-
Notifications
You must be signed in to change notification settings - Fork 15
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
2 changed files
with
21 additions
and
18 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,7 +1,7 @@ | ||
{ | ||
"name": "appmixer.wiz.core.FindCloudResources", | ||
"author": "Appmixer <[email protected]>", | ||
"description": "TBD", | ||
"description": "Execute the CloudResourceSearch query to return a list of cloud resources according to different filters, such as project ID or entity type.", | ||
"private": false, | ||
"auth": { | ||
"service": "appmixer:wiz" | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,7 +1,7 @@ | ||
{ | ||
"name": "appmixer.wiz.core.UploadSecurityScan", | ||
"author": "Appmixer <[email protected]>", | ||
"description": "TBD", | ||
"description": "Upload security scans to enrich the Wiz Security Graph, using the Vulnerability Findings Schema", | ||
"private": false, | ||
"auth": { | ||
"service": "appmixer:wiz" | ||
|
@@ -32,6 +32,9 @@ | |
"providerId": { | ||
"type": "string" | ||
}, | ||
"dataSourceAnalysisDate": { | ||
"type": "string" | ||
}, | ||
"vulnerabilityFindings": { } | ||
}, | ||
"required": [ | ||
|
@@ -54,13 +57,13 @@ | |
"type": "text", | ||
"label": "Integration ID", | ||
"tooltip": "The unique ID for each Wiz integration. Sent by Wiz during the integration initiation process.", | ||
"index": 0 | ||
"index": 1 | ||
}, | ||
"dataSourceId": { | ||
"type": "text", | ||
"label": "Data Source ID", | ||
"tooltip": "The ID that uniquely identifies asset findings within a tenant and integration ID. Can be a subscription ID.", | ||
"index": 1 | ||
"index": 2 | ||
}, | ||
"dataSourceAnalysisDate": { | ||
"type": "date-time", | ||
|
@@ -69,17 +72,17 @@ | |
"config": { | ||
"enableTime": true | ||
}, | ||
"index": 1 | ||
"index": 3 | ||
}, | ||
"providerId": { | ||
"type": "text", | ||
"label": "Provider ID", | ||
"tooltip": "A unique identifier assigned to a specific cloud asset by the cloud service provider when the asset is created, allowing for the identification and differentiation of the asset within the cloud computing ecosystem.", | ||
"index": 2 | ||
"index": 4 | ||
}, | ||
"cloudPlatform": { | ||
"type": "select", | ||
"index": 2, | ||
"index": 5, | ||
"label": "Cloud Platform", | ||
"defaultValue": "AWS", | ||
"tooltip": "The cloud platform that was scanned. Default is AWS", | ||
|
@@ -94,7 +97,7 @@ | |
}, | ||
"vulnerabilityFindings": { | ||
"type": "expression", | ||
"index": 2, | ||
"index": 6, | ||
"label": "Has an error in it", | ||
"levels": ["AND"], | ||
"fields": { | ||
|
@@ -107,14 +110,14 @@ | |
}, | ||
"name": { | ||
"type": "text", | ||
"index": 1, | ||
"index": 2, | ||
"label": "Name", | ||
"tooltip": "The name of the Vulnerability, for example CVE-2021-25288.", | ||
"required": true | ||
}, | ||
"severity": { | ||
"type": "select", | ||
"index": 2, | ||
"index": 3, | ||
"label": "Severity", | ||
"defaultValue": "Medium", | ||
"tooltip": "The severity of the vulnerability. Default is Medium", | ||
|
@@ -128,7 +131,7 @@ | |
}, | ||
"externalDetectionSource": { | ||
"type": "select", | ||
"index": 2, | ||
"index": 4, | ||
"label": "External Detection Source", | ||
"defaultValue": "Package", | ||
"tooltip": "The severity of the vulnerability. Default is Medium", | ||
|
@@ -156,44 +159,44 @@ | |
}, | ||
"externalFindingLink": { | ||
"type": "text", | ||
"index": 1, | ||
"index": 5, | ||
"label": "External Finding Link", | ||
"tooltip": "A link to the source of the external finding." | ||
}, | ||
"detailedName": { | ||
"type": "text", | ||
"index": 1, | ||
"index": 6, | ||
"label": "Detailed Name", | ||
"tooltip": "The details of the externalDetectionSource, such as \"Package,\" should include relevant information about the package. For instance, if the externalDetectionSource is \"libncurses6,\" the \"Details Name\" should reflect details about the package, such as \"libncurses6 package.\"." | ||
}, | ||
"version": { | ||
"type": "text", | ||
"index": 1, | ||
"index": 7, | ||
"label": "Version", | ||
"tooltip": "The version of the finding." | ||
}, | ||
"description": { | ||
"type": "text", | ||
"index": 1, | ||
"index": 8, | ||
"label": "Description", | ||
"tooltip": "A description of the finding." | ||
}, | ||
"source": { | ||
"type": "text", | ||
"index": 1, | ||
"index": 9, | ||
"label": "Source", | ||
"tooltip": "The name of the product that detected the vulnerability." | ||
}, | ||
"remediation": { | ||
"type": "text", | ||
"index": 1, | ||
"index": 10, | ||
"label": "Remediation", | ||
"required": true, | ||
"tooltip": "The remediation for the vulnerability." | ||
}, | ||
"validatedAtRuntime": { | ||
"type": "toggle", | ||
"index": 1, | ||
"index": 11, | ||
"label": "Validated At Runtime", | ||
"defaultValue": false, | ||
"tooltip": "Indicates if the finding was detected during runtime (true), or if it was detected during offline or static scanning (false)." | ||
|