You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 

323 lines
14 KiB

  1. // Code generated by protoc-gen-go. DO NOT EDIT.
  2. // source: google/cloud/websecurityscanner/v1alpha/finding.proto
  3. package websecurityscanner // import "google.golang.org/genproto/googleapis/cloud/websecurityscanner/v1alpha"
  4. import proto "github.com/golang/protobuf/proto"
  5. import fmt "fmt"
  6. import math "math"
  7. import _ "google.golang.org/genproto/googleapis/api/annotations"
  8. // Reference imports to suppress errors if they are not otherwise used.
  9. var _ = proto.Marshal
  10. var _ = fmt.Errorf
  11. var _ = math.Inf
  12. // This is a compile-time assertion to ensure that this generated file
  13. // is compatible with the proto package it is being compiled against.
  14. // A compilation error at this line likely means your copy of the
  15. // proto package needs to be updated.
  16. const _ = proto.ProtoPackageIsVersion2 // please upgrade the proto package
  17. // Types of Findings.
  18. type Finding_FindingType int32
  19. const (
  20. // The invalid finding type.
  21. Finding_FINDING_TYPE_UNSPECIFIED Finding_FindingType = 0
  22. // A page that was served over HTTPS also resources over HTTP. A
  23. // man-in-the-middle attacker could tamper with the HTTP resource and gain
  24. // full access to the website that loads the resource or to monitor the
  25. // actions taken by the user.
  26. Finding_MIXED_CONTENT Finding_FindingType = 1
  27. // The version of an included library is known to contain a security issue.
  28. // The scanner checks the version of library in use against a known list of
  29. // vulnerable libraries. False positives are possible if the version
  30. // detection fails or if the library has been manually patched.
  31. Finding_OUTDATED_LIBRARY Finding_FindingType = 2
  32. // This type of vulnerability occurs when the value of a request parameter
  33. // is reflected at the beginning of the response, for example, in requests
  34. // using JSONP. Under certain circumstances, an attacker may be able to
  35. // supply an alphanumeric-only Flash file in the vulnerable parameter
  36. // causing the browser to execute the Flash file as if it originated on the
  37. // vulnerable server.
  38. Finding_ROSETTA_FLASH Finding_FindingType = 5
  39. // A cross-site scripting (XSS) bug is found via JavaScript callback. For
  40. // detailed explanations on XSS, see
  41. // https://www.google.com/about/appsecurity/learning/xss/.
  42. Finding_XSS_CALLBACK Finding_FindingType = 3
  43. // A potential cross-site scripting (XSS) bug due to JavaScript breakage.
  44. // In some circumstances, the application under test might modify the test
  45. // string before it is parsed by the browser. When the browser attempts to
  46. // runs this modified test string, it will likely break and throw a
  47. // JavaScript execution error, thus an injection issue is occurring.
  48. // However, it may not be exploitable. Manual verification is needed to see
  49. // if the test string modifications can be evaded and confirm that the issue
  50. // is in fact an XSS vulnerability. For detailed explanations on XSS, see
  51. // https://www.google.com/about/appsecurity/learning/xss/.
  52. Finding_XSS_ERROR Finding_FindingType = 4
  53. // An application appears to be transmitting a password field in clear text.
  54. // An attacker can eavesdrop network traffic and sniff the password field.
  55. Finding_CLEAR_TEXT_PASSWORD Finding_FindingType = 6
  56. )
  57. var Finding_FindingType_name = map[int32]string{
  58. 0: "FINDING_TYPE_UNSPECIFIED",
  59. 1: "MIXED_CONTENT",
  60. 2: "OUTDATED_LIBRARY",
  61. 5: "ROSETTA_FLASH",
  62. 3: "XSS_CALLBACK",
  63. 4: "XSS_ERROR",
  64. 6: "CLEAR_TEXT_PASSWORD",
  65. }
  66. var Finding_FindingType_value = map[string]int32{
  67. "FINDING_TYPE_UNSPECIFIED": 0,
  68. "MIXED_CONTENT": 1,
  69. "OUTDATED_LIBRARY": 2,
  70. "ROSETTA_FLASH": 5,
  71. "XSS_CALLBACK": 3,
  72. "XSS_ERROR": 4,
  73. "CLEAR_TEXT_PASSWORD": 6,
  74. }
  75. func (x Finding_FindingType) String() string {
  76. return proto.EnumName(Finding_FindingType_name, int32(x))
  77. }
  78. func (Finding_FindingType) EnumDescriptor() ([]byte, []int) {
  79. return fileDescriptor_finding_e10fb627a6dc32cd, []int{0, 0}
  80. }
  81. // A Finding resource represents a vulnerability instance identified during a
  82. // ScanRun.
  83. type Finding struct {
  84. // Output only.
  85. // The resource name of the Finding. The name follows the format of
  86. // 'projects/{projectId}/scanConfigs/{scanConfigId}/scanruns/{scanRunId}/findings/{findingId}'.
  87. // The finding IDs are generated by the system.
  88. Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
  89. // Output only.
  90. // The type of the Finding.
  91. FindingType Finding_FindingType `protobuf:"varint,2,opt,name=finding_type,json=findingType,proto3,enum=google.cloud.websecurityscanner.v1alpha.Finding_FindingType" json:"finding_type,omitempty"`
  92. // Output only.
  93. // The http method of the request that triggered the vulnerability, in
  94. // uppercase.
  95. HttpMethod string `protobuf:"bytes,3,opt,name=http_method,json=httpMethod,proto3" json:"http_method,omitempty"`
  96. // Output only.
  97. // The URL produced by the server-side fuzzer and used in the request that
  98. // triggered the vulnerability.
  99. FuzzedUrl string `protobuf:"bytes,4,opt,name=fuzzed_url,json=fuzzedUrl,proto3" json:"fuzzed_url,omitempty"`
  100. // Output only.
  101. // The body of the request that triggered the vulnerability.
  102. Body string `protobuf:"bytes,5,opt,name=body,proto3" json:"body,omitempty"`
  103. // Output only.
  104. // The description of the vulnerability.
  105. Description string `protobuf:"bytes,6,opt,name=description,proto3" json:"description,omitempty"`
  106. // Output only.
  107. // The URL containing human-readable payload that user can leverage to
  108. // reproduce the vulnerability.
  109. ReproductionUrl string `protobuf:"bytes,7,opt,name=reproduction_url,json=reproductionUrl,proto3" json:"reproduction_url,omitempty"`
  110. // Output only.
  111. // If the vulnerability was originated from nested IFrame, the immediate
  112. // parent IFrame is reported.
  113. FrameUrl string `protobuf:"bytes,8,opt,name=frame_url,json=frameUrl,proto3" json:"frame_url,omitempty"`
  114. // Output only.
  115. // The URL where the browser lands when the vulnerability is detected.
  116. FinalUrl string `protobuf:"bytes,9,opt,name=final_url,json=finalUrl,proto3" json:"final_url,omitempty"`
  117. // Output only.
  118. // The tracking ID uniquely identifies a vulnerability instance across
  119. // multiple ScanRuns.
  120. TrackingId string `protobuf:"bytes,10,opt,name=tracking_id,json=trackingId,proto3" json:"tracking_id,omitempty"`
  121. // Output only.
  122. // An addon containing information about outdated libraries.
  123. OutdatedLibrary *OutdatedLibrary `protobuf:"bytes,11,opt,name=outdated_library,json=outdatedLibrary,proto3" json:"outdated_library,omitempty"`
  124. // Output only.
  125. // An addon containing detailed information regarding any resource causing the
  126. // vulnerability such as JavaScript sources, image, audio files, etc.
  127. ViolatingResource *ViolatingResource `protobuf:"bytes,12,opt,name=violating_resource,json=violatingResource,proto3" json:"violating_resource,omitempty"`
  128. // Output only.
  129. // An addon containing information about request parameters which were found
  130. // to be vulnerable.
  131. VulnerableParameters *VulnerableParameters `protobuf:"bytes,13,opt,name=vulnerable_parameters,json=vulnerableParameters,proto3" json:"vulnerable_parameters,omitempty"`
  132. // Output only.
  133. // An addon containing information reported for an XSS, if any.
  134. Xss *Xss `protobuf:"bytes,14,opt,name=xss,proto3" json:"xss,omitempty"`
  135. XXX_NoUnkeyedLiteral struct{} `json:"-"`
  136. XXX_unrecognized []byte `json:"-"`
  137. XXX_sizecache int32 `json:"-"`
  138. }
  139. func (m *Finding) Reset() { *m = Finding{} }
  140. func (m *Finding) String() string { return proto.CompactTextString(m) }
  141. func (*Finding) ProtoMessage() {}
  142. func (*Finding) Descriptor() ([]byte, []int) {
  143. return fileDescriptor_finding_e10fb627a6dc32cd, []int{0}
  144. }
  145. func (m *Finding) XXX_Unmarshal(b []byte) error {
  146. return xxx_messageInfo_Finding.Unmarshal(m, b)
  147. }
  148. func (m *Finding) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
  149. return xxx_messageInfo_Finding.Marshal(b, m, deterministic)
  150. }
  151. func (dst *Finding) XXX_Merge(src proto.Message) {
  152. xxx_messageInfo_Finding.Merge(dst, src)
  153. }
  154. func (m *Finding) XXX_Size() int {
  155. return xxx_messageInfo_Finding.Size(m)
  156. }
  157. func (m *Finding) XXX_DiscardUnknown() {
  158. xxx_messageInfo_Finding.DiscardUnknown(m)
  159. }
  160. var xxx_messageInfo_Finding proto.InternalMessageInfo
  161. func (m *Finding) GetName() string {
  162. if m != nil {
  163. return m.Name
  164. }
  165. return ""
  166. }
  167. func (m *Finding) GetFindingType() Finding_FindingType {
  168. if m != nil {
  169. return m.FindingType
  170. }
  171. return Finding_FINDING_TYPE_UNSPECIFIED
  172. }
  173. func (m *Finding) GetHttpMethod() string {
  174. if m != nil {
  175. return m.HttpMethod
  176. }
  177. return ""
  178. }
  179. func (m *Finding) GetFuzzedUrl() string {
  180. if m != nil {
  181. return m.FuzzedUrl
  182. }
  183. return ""
  184. }
  185. func (m *Finding) GetBody() string {
  186. if m != nil {
  187. return m.Body
  188. }
  189. return ""
  190. }
  191. func (m *Finding) GetDescription() string {
  192. if m != nil {
  193. return m.Description
  194. }
  195. return ""
  196. }
  197. func (m *Finding) GetReproductionUrl() string {
  198. if m != nil {
  199. return m.ReproductionUrl
  200. }
  201. return ""
  202. }
  203. func (m *Finding) GetFrameUrl() string {
  204. if m != nil {
  205. return m.FrameUrl
  206. }
  207. return ""
  208. }
  209. func (m *Finding) GetFinalUrl() string {
  210. if m != nil {
  211. return m.FinalUrl
  212. }
  213. return ""
  214. }
  215. func (m *Finding) GetTrackingId() string {
  216. if m != nil {
  217. return m.TrackingId
  218. }
  219. return ""
  220. }
  221. func (m *Finding) GetOutdatedLibrary() *OutdatedLibrary {
  222. if m != nil {
  223. return m.OutdatedLibrary
  224. }
  225. return nil
  226. }
  227. func (m *Finding) GetViolatingResource() *ViolatingResource {
  228. if m != nil {
  229. return m.ViolatingResource
  230. }
  231. return nil
  232. }
  233. func (m *Finding) GetVulnerableParameters() *VulnerableParameters {
  234. if m != nil {
  235. return m.VulnerableParameters
  236. }
  237. return nil
  238. }
  239. func (m *Finding) GetXss() *Xss {
  240. if m != nil {
  241. return m.Xss
  242. }
  243. return nil
  244. }
  245. func init() {
  246. proto.RegisterType((*Finding)(nil), "google.cloud.websecurityscanner.v1alpha.Finding")
  247. proto.RegisterEnum("google.cloud.websecurityscanner.v1alpha.Finding_FindingType", Finding_FindingType_name, Finding_FindingType_value)
  248. }
  249. func init() {
  250. proto.RegisterFile("google/cloud/websecurityscanner/v1alpha/finding.proto", fileDescriptor_finding_e10fb627a6dc32cd)
  251. }
  252. var fileDescriptor_finding_e10fb627a6dc32cd = []byte{
  253. // 631 bytes of a gzipped FileDescriptorProto
  254. 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0x94, 0x54, 0x5f, 0x6f, 0xd3, 0x3e,
  255. 0x14, 0xfd, 0x65, 0xff, 0xeb, 0x74, 0x5b, 0xe6, 0xdf, 0x10, 0xd1, 0x18, 0x5a, 0xb5, 0x17, 0x86,
  256. 0x40, 0x89, 0x18, 0x42, 0x42, 0x0c, 0x90, 0xd2, 0x36, 0x85, 0x88, 0xae, 0xad, 0x9c, 0x0c, 0x3a,
  257. 0x5e, 0x2c, 0x37, 0x71, 0xb3, 0x88, 0x34, 0x8e, 0x9c, 0xa4, 0xd0, 0x7d, 0x12, 0x5e, 0xe1, 0x93,
  258. 0x22, 0x3b, 0xe9, 0x28, 0x0c, 0x89, 0xf2, 0x54, 0xfb, 0x9c, 0x7b, 0xce, 0xb9, 0xf7, 0xaa, 0x31,
  259. 0x78, 0x16, 0x32, 0x16, 0xc6, 0xd4, 0xf4, 0x63, 0x56, 0x04, 0xe6, 0x67, 0x3a, 0xca, 0xa8, 0x5f,
  260. 0xf0, 0x28, 0x9f, 0x65, 0x3e, 0x49, 0x12, 0xca, 0xcd, 0xe9, 0x13, 0x12, 0xa7, 0x57, 0xc4, 0x1c,
  261. 0x47, 0x49, 0x10, 0x25, 0xa1, 0x91, 0x72, 0x96, 0x33, 0xf8, 0xa0, 0x94, 0x19, 0x52, 0x66, 0xdc,
  262. 0x96, 0x19, 0x95, 0xec, 0xe0, 0xb0, 0xf2, 0x27, 0x69, 0x64, 0x92, 0x24, 0x61, 0x39, 0xc9, 0x23,
  263. 0x96, 0x64, 0xa5, 0xcd, 0xc1, 0xd9, 0x3f, 0xa6, 0x63, 0x12, 0x04, 0x2c, 0x29, 0xc5, 0xc7, 0xdf,
  264. 0x37, 0xc1, 0x66, 0xa7, 0xc4, 0x21, 0x04, 0x6b, 0x09, 0x99, 0x50, 0x5d, 0x69, 0x28, 0x27, 0x35,
  265. 0x24, 0xcf, 0x10, 0x83, 0xfa, 0x5c, 0x96, 0xcf, 0x52, 0xaa, 0xaf, 0x34, 0x94, 0x93, 0x9d, 0xd3,
  266. 0x97, 0xc6, 0x92, 0xad, 0x1b, 0x95, 0xf7, 0xfc, 0xd7, 0x9b, 0xa5, 0x14, 0xa9, 0xe3, 0x9f, 0x17,
  267. 0x78, 0x04, 0xd4, 0xab, 0x3c, 0x4f, 0xf1, 0x84, 0xe6, 0x57, 0x2c, 0xd0, 0x57, 0x65, 0x36, 0x10,
  268. 0xd0, 0xb9, 0x44, 0xe0, 0x7d, 0x00, 0xc6, 0xc5, 0xf5, 0x35, 0x0d, 0x70, 0xc1, 0x63, 0x7d, 0x4d,
  269. 0xf2, 0xb5, 0x12, 0xb9, 0xe0, 0xb1, 0x68, 0x7a, 0xc4, 0x82, 0x99, 0xbe, 0x5e, 0x36, 0x2d, 0xce,
  270. 0xb0, 0x01, 0xd4, 0x80, 0x66, 0x3e, 0x8f, 0x52, 0xb1, 0x27, 0x7d, 0x43, 0x52, 0x8b, 0x10, 0x7c,
  271. 0x08, 0x34, 0x4e, 0x53, 0xce, 0x82, 0xc2, 0x17, 0x77, 0x69, 0xbd, 0x29, 0xcb, 0x76, 0x17, 0x71,
  272. 0x11, 0x70, 0x0f, 0xd4, 0xc6, 0x9c, 0x4c, 0xa8, 0xac, 0xd9, 0x92, 0x35, 0x5b, 0x12, 0x98, 0x93,
  273. 0x51, 0x42, 0x62, 0x49, 0xd6, 0x2a, 0x52, 0x00, 0x82, 0x3c, 0x02, 0x6a, 0xce, 0x89, 0xff, 0x49,
  274. 0x2c, 0x2f, 0x0a, 0x74, 0x50, 0x8e, 0x36, 0x87, 0x9c, 0x00, 0xfa, 0x40, 0x63, 0x45, 0x1e, 0x90,
  275. 0x9c, 0x06, 0x38, 0x8e, 0x46, 0x9c, 0xf0, 0x99, 0xae, 0x36, 0x94, 0x13, 0xf5, 0xf4, 0xf9, 0xd2,
  276. 0x0b, 0xee, 0x57, 0x06, 0xdd, 0x52, 0x8f, 0x76, 0xd9, 0xaf, 0x00, 0x8c, 0x00, 0x9c, 0x46, 0x2c,
  277. 0x26, 0xb9, 0x68, 0x83, 0xd3, 0x8c, 0x15, 0xdc, 0xa7, 0x7a, 0x5d, 0xc6, 0xbc, 0x58, 0x3a, 0xe6,
  278. 0xfd, 0xdc, 0x02, 0x55, 0x0e, 0x68, 0x6f, 0xfa, 0x3b, 0x04, 0x39, 0xb8, 0x33, 0x2d, 0xe2, 0x84,
  279. 0x72, 0x32, 0x8a, 0x29, 0x4e, 0x89, 0xd8, 0x52, 0x4e, 0x79, 0xa6, 0x6f, 0xcb, 0xb4, 0x57, 0xcb,
  280. 0xa7, 0xdd, 0xb8, 0x0c, 0x6e, 0x4c, 0xd0, 0xfe, 0xf4, 0x0f, 0x28, 0x7c, 0x0d, 0x56, 0xbf, 0x64,
  281. 0x99, 0xbe, 0x23, 0x13, 0x1e, 0x2f, 0x9d, 0x30, 0xcc, 0x32, 0x24, 0x84, 0xc7, 0xdf, 0x14, 0xa0,
  282. 0x2e, 0xfc, 0x39, 0xe1, 0x21, 0xd0, 0x3b, 0x4e, 0xaf, 0xed, 0xf4, 0xde, 0x60, 0xef, 0x72, 0x60,
  283. 0xe3, 0x8b, 0x9e, 0x3b, 0xb0, 0x5b, 0x4e, 0xc7, 0xb1, 0xdb, 0xda, 0x7f, 0x70, 0x0f, 0x6c, 0x9f,
  284. 0x3b, 0x43, 0xbb, 0x8d, 0x5b, 0xfd, 0x9e, 0x67, 0xf7, 0x3c, 0x4d, 0x81, 0xfb, 0x40, 0xeb, 0x5f,
  285. 0x78, 0x6d, 0xcb, 0xb3, 0xdb, 0xb8, 0xeb, 0x34, 0x91, 0x85, 0x2e, 0xb5, 0x15, 0x51, 0x88, 0xfa,
  286. 0xae, 0xed, 0x79, 0x16, 0xee, 0x74, 0x2d, 0xf7, 0xad, 0xb6, 0x0e, 0x35, 0x50, 0x1f, 0xba, 0x2e,
  287. 0x6e, 0x59, 0xdd, 0x6e, 0xd3, 0x6a, 0xbd, 0xd3, 0x56, 0xe1, 0x36, 0xa8, 0x09, 0xc4, 0x46, 0xa8,
  288. 0x8f, 0xb4, 0x35, 0x78, 0x17, 0xfc, 0xdf, 0xea, 0xda, 0x16, 0xc2, 0x9e, 0x3d, 0xf4, 0xf0, 0xc0,
  289. 0x72, 0xdd, 0x0f, 0x7d, 0xd4, 0xd6, 0x36, 0x9a, 0x5f, 0x15, 0xf0, 0xc8, 0x67, 0x93, 0x65, 0x87,
  290. 0x6b, 0xd6, 0xab, 0x81, 0x06, 0xe2, 0x13, 0x1f, 0x28, 0x1f, 0x2f, 0x2b, 0x61, 0xc8, 0x62, 0x92,
  291. 0x84, 0x06, 0xe3, 0xa1, 0x19, 0xd2, 0x44, 0x3e, 0x00, 0x66, 0x49, 0x91, 0x34, 0xca, 0xfe, 0xfa,
  292. 0x80, 0x9c, 0xdd, 0xa6, 0x46, 0x1b, 0xd2, 0xe5, 0xe9, 0x8f, 0x00, 0x00, 0x00, 0xff, 0xff, 0x8a,
  293. 0x7d, 0x4d, 0xc7, 0x03, 0x05, 0x00, 0x00,
  294. }