schema
stringclasses
471 values
key
stringlengths
0
203
description
stringlengths
0
4.37k
object
stringlengths
2
322k
yippee-ki-json_config_schema.json
ruleValidate
JSON Schema validate
{"type": "object", "properties": {"name": {"type": "string", "const": "validate"}, "path": {"type": "string", "const": "$"}, "params": {"type": "object", "properties": {"schema": {"allOf": [{}, {}]}, "onFailure": {"type": "object", "properties": {"transformation": {"type": "string", "enum": ["ABORT", "SKIP_REST", "CONTINUE"], "additionalItems": false}, "violation": {"type": "string", "enum": ["LOG_ONLY", "COMMENT_JSON", "IGNORE"], "additionalItems": false}}, "required": ["transformation", "violation"], "additionalProperties": false}}, "required": ["onFailure", "schema"], "additionalProperties": false}}, "required": ["name", "params", "path"], "additionalProperties": false}
yippee-ki-json_config_schema.json
name
The name of the component.
{"type": "string", "const": "validate"}
yippee-ki-json_config_schema.json
path
Must be the root JSON Path as the validator cannot work on sub-schema.
{"type": "string", "const": "$"}
yippee-ki-json_config_schema.json
params
Additional parameters of the rule.
{"type": "object", "properties": {"schema": {"allOf": [{}, {}]}, "onFailure": {"type": "object", "properties": {"transformation": {"type": "string", "enum": ["ABORT", "SKIP_REST", "CONTINUE"], "additionalItems": false}, "violation": {"type": "string", "enum": ["LOG_ONLY", "COMMENT_JSON", "IGNORE"], "additionalItems": false}}, "required": ["transformation", "violation"], "additionalProperties": false}}, "required": ["onFailure", "schema"], "additionalProperties": false}
yippee-ki-json_config_schema.json
schema
The supplier providing the schema we will use for validation.
{}
yippee-ki-json_config_schema.json
transformation
Defines how the transformation should handle a validation failure.
{"type": "string", "enum": ["ABORT", "SKIP_REST", "CONTINUE"], "additionalItems": false}
yippee-ki-json_config_schema.json
violation
Defines how the rule should document/report the violations.
{"type": "string", "enum": ["LOG_ONLY", "COMMENT_JSON", "IGNORE"], "additionalItems": false}
yippee-ki-json_config_schema.json
name
The name of the rule.
{"type": "string", "enum": ["add", "calculate", "copy", "delete", "deleteFrom", "rename", "replace", "replaceMap", "validate"], "additionalItems": false}
yippee-ki-json_config_schema.json
params
The optional parameter map to allow configuration of the selected rule.
{"type": "object"}
yippee-ki-json_config_schema.json
actionName
The name of the action (rule list) to allow selecting it when we want to start transformation.
{}
yippee-ki-json_config_schema.json
rules
The array of rules representing the sequentially triggered steps of the transformation action.
{"type": "array", "items": {}, "minItems": 1, "additionalItems": false}
yippee-ki-json_config_schema.json
actions
The array of transformation action we will be able to select from at startup.
{"type": "array", "items": {}, "minItems": 1, "additionalItems": false}
nodehawkrc.json
paths
A string or an array of paths to watch. Supports globbing.
{"default": "./src", "examples": ["./src"], "oneOf": [{"type": "string", "default": "./src"}, {"type": "array", "default": ["./src"], "items": {"type": "string"}}]}
nodehawkrc.json
root
The root path from which all other paths will be resolved.
{"type": "string", "default": ".", "examples": ["."]}
nodehawkrc.json
ignored
Paths, globs or regular expressions to ignore.
{"type": "string", "default": ""}
nodehawkrc.json
exec
The command to execute on file change.
{"type": "string", "default": "", "examples": ["babel-node src/server", "ts-node src/server"]}
nodehawkrc.json
port
The port on which the server should run. This is passed to your application as `process.env.PORT` which should be used by you.
{"type": "integer", "default": 4000}
nodehawkrc.json
logLevel
The level of logging. 0 - fatal, 1 - error, 2 - warning, 3 - info, 4 - debug
{"type": "integer", "default": 3}
nodehawkrc.json
buffer
The buffer duration to wait before triggering a restart.
{"type": "integer", "default": 1500}
nodehawkrc.json
bufferPoll
The buffer polling interval to check for the file stability.
{"type": "integer", "default": 100}
nodehawkrc.json
display
The various messages to display during different events.
{"type": "object", "properties": {"onBeforeStart": {"type": "string", "default": "Starting..."}, "onStart": {"type": "string", "default": "Started"}, "onBeforeRestart": {"type": "string", "default": "Restarting..."}, "onRestart": {"type": "string", "default": "Restarted"}, "onBeforeStop": {"type": "string", "default": "Stopping..."}}}
nodehawkrc.json
onBeforeStart
The message to display before the watcher starts.
{"type": "string", "default": "Starting..."}
nodehawkrc.json
onStart
The message to display after the watcher starts.
{"type": "string", "default": "Started"}
nodehawkrc.json
onBeforeRestart
The message to display before the watcher restarts.
{"type": "string", "default": "Restarting..."}
nodehawkrc.json
onRestart
The message to display after the watcher restarts.
{"type": "string", "default": "Restarted"}
nodehawkrc.json
onBeforeStop
The message to display before the watcher stops.
{"type": "string", "default": "Stopping..."}
nodehawkrc.json
clearScreen
Clear the screen on start and on every restart.
{"type": "boolean", "default": true}
nodehawkrc.json
env
A set of key-value pairs which will be promptly passed on to your process and accessible via `process.env`.
{"type": "object", "default": {}}
hawkconfig.json
hawk
Parameters for scanner runtime and how it should look for vulnerabilities.
{}
hawkconfig.json
app
**Required** Parameters for the target application and specifics for how it should be scanned.
{}
hawkconfig.json
hawkAddOn
Parameters for additional HawkScan add-ons.
{}
hawkconfig.json
tags
Searchable keywords to associate with this scan
{"type": "array", "items": {}}
hawkconfig.json
spider
Spider configuration
{}
hawkconfig.json
startupTimeoutMinutes
Maximum time in minutes to wait for the scanner process to start
{"type": "number", "exclusiveMinimum": 0}
hawkconfig.json
failureThreshold
The lowest alert level that returns a failed scan status. Accepted values: high, medium, or low
{"type": "string", "pattern": "\\b(?:high|medium|low|HIGH|MEDIUM|LOW)\\b"}
hawkconfig.json
scan
Scan Configuration
{}
hawkconfig.json
config
Scanner configuration overrides, provided as a list of strings.
{"type": "array", "items": {"type": "string", "pattern": "^([a-zA-Z0-9]*\\.)*([a-zA-Z_$0-9])+=.*$"}}
hawkconfig.json
outboundProxy
Configuration for an outbound proxy
{}
hawkconfig.json
base
Enable the basic web crawler for discovering your application’s routes. This spider is appropriate for most traditional web applications.
{"type": "boolean", "default": true}
hawkconfig.json
ajax
Enable the ajax web crawler for discovering your application’s routes. This spider is appropriate for single-page web applications.
{"type": "boolean", "default": true}
hawkconfig.json
maxDurationMinutes
Maximum allowed time for enabled spiders to crawl your web application. defaults to 5
{"type": "number", "exclusiveMinimum": 0}
hawkconfig.json
ajaxBrowser
The browser to type and style to use when running the AjaxSpider. This value is ignored when running the hawkscan docker container and use's the default FIREFOX_HEADLESS.
{"type": "string", "enum": ["FIREFOX_HEADLESS", "CHROME_HEADLESS", "FIREFOX", "CHROME"]}
hawkconfig.json
seedPaths
List of seed paths to add to the site tree. Will be crawled in addition to the root of the application. Used to add unreachable paths to the scanner.
{"type": "array", "items": {"type": "string"}}
hawkconfig.json
custom
{}
hawkconfig.json
postmanConfig
{}
hawkconfig.json
apikey
api key to authenticated the user with Postman
{"type": "string"}
hawkconfig.json
collectionUID
Id of the collection to be pulled from Postman
{"type": "string"}
hawkconfig.json
filePath
File path of the Postman collection
{"type": "string"}
hawkconfig.json
maxDurationMinutes
Maximum duration that a scan will run.
{"type": ["number", "string"], "minimum": 0, "pattern": "^([0-9][0-9]+|[1-9]|0)$"}
hawkconfig.json
maxRuleDurationMinutes
Maximum duration that a scan will spend on a rule.
{"type": ["number", "string"], "minimum": 0, "pattern": "^([0-9][0-9]+|[1-9]|0)$"}
hawkconfig.json
requestDelayMillis
Delay time between sending requests.
{"type": ["number", "string"], "minimum": 0, "pattern": "^([0-9][0-9]+|[1-9]|0)$"}
hawkconfig.json
concurrentRequests
Number of request threads. _If you need that little extra push._ defaults to 20
{"type": ["number", "string"], "exclusiveMinimum": 0, "pattern": "^([0-9][0-9]+|[1-9])$"}
hawkconfig.json
throttlePassiveBacklog
Pause active scan when passive backlog is greater than this value, resumes once backlog is empty. defaults to 50
{"type": ["number", "string"], "exclusiveMinimum": 0, "pattern": "^([0-9][0-9]+|[1-9])$"}
hawkconfig.json
policyName
Name of the scan policy to use. This field is optional and defaults will be selected if omitted
{"type": "string"}
hawkconfig.json
includedPlugins
Specify to only run scan on the listed plugins
{"type": "array", "items": {"type": "string"}}
hawkconfig.json
host
**Required**. The host of the outbound proxy
{"type": "string"}
hawkconfig.json
credentials
Credentials for logging into the proxy
{}
hawkconfig.json
username
**Required**. The username for proxy credentials
{"type": "string"}
hawkconfig.json
password
**Required**. The password for proxy credentials
{"type": "string"}
hawkconfig.json
realm
Realm for proxy credentials
{"type": "string"}
hawkconfig.json
scheme
Scheme of auth: BASIC, NTLM,
{"type": "string"}
hawkconfig.json
host
**Required** The base url of the application to scan ex: `http://localhost:8000`. If the url cannot be reached, the scan will not proceed.
{"type": "string", "pattern": "(?:(?:https?|ftp|file):\\/\\/|www\\.|ftp\\.)(?:\\([-\\w\\d+&@#\\/%=~_|$?!:,.]*\\)|[-\\w\\d+&@#\\/%=~_|$?!:,.])*(?:\\([-\\w\\d+&@#\\/%=~_|$?!:,.]*\\)|[\\w\\d+&@#\\/%=~_|$])"}
hawkconfig.json
sessionTokens
The names of any session tokens used by your application, provided as an array of strings (Hint: these are the names of session cookies used by your application).
{"type": "array", "items": {"type": "string"}}
hawkconfig.json
antiCsrfParam
The name of your CSRF security parameter used in any application form inputs. Globally set, HawkScan will parse this parameter value from form responses to use in subsequent requests.
{"type": "string"}
hawkconfig.json
authentication
Authenticated scan configuration
{}
hawkconfig.json
excludePaths
An array of strings, used as regexes to match against routes that should be ignored entirely by HawkScan. This field is useful for prohibiting asset directories or other resources that don’t require vulnerability scanning. (TODO: ADD EXAMPLE)
{"type": "array", "items": {"type": "string"}}
hawkconfig.json
applicationId
**Required**. The `applicationId` of an application from the StackHawk platform
{"type": "string", "pattern": "\\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b"}
hawkconfig.json
env
**Required**. The `env` environment name to organize Scan Results
{"type": "string"}
hawkconfig.json
graphqlConf
GraphQL API scanner parameters.
{}
hawkconfig.json
includePaths
An array of strings, used as regexes to constrain the application routes HawkScan will specifically visit. This field is useful for constraining the reach of the HawkScan scanner and spider. (TODO: add examples)
{"type": "array", "items": {"type": "string"}}
hawkconfig.json
autoPolicy
Set to `true` to enable an optimized policy when scanning specific APIs like GraphQL and OpenAPI. Defaults to True
{"type": "boolean"}
hawkconfig.json
autoInputVectors
Set to `true` to automatically enabled the correct input data types when scanning API’s like GraphQL and OpenAPI. This can increase scan accuracy and reduce false positives. Defaults to True
{"type": "boolean"}
hawkconfig.json
openApiConf
OpenApi scanner parameters.
{}
hawkconfig.json
soapConf
SOAP API scanner parameters.
{}
hawkconfig.json
grpcConf
gRPC scanner parameters
{}
hawkconfig.json
inputVectors
Fine grained control of injectable input vectors
{}
hawkconfig.json
waitForAppTarget
Adds a wait time for app to startup
{}
hawkconfig.json
redact
Specification for additional redaction of words in the scan logs
{}
hawkconfig.json
usernamePassword
Optional configuration specifying a username and password based authentication configuration. Do not configure if using `external`.
{}
hawkconfig.json
external
Optional configuration block for specifying an externally supplied authorization token. Do not configure if using `usernamePassword`.
{}
hawkconfig.json
script
Optional configuration block for using an authentication script.
{}
hawkconfig.json
tokenExtraction
Optional configuration block for extracting the authorization token from the authentication response.
{}
hawkconfig.json
cookieAuthorization
Optional configuration specifying if authorization is maintained via a cookie session. Do not configure if using `tokenAuthorization`.
{}
hawkconfig.json
tokenAuthorization
Optional configuration telling HawkScan how to pass the authorization token to your application on each request to maintain authorized access. Do not configure if using `cookieAuthorization`.
{}
hawkconfig.json
sessionScript
Optional configuration for using a session management script.
{}
hawkconfig.json
loggedInIndicator
**Required**. A regex to match against http responses from pages in the web application to determine if the scanned pages user session is still logged in to the app, provided as a string (ex. `"\\Qsigned in as\\E"`).
{"type": "string"}
hawkconfig.json
loggedOutIndicator
**Required**. A regex to match against http responses from pages in the web application to determine if the scanned pages user session is logged out of the app, provided as a string
{"type": "string"}
hawkconfig.json
testPath
A configuration block specifying how to verify authentication/authorization is working
{}
hawkconfig.json
loginPagePath
The path to your login form, if applicable. This is an optional path but is often required if the `POST` to the loginPath requires an anti csrf token to be passed as part of the `POST`. The `app.antiCsrfParam` will be extracted from the response body of a GET request to this page.
{"type": "string", "pattern": "^\\/(([A-z0-9\\-\\%]+\\/)*[A-z0-9\\-\\%]+$)?"}
hawkconfig.json
loginPath
**Required** login route to `POST` credentials for a user in the application (ex. `/login`). An http `POST` request using the type specified will be made to this path.
{"type": "string", "pattern": "^\\/(([A-z0-9\\-\\%]+\\/)*[A-z0-9\\-\\%]+$)?"}
hawkconfig.json
usernameField
**Required** the username html field used in your application form or json, provided as a string.
{"type": "string"}
hawkconfig.json
passwordField
**Required** The password html field used in your application form or json, provided as a string.
{"type": "string"}
hawkconfig.json
scanUsername
*Required** The username credentials provided to authentication when attempting to login to the web application, provided as a string. HawkScan best practices recommend using [environment variable runtime overrides](https://docs.stackhawk.com/hawkscan/configuration/#environment-variable-runtime-overrides) for this value (ex. "${SCAN_USERNAME:admin}" will use the $SCAN_USERNAME environment variable as the scanUsername, or fallback to admin).
{"type": "string"}
hawkconfig.json
scanPassword
*Required** The password credentials provided to authentication when attempting to login to the web application, provided as a string. HawkScan best practices recommend using [environment variable runtime overrides](https://docs.stackhawk.com/hawkscan/configuration/#environment-variable-runtime-overrides) for this value (ex. "${SCAN_PASSWORD}" will use the $SCAN_PASSWORD environment variable as the scanPassword).
{"type": "string"}
hawkconfig.json
type
An enum value describing the type of `POST` data expected by the `loginPath`
{"type": "string", "enum": ["FORM", "JSON", "HTTP"]}
hawkconfig.json
otherParams
Other request parameters required by your login payload, provided as an array of objects with `name` and `value` string keys. This setting is helpful if your authentication process requires other parameters included in the form POST besides the username and password parameters. If in doubt, this setting can be safely left unconfigured.
{"type": "array", "items": {}}
hawkconfig.json
realm
Realm for NTLM authentication
{"type": "string"}
hawkconfig.json
name
{"type": "string"}
hawkconfig.json
val
{"type": "string"}
hawkconfig.json
type
Specifies the type of token being supplied. If `COOKIE` is specified the .external.value should be in the form of a cookie value <cookie-name>=<cookie-value> . Defaults to `Token`.
{"type": "string", "enum": ["TOKEN", "COOKIE"]}