Working with OX APIs
Last updated
Last updated
The OX APIs provide structured access to critical information about applications, artifacts, and security issues. Understanding how these components interact is essential for retrieving relevant data efficiently and ensuring security vulnerabilities are properly assessed.
Here is an outline of the key workflows for working with OX APIs, covering four interconnected areas:
Retrieving Application Information: Understanding available applications and their associated artifacts.
Retrieving Artifact Information: Digging deeper into artifacts, including repository and deployment details.
Retrieving Issues and Severity Factors: Identifying security issues and assessing their severity.
Visualizing Attack Paths: Analyzing how security issues propagate through an environment to prioritize remediation efforts.
Each flow builds upon the previous one, creating a systematic approach to data retrieval and security analysis.
To work with application data:
Call getApplications
API: Retrieve a list of all applications, including their IDs and names.
Identify the relevant application: Determine which applications are relevant based on their names using the appName
variable.
Extract the Application ID: Obtain the ID of the relevant application from the list using the appId
variable.
Call getSingleApplicationInfo
API: Use the extracted ID to retrieve detailed information about that specific application using the applicationId
variable.
Retrieve Related Artifacts: Extract the list of artifacts or containers associated with the application from the retrieved details using the artifacts
variable.
Once application details are retrieved, artifact information can be accessed as follows:
Call getArtifacts
API: Retrieve a list of all artifacts.
Extract Artifact ID: Identify the relevant artifact ID needed for further details using the id
variable.
Call getArtifact
API: Use the extracted ID to obtain detailed information about the artifact using the artifactId
variable.
Key Information in getArtifact
API Response:
Cloud deployment information
List of repositories appDescription
List of registries
To understand issues affecting applications and artifacts, use the following steps:
Call getIssues
API: Retrieve a list of all issues.
Extract Issue ID: Identify the issueId
for further investigation.
Call getSingleIssue
API: Use the extracted ID to obtain detailed information about the issue.
Retrieve Severity Factors: Since severity factors are not included in the getIssues
metadata, they must be retrieved separately from getSingleIssue
.
getIssueGraph
Security issues are rarely isolated; they often propagate through dependencies and infrastructure, creating attack paths that can be exploited. The getIssueGraph
API provides a visualization of these relationships, helping security teams assess risks more effectively.
getIssueGraph
Connects EverythingThe attack path graph integrates insights from applications, artifacts, and issues:
It links artifacts to vulnerabilities, showing how weaknesses in a specific component can impact an application.
It identifies dependencies between applications, artifacts, and infrastructure elements, illustrating how a security issue could spread.
It prioritizes remediation, helping teams understand which vulnerabilities pose the greatest risk based on their connectivity and exploitability.