Security API¶
API endpoints for security scanning and analysis.
Security Score¶
Get Security Score¶
Response:
{
"score": 78,
"grade": "C",
"findings_count": {
"critical": 2,
"high": 5,
"medium": 12,
"low": 8
}
}
Findings¶
List Security Findings¶
Query Parameters: | Parameter | Type | Description | |-----------|------|-------------| | severity | string | Filter by severity | | namespace | string | Filter by namespace | | category | string | Filter by category |
Response:
[
{
"id": "finding-123",
"title": "Privileged Container",
"severity": "high",
"category": "workload",
"namespace": "default",
"resource": "pod/nginx-abc123",
"description": "Container running in privileged mode",
"remediation": "Set securityContext.privileged to false"
}
]
Get Finding Details¶
Scanning¶
Trigger Security Scan¶
Request Body:
Response:
Get Scan Status¶
Vulnerabilities¶
List Vulnerabilities¶
Response:
[
{
"cve_id": "CVE-2024-1234",
"package": "openssl",
"version": "1.1.1",
"fixed_in": "1.1.2",
"severity": "critical",
"cvss": 9.8,
"image": "nginx:1.25"
}
]
Scan Image¶
Request Body:
RBAC Analysis¶
Get RBAC Analysis¶
Response:
{
"service_accounts": [
{
"name": "default",
"namespace": "default",
"risk_level": "low",
"roles": ["view"]
}
],
"high_risk_bindings": [
{
"name": "admin-binding",
"subject": "user:admin",
"role": "cluster-admin"
}
]
}
Network Policies¶
Get Network Policy Coverage¶
Response:
{
"coverage": {
"namespaces_with_policies": 5,
"total_namespaces": 10,
"percentage": 50
},
"unprotected_namespaces": ["default", "dev"]
}
AI Remediation¶
Get AI Remediation¶
Request Body:
Response: