Home

Sortable tokens

The sort parameter in container security APIs allow you to sort the API results as per specific tokens used in the search. For example created:desc. Allowed values are asc or desc.

Here is a list of sortable tokens for each category.

Containers

Images

Sensors

Vulnerabilities

Software

Host

Registries

Repositories

Schedules

containerId

created

environment

host.hostname

host.ipAddress

imageId

imageSha

ipv4

ipv6

label.key

label.value

lastScanned

macAddress

name

operatingSystem

portMapping.hostIp

portMapping.hostPort

portMapping.port

portMapping.protocol

drift.software.name

drift.software.vulnerabilities.authType

drift.software.vulnerabilities.category

drift.software.vulnerabilities.customerSeverity

drift.software.vulnerabilities.cveids

drift.software.vulnerabilities.firstFound

drift.software.vulnerabilities.lastFound

drift.software.vulnerabilities.risk

drift.software.vulnerabilities.severity

drift.software.vulnerabilities.qid

drift.software.vulnerabilities.title

drift.software.vulnerabilities.typeDetected

drift.software.vulnerabilities.source

drift.software.vulnerabilities.reason

drift.software.source

drift.software.reason

drift.vulnerability.authType

drift.vulnerability.category

drift.vulnerability.customerSeverity

drift.vulnerability.cveids

drift.vulnerability.firstFound

drift.vulnerability.lastFound

drift.vulnerability.risk

drift.vulnerability.severity

drift.vulnerability.qid

drift.vulnerability.title

drift.vulnerability.typeDetected

drift.vulnerability.software.name

drift.vulnerability.source

drift.vulnerability.reason

software.name

software.vulnerabilities.authType

software.vulnerabilities.category

software.vulnerabilities.customerSeverity

software.vulnerabilities.cveids

software.vulnerabilities.firstFound

software.vulnerabilities.lastFound

software.vulnerabilities.risk

software.vulnerabilities.severity

software.vulnerabilities.qid

software.vulnerabilities.title

software.vulnerabilities.typeDetected

software.vulnerabilities.source

software.vulnerabilities.reason

stateChanged

users

vulnerabilities.authType

vulnerabilities.category

vulnerabilities.customerSeverity

vulnerabilities.firstFound

vulnerabilities.lastFound

vulnerabilities.risk

vulnerabilities.severity

vulnerabilities.qid

vulnerabilities.title

vulnerabilities.typeDetected

vulnerabilities.software.name

services.name

services.status

architecture

created

host.hostname

imageId

lastScanned

layers.created

layers.size

layersCount

operatingSystem

software.name

software.vulnerabilities.authType

software.vulnerabilities.category

software.vulnerabilities.customerSeverity

software.vulnerabilities.cveids

software.vulnerabilities.firstFound

software.vulnerabilities.lastFound

software.vulnerabilities.risk

software.vulnerabilities.severity

software.vulnerabilities.qid

software.vulnerabilities.title

software.vulnerabilities.typeDetected

software.vulnerabilities.source

software.vulnerabilities.reason

vulnerabilities.firstFound

vulnerabilities.fixed

vulnerabilities.lastFound

vulnerabilities.risk

vulnerabilities.severity

vulnerabilities.status

vulnerabilities.qid

vulnerabilities.title

vulnerabilities.typeDetected

vulnerabilities.software.name

author

dockerVersion

size

services.name

services.status

created

lastCheckedIn

sensorVersion

hostname

dockerVersion

name

os

registry

imageId

authType

category

customerSeverity

firstFound

lastFound

risk

severity

qid

title

software.name

name

vulnerabilities.authType

vulnerabilities.category

vulnerabilities.customerSeverity

vulnerabilities.cveids

vulnerabilities.firstFound

vulnerabilities.lastFound

vulnerabilities.risk

vulnerabilities.severity

vulnerabilities.qid

vulnerabilities.title

vulnerabilities.typeDetected

vulnerabilities.source

vulnerabilities.reason

host.hostname

host.ipAddress

created

registryType

repositoryName

created

onDemand

status