full-scans:list + */ + post: operations['getOrgFullScanCsv'] + } + '/orgs/{org_slug}/full-scans/{full_scan_id}/format/pdf': { + /** + * Generate PDF report for full scan + * @description Generate a PDF report for all alerts in a full scan. + * + * This endpoint streams a PDF document containing all alerts found in the full scan, + * with optional filtering and grouping options. + * + * Supported request body filter IDs include: + * - alert.action (error|warn|monitor|ignore) + * - alert.type + * - alert.category + * - alert.severity (low|medium|middle|high|critical or 0-3) + * - artifact.type (purl type, e.g. npm, pypi) + * - dependency.type (direct|transitive) + * - dependency.scope (dev|normal) + * - dependency.usage (used|unused) + * - manifest.file + * + * This endpoint consumes 1 unit of your quota. + * + * This endpoint requires the following org token scopes: + * - full-scans:list + */ + post: operations['getOrgFullScanPdf'] + } '/orgs/{org_slug}/export/cdx/{id}': { /** * Export CycloneDX SBOM (Beta) @@ -426,7 +476,7 @@ export interface paths { get: operations['getOrgTriage'] /** * Update Org Alert Triage - * @description Update triage actions on organizaton alerts. + * @description Update triage actions on organization alerts. * * This endpoint consumes 1 unit of your quota. * @@ -435,6 +485,18 @@ export interface paths { */ post: operations['updateOrgAlertTriage'] } + '/orgs/{org_slug}/triage/alerts/{uuid}': { + /** + * Delete Org Alert Triage + * @description Delete a specific triage rule by UUID. + * + * This endpoint consumes 1 unit of your quota. + * + * This endpoint requires the following org token scopes: + * - triage:alerts-update + */ + delete: operations['deleteOrgAlertTriage'] + } '/orgs/{org_slug}/repos': { /** * List repositories @@ -6226,6 +6288,138 @@ export interface operations { 429: components['responses']['SocketTooManyRequestsResponse'] } } + /** + * Export CSV of alerts for full scan + * @description Export a CSV file containing all alerts from a full scan. + * + * The CSV includes details about each alert and the affected packages. + * You can optionally filter using the request body "filters" array. Supported filter IDs include: + * - alert.action (error|warn|monitor|ignore) + * - alert.type + * - alert.category + * - alert.severity (low|medium|middle|high|critical or 0-3) + * - artifact.type (purl type, e.g. npm, pypi) + * - dependency.type (direct|transitive) + * - dependency.scope (dev|normal) + * - dependency.usage (used|unused) + * - manifest.file + * + * This endpoint consumes 1 unit of your quota. + * + * This endpoint requires the following org token scopes: + * - full-scans:list + */ + getOrgFullScanCsv: { + parameters: { + query: { + /** @description Control which alert priority fields to include in the response. Set to "true" to include all fields, "false" to exclude all fields, or specify individual fields like "components,formula" to include only those fields. */ + include_alert_priority_details?: + | boolean + | Array<'component' | 'formula'> + /** @description Include license details in the response. */ + include_license_details: boolean + } + path: { + /** @description The slug of the organization */ + org_slug: string + /** @description The ID of the full scan */ + full_scan_id: string + } + } + requestBody?: { + content: { + 'application/json': { + filters?: Array<{ + /** @default */ + id: string + value: string[] + }> + } + } + } + responses: { + /** @description CSV export of alerts */ + 200: { + content: { + 'text/csv': unknown + } + } + 400: components['responses']['SocketBadRequest'] + 401: components['responses']['SocketUnauthorized'] + 403: components['responses']['SocketForbidden'] + 404: components['responses']['SocketNotFoundResponse'] + 429: components['responses']['SocketTooManyRequestsResponse'] + } + } + /** + * Generate PDF report for full scan + * @description Generate a PDF report for all alerts in a full scan. + * + * This endpoint streams a PDF document containing all alerts found in the full scan, + * with optional filtering and grouping options. + * + * Supported request body filter IDs include: + * - alert.action (error|warn|monitor|ignore) + * - alert.type + * - alert.category + * - alert.severity (low|medium|middle|high|critical or 0-3) + * - artifact.type (purl type, e.g. npm, pypi) + * - dependency.type (direct|transitive) + * - dependency.scope (dev|normal) + * - dependency.usage (used|unused) + * - manifest.file + * + * This endpoint consumes 1 unit of your quota. + * + * This endpoint requires the following org token scopes: + * - full-scans:list + */ + getOrgFullScanPdf: { + parameters: { + query: { + /** @description Control which alert priority fields to include in the response. Set to "true" to include all fields, "false" to exclude all fields, or specify individual fields like "components,formula" to include only those fields. */ + include_alert_priority_details?: + | boolean + | Array<'component' | 'formula'> + /** @description Include license details in the response. */ + include_license_details: boolean + } + path: { + /** @description The slug of the organization */ + org_slug: string + /** @description The ID of the full scan */ + full_scan_id: string + } + } + requestBody?: { + content: { + 'application/json': { + filters?: Array<{ + /** @default */ + id: string + value: string[] + }> + /** @default */ + groupBy?: string + /** @default */ + additionalInformation?: string + } + } + } + responses: { + /** @description PDF report of alerts */ + 200: { + content: { + 'application/pdf': unknown + } + } + 400: components['responses']['SocketBadRequest'] + 401: components['responses']['SocketUnauthorized'] + 403: components['responses']['SocketForbidden'] + 404: components['responses']['SocketNotFoundResponse'] + 429: components['responses']['SocketTooManyRequestsResponse'] + } + } /** * Export CycloneDX SBOM (Beta) * @description Export a Socket SBOM as a CycloneDX SBOM @@ -7112,7 +7306,7 @@ export interface operations { */ package_name?: string | null /** - * @description The package version associated with the triage state + * @description The package version associated with the triage state, it can contain a * suffix for wildcard matching * @default */ package_version?: string | null @@ -7162,7 +7356,7 @@ export interface operations { } /** * Update Org Alert Triage - * @description Update triage actions on organizaton alerts. + * @description Update triage actions on organization alerts. * * This endpoint consumes 1 unit of your quota. * @@ -7171,6 +7365,10 @@ export interface operations { */ updateOrgAlertTriage: { parameters: { + query?: { + /** @description Set to true to force broad triage updates, these are triages lacking a specific alertKey or granular artifact information which may have limited introspection to see what they apply to. */ + force?: string + } path: { /** @description The slug of the organization */ org_slug: string @@ -7181,17 +7379,17 @@ export interface operations { 'application/json': { alertTriage: Array<{ /** @default */ - uuid?: string + uuid?: string | null /** @default */ - packageType?: string + packageType?: string | null /** @default */ - packageNamespace?: string + packageNamespace?: string | null /** @default */ - packageName?: string + packageName?: string | null /** @default */ - packageVersion?: string + packageVersion?: string | null /** @default */ - alertKey?: string + alertKey?: string | null /** @default */ note?: string /** @@ -7205,7 +7403,42 @@ export interface operations { } responses: { /** @description Updated Alert Triage */ - 202: { + 200: { + content: { + 'application/json': { + /** @default */ + result: string + } + } + } + 400: components['responses']['SocketBadRequest'] + 401: components['responses']['SocketUnauthorized'] + 403: components['responses']['SocketForbidden'] + 404: components['responses']['SocketNotFoundResponse'] + 429: components['responses']['SocketTooManyRequestsResponse'] + } + } + /** + * Delete Org Alert Triage + * @description Delete a specific triage rule by UUID. + * + * This endpoint consumes 1 unit of your quota. + * + * This endpoint requires the following org token scopes: + * - triage:alerts-update + */ + deleteOrgAlertTriage: { + parameters: { + path: { + /** @description The slug of the organization */ + org_slug: string + /** @description The UUID of the alert triage entry to delete */ + uuid: string + } + } + responses: { + /** @description Deleted Alert Triage */ + 200: { content: { 'application/json': { /** @default */ @@ -13495,6 +13728,10 @@ export interface operations { 'filters.artifactType'?: string /** @description Comma-separated list of artifact types (e.g. "npm", "pypi", "gem", "maven", "golang", etc.) that should be excluded */ 'filters.artifactType.notIn'?: string + /** @description Comma-separated list of patch statuses ("patch_unavailable", "patch_available", or "patch_applied") that should be included */ + 'filters.cvePatchStatus'?: string + /** @description Comma-separated list of patch statuses ("patch_unavailable", "patch_available", or "patch_applied") that should be excluded */ + 'filters.cvePatchStatus.notIn'?: string /** @description Dead/reachable dependency filter flag */ 'filters.dependencyDead'?: boolean /** @description Dead/reachable dependency filter flag */ @@ -13694,6 +13931,10 @@ export interface operations { artifactType?: string[] /** @description Comma-separated list of artifact types (e.g. "npm", "pypi", "gem", "maven", "golang", etc.) that should be excluded */ 'artifactType.notIn'?: string[] + /** @description Comma-separated list of patch statuses ("patch_unavailable", "patch_available", or "patch_applied") that should be included */ + cvePatchStatus?: string[] + /** @description Comma-separated list of patch statuses ("patch_unavailable", "patch_available", or "patch_applied") that should be excluded */ + 'cvePatchStatus.notIn'?: string[] /** @description Dead/reachable dependency filter flag */ dependencyDead?: boolean[] /** @description Development/production dependency filter flag */ @@ -13739,7 +13980,7 @@ export interface operations { date?: string /** @description The number of days of data to fetch as an offset from input date */ range?: string - /** @description Comma-separated list of fields that should be used for count aggregation (allowed: alertSeverity,repoSlug,repoFullName,repoLabels,alertType,artifactType,alertAction,alertActionSourceType,alertFixType,alertCategory,alertCveId,alertCveTitle,alertCweId,alertCweName,alertReachabilityType,alertReachabilityAnalysisType,alertPriority,alertKEV,alertEPSS,dependencyDirect,dependencyDev,dependencyDead) */ + /** @description Comma-separated list of fields that should be used for count aggregation (allowed: alertSeverity,repoSlug,repoFullName,repoLabels,alertType,artifactType,alertAction,alertActionSourceType,alertFixType,alertCategory,alertCveId,alertCveTitle,alertCweId,alertCweName,alertReachabilityType,cvePatchStatus,alertReachabilityAnalysisType,alertPriority,alertKEV,alertEPSS,dependencyDirect,dependencyDev,dependencyDead) */ 'aggregation.fields'?: string /** @description Comma-separated list of alert actions ("error", "warn", "monitor", or "ignore) that should be included */ 'filters.alertAction'?: string @@ -13809,6 +14050,10 @@ export interface operations { 'filters.artifactType'?: string /** @description Comma-separated list of artifact types (e.g. "npm", "pypi", "gem", "maven", "golang", etc.) that should be excluded */ 'filters.artifactType.notIn'?: string + /** @description Comma-separated list of patch statuses ("patch_unavailable", "patch_available", or "patch_applied") that should be included */ + 'filters.cvePatchStatus'?: string + /** @description Comma-separated list of patch statuses ("patch_unavailable", "patch_available", or "patch_applied") that should be excluded */ + 'filters.cvePatchStatus.notIn'?: string /** @description Dead/reachable dependency filter flag */ 'filters.dependencyDead'?: boolean /** @description Dead/reachable dependency filter flag */ @@ -13924,6 +14169,10 @@ export interface operations { artifactType?: string[] /** @description Comma-separated list of artifact types (e.g. "npm", "pypi", "gem", "maven", "golang", etc.) that should be excluded */ 'artifactType.notIn'?: string[] + /** @description Comma-separated list of patch statuses ("patch_unavailable", "patch_available", or "patch_applied") that should be included */ + cvePatchStatus?: string[] + /** @description Comma-separated list of patch statuses ("patch_unavailable", "patch_available", or "patch_applied") that should be excluded */ + 'cvePatchStatus.notIn'?: string[] /** @description Dead/reachable dependency filter flag */ dependencyDead?: boolean[] /** @description Development/production dependency filter flag */ @@ -14307,6 +14556,7 @@ export interface operations { | 'CreateArtifact' | 'CreateLabel' | 'CreateWebhook' + | 'DeleteAlertTriage' | 'DeleteApiToken' | 'DeleteFullScan' | 'DeleteLabel' @@ -14570,6 +14820,8 @@ export interface operations { | 'socket-basics:read' | 'telemetry-policy' | 'telemetry-policy:update' + | 'telemetry-events' + | 'telemetry-events:list' | 'threat-feed' | 'threat-feed:list' | 'triage' @@ -14698,6 +14950,8 @@ export interface operations { | 'socket-basics:read' | 'telemetry-policy' | 'telemetry-policy:update' + | 'telemetry-events' + | 'telemetry-events:list' | 'threat-feed' | 'threat-feed:list' | 'triage' @@ -14889,6 +15143,8 @@ export interface operations { | 'socket-basics:read' | 'telemetry-policy' | 'telemetry-policy:update' + | 'telemetry-events' + | 'telemetry-events:list' | 'threat-feed' | 'threat-feed:list' | 'triage' @@ -16256,6 +16512,10 @@ export interface operations { 'filters.artifactType'?: string /** @description Comma-separated list of artifact types (e.g. "npm", "pypi", "gem", "maven", "golang", etc.) that should be excluded */ 'filters.artifactType.notIn'?: string + /** @description Comma-separated list of patch statuses ("patch_unavailable", "patch_available", or "patch_applied") that should be included */ + 'filters.cvePatchStatus'?: string + /** @description Comma-separated list of patch statuses ("patch_unavailable", "patch_available", or "patch_applied") that should be excluded */ + 'filters.cvePatchStatus.notIn'?: string /** @description Dead/reachable dependency filter flag */ 'filters.dependencyDead'?: boolean /** @description Dead/reachable dependency filter flag */ @@ -16546,6 +16806,10 @@ export interface operations { artifactType?: string[] /** @description Comma-separated list of artifact types (e.g. "npm", "pypi", "gem", "maven", "golang", etc.) that should be excluded */ 'artifactType.notIn'?: string[] + /** @description Comma-separated list of patch statuses ("patch_unavailable", "patch_available", or "patch_applied") that should be included */ + cvePatchStatus?: string[] + /** @description Comma-separated list of patch statuses ("patch_unavailable", "patch_available", or "patch_applied") that should be excluded */ + 'cvePatchStatus.notIn'?: string[] /** @description Dead/reachable dependency filter flag */ dependencyDead?: boolean[] /** @description Development/production dependency filter flag */