Working with OX APIs
Overview of Possible Flows
The OX APIs provide structured access to critical information about applications, artifacts, and security issues. Understanding how these components interact is essential for retrieving relevant data efficiently and ensuring security vulnerabilities are properly assessed.
Here is an outline of the key workflows for working with OX APIs, covering four interconnected areas:
Retrieving Application Information: Understanding available applications and their associated artifacts.
Retrieving Artifact Information: Digging deeper into artifacts, including repository and deployment details.
Retrieving Issues and Severity Factors: Identifying security issues and assessing their severity.
Visualizing Attack Paths: Analyzing how security issues propagate through an environment to prioritize remediation efforts.
Each flow builds upon the previous one, creating a systematic approach to data retrieval and security analysis.
Flow 1: Retrieving Application Information
To work with application data:
Call
getApplicationsAPI: Retrieve a list of all applications, including their IDs and names.Identify the relevant application: Determine which applications are relevant based on their names using the
appNamevariable.Extract the Application ID: Obtain the ID of the relevant application from the list using the
appIdvariable.

Call
getSingleApplicationInfoAPI: Use the extracted ID to retrieve detailed information about that specific application using theapplicationIdvariable.

Retrieve Related Artifacts: Extract the list of artifacts or containers associated with the application from the retrieved details using the
artifactsvariable.

Flow 2: Retrieving Artifact Information
Once application details are retrieved, artifact information can be accessed as follows:
Call
getArtifactsAPI: Retrieve a list of all artifacts.Extract Artifact ID: Identify the relevant artifact ID needed for further details using the
idvariable.

Call
getArtifactAPI: Use the extracted ID to obtain detailed information about the artifact using theartifactIdvariable.

Key Information in
getArtifactAPI Response:Cloud deployment information
List of repositories
appDescriptionList of registries
Flow 3: Retrieving Issues and Severity Factors
To understand issues affecting applications and artifacts, use the following steps:
Call
getIssuesAPI: Retrieve a list of all issues.Extract Issue ID: Identify the
issueIdfor further investigation.

Call
getSingleIssueAPI: Use the extracted ID to obtain detailed information about the issue.

Retrieve Severity Factors: Since severity factors are not included in the
getIssuesmetadata, they must be retrieved separately fromgetSingleIssue.
Flow 4: Visualizing Attack Paths with getIssueGraph
getIssueGraphSecurity issues are rarely isolated; they often propagate through dependencies and infrastructure, creating attack paths that can be exploited. The getIssueGraph API provides a visualization of these relationships, helping security teams assess risks more effectively.
How getIssueGraph Connects Everything
getIssueGraph Connects EverythingThe attack path graph integrates insights from applications, artifacts, and issues:
It links artifacts to vulnerabilities, showing how weaknesses in a specific component can impact an application.
It identifies dependencies between applications, artifacts, and infrastructure elements, illustrating how a security issue could spread.
It prioritizes remediation, helping teams understand which vulnerabilities pose the greatest risk based on their connectivity and exploitability.
Last updated
