GET
/
api
/
v2
/
attack-paths
/
finding-trends
{
  "start": "2023-11-07T05:31:56Z",
  "end": "2023-11-07T05:31:56Z",
  "environments": [
    "<string>"
  ],
  "data": {
    "findings": [
      {
        "environment_ids": [
          "<string>"
        ],
        "finding": "<string>",
        "display_title": "<string>",
        "display_type": "<string>",
        "composite_risk": 123,
        "finding_count_start": 123,
        "finding_count_end": 123,
        "finding_count_increase": 123,
        "finding_count_decrease": 123,
        "finding_impact_count": 123,
        "finding_exposure_count": 123
      }
    ],
    "total_finding_count_start": 123,
    "total_finding_count_end": 123
  }
}
Applies to BloodHound Enterprise only

Authorizations

Authorization
string
header
required

Authorization: Bearer $JWT_TOKEN

Headers

Prefer
integer
default:0

Prefer header, used to specify a custom timeout in seconds using the wait parameter as per RFC7240.

Required range: x >= 0

Query Parameters

environments
string[]
required

Environment IDs

start
string

Beginning datetime of range (inclusive) in RFC-3339 format; Defaults to current datetime minus 30 days

end
string

Ending datetime of range (exclusive) in RFC-3339 format; Defaults to current datetime

Response

200
application/json

OK

The response is of type object.