list_exploitations
Retrieve detailed exploitation data to identify vulnerabilities exploited in the wild, including detection signatures, frequency, and timeframes, with filtering and sorting options.
Instructions
Get exploitation data
Use this to look up exploitation data when you want to know if vulnerabilities have been exploited in the wild, and who detected the exploitations. This function retrieves a list of exploitation incidents with filtering and sorting options.
The data can help identify:
- Recent exploitations in the wild
- Which detection signatures identified the exploitations
- Frequency of exploitation activities (count)
- Timeframes of exploitation activities
Args: offset (int, optional): The number of items to skip before starting to collect the result set. Defaults to 0. limit (int, optional): The maximum number of items to return. Minimum value is 1. Defaults to 10 (API default is 100). sort (str, optional): Field to sort by - either 'count', 'created_at', or 'updated_at'. Defaults to 'created_at'. order (str, optional): Sort order - either 'asc' or 'desc'. Defaults to 'desc'.
Returns: Dict[str, Any]: Dictionary containing: - data: List of exploitation records with fields including: - uuid - begins_at - ends_at - count - detection_signature_uuid - detection_signature_name - detection_signature_source - detection_signature_method - created_at - updated_at
Input Schema
Name | Required | Description | Default |
---|---|---|---|
limit | No | ||
offset | No | ||
order | No | desc | |
sort | No | created_at |