Help Center/ Host Security Service/ API Reference/ API Description/ Event Management/ Submitting a Vulnerability Export Request
Updated on 2026-04-03 GMT+08:00

Submitting a Vulnerability Export Request

Function

This API is used to request for exporting intrusion events.

Authorization Information

Each account has all the permissions required to call all APIs, but IAM users must be assigned the required permissions.

  • If you are using role/policy-based authorization, see Permissions Policies and Supported Actions for details on the required permissions.
  • If you are using identity policy-based authorization, no identity policy-based permission required for calling this API.

URI

POST /v5/{project_id}/event/export

Table 1 Path Parameters

Parameter

Mandatory

Type

Description

project_id

Yes

String

Definition

Project ID, which is used to specify the project that an asset belongs to. After the project ID is configured, you can query assets in the project using the project ID. For details about how to obtain it, see Obtaining a Project ID.

Constraints

N/A

Range

The value can contain 1 to 256 characters.

Default Value

N/A

Table 2 Query Parameters

Parameter

Mandatory

Type

Description

enterprise_project_id

No

String

Definition

Enterprise project ID, which is used to filter assets in different enterprise projects. For details, see Obtaining an Enterprise Project ID.

To query assets in all enterprise projects, set this parameter to all_granted_eps.

Constraints

You need to set this parameter only after the enterprise project function is enabled.

Range

The value can contain 1 to 256 characters.

Default Value

0: default enterprise project.

last_days

No

Integer

Definition

Number of days to be queried. This parameter is manually exclusive with begin_time and end_time.

Constraints

N/A

Range

N/A

Default Value

N/A

host_name

No

String

Definition

Server name.

Constraints

N/A

Range

The value can contain 1 to 64 characters.

Default Value

N/A

host_id

No

String

Definition

Server ID.

Constraints

N/A

Range

Length: 1 to 256 characters

Default Value

N/A

private_ip

No

String

Definition

Server private IP address.

Constraints

N/A

Range

Length: 1 to 128 characters

Default Value

N/A

container_name

No

String

Definition

Container instance name.

Constraints

N/A

Range

The value can contain 1 to 512 characters.

Default Value

N/A

offset

No

Integer

Definition

Offset, which specifies the start position of the record to be returned.

Constraints

N/A

Range

N/A

Default Value

N/A

limit

No

Integer

Definition

Number of records displayed on each page.

Constraints

N/A

Range

N/A

Default Value

N/A

export_size

No

Integer

Definition

Quantity

Constraints

N/A

Range

N/A

Default Value

N/A

event_type

No

Integer

Definition

Event type

Constraints

N/A

Range

  • 1001: common malware

  • 1002: virus

  • 1003: worm

  • 1004: Trojan

  • 1005: botnet

  • 1006: backdoor

  • 1010: rootkit

  • 1011: ransomware

  • 1012: hacker tool

  • 1015: web shell

  • 1016: mining

  • 1017: reverse shell

  • 2001: common vulnerability exploit

  • 2012: remote code execution

  • 2047: Redis vulnerability exploit

  • 2048: Hadoop vulnerability exploit

  • 2049: MySQL vulnerability exploit

  • 3002: file privilege escalation

  • 3003: process privilege escalation

  • 3004: critical file change

  • 3005: file/directory change

  • 3007: abnormal process behavior

  • 3015: high-risk command execution

  • 3018: abnormal shell

  • 3027: suspicious crontab task

  • 3029: system protection disabled

  • 3030: backup deletion

  • 3031: suspicious registry operations

  • 3036: container image blocking

  • 4002: brute-force attack

  • 4004: abnormal login

  • 4006: invalid account

  • 4014: account added

  • 4020: password theft

  • 6002: port scan

  • 6003: server scan

  • 13001: Kubernetes event deletion

  • 13002: abnormal pod behavior

  • 13003: user information enumeration

  • 13004: cluster role binding

  • 11001: advanced threat event

Default Value

N/A

event_types

No

Array of integers

Definition

Event type

Range

  • 1001: common malware

  • 1002: virus

  • 1003: worm

  • 1004: Trojan

  • 1005: botnet

  • 1006: backdoor

  • 1010: rootkit

  • 1011: ransomware

  • 1012: hacker tool

  • 1015: web shell

  • 1016: mining

  • 1017: reverse shell

  • 2001: common vulnerability exploit

  • 2012: remote code execution

  • 2047: Redis vulnerability exploit

  • 2048: Hadoop vulnerability exploit

  • 2049: MySQL vulnerability exploit

  • 3002: file privilege escalation

  • 3003: process privilege escalation

  • 3004: critical file change

  • 3005: file/directory change

  • 3007: abnormal process behavior

  • 3015: high-risk command execution

  • 3018: abnormal shell

  • 3027: suspicious crontab task

  • 3029: system protection disabled

  • 3030: backup deletion

  • 3031: suspicious registry operations

  • 3036: container image blocking

  • 4002: brute-force attack

  • 4004: abnormal login

  • 4006: invalid account

  • 4014: account added

  • 4020: password theft

  • 6002: port scan

  • 6003: server scan

  • 13001: Kubernetes event deletion

  • 13002: abnormal pod behavior

  • 13003: user information enumeration

  • 13004: cluster role binding

  • 11001: advanced threat event

Default Value

N/A

handle_status

No

String

Definition

Handling status.

Constraints

N/A

Range

  • unhandled

  • handled

Default Value

N/A

severity

No

String

Definition

Risk level.

Constraints

N/A

Range

  • Security

  • Low

  • Medium

  • High

  • Critical

Default Value

N/A

category

Yes

String

Definition

Event type.

Constraints

N/A

Range

  • host: server security event

  • container: container security event

Default Value

N/A

begin_time

No

Long

Definition

Customized start time of a segment. The timestamp is accurate to milliseconds. The end_time should be no more than two days earlier than the begin_time. This parameter is mutually exclusive with the queried duration.

Constraints

N/A

Range

N/A

Default Value

N/A

end_time

No

Long

Definition

Customized end time of a query time range. The timestamp is accurate to milliseconds. The end_time should be no more than two days earlier than the begin_time. This parameter is mutually exclusive with the queried duration.

Constraints

N/A

Range

N/A

Default Value

N/A

event_class_ids

No

Array of strings

Definition

Event ID.

Constraints

N/A

Range

  • container_1001: container namespace

  • container_1002: container open port

  • container_1003: container security option

  • container_1004: container mount directory

  • containerescape_0001: high-risk system call

  • containerescape_0002: shocker attack

  • containerescape_0003: Dirty Cow attack

  • containerescape_0004: container file escape

  • dockerfile_001: modification of user-defined protected container file

  • dockerfile_002: modification of executable files in the container file system

  • dockerproc_001: abnormal container process

  • fileprotect_0001: file privilege escalation

  • fileprotect_0002: critical file change

  • fileprotect_0003: critical file path change

  • fileprotect_0004: file/directory change

  • av_1002: virus

  • av_1003: worm

  • av_1004: Trojan

  • av_1005: botnet

  • av_1006: backdoor

  • av_1007: spyware

  • av_1008: adware

  • av_1009: phishing

  • av_1010: rootkit

  • av_1011: ransomware

  • av_1012: hacker tool

  • av_1013: grayware

  • av_1015: web shell

  • av_1016: mining software

  • login_0001: brute-force attack attempt

  • login_0002: successful brute-force attack

  • login_1001: successful login

  • login_1002: remote login

  • login_1003: weak password

  • malware_0001: shell change event

  • malware_0002: reverse shell event

  • malware_1001: malicious program

  • procdet_0001: abnormal process behavior

  • procdet_0002: process privilege escalation

  • procreport_0001: risky command

  • user_1001: account change

  • user_1002: risky account

  • vmescape_0001: VM sensitive command execution

  • vmescape_0002: access from virtualization process to sensitive file

  • vmescape_0003: abnormal VM port access

  • webshell_0001: web shell

  • network_1001: mining

  • network_1002: servers exploited to launch DDoS attacks

  • network_1003: malicious scan

  • network_1004: attack in sensitive areas

  • ransomware_0001: ransomware attack

  • ransomware_0002: ransomware attack

  • ransomware_0003: ransomware attack

  • fileless_0001: process injection

  • fileless_0002: dynamic library injection

  • fileless_0003: critical configuration change

  • fileless_0004: environment variable change

  • fileless_0005: memory file process

  • fileless_0006: VDSO hijacking

  • crontab_1001: suspicious crontab task

  • vul_exploit_0001: Redis vulnerability exploit

  • vul_exploit_0002: Hadoop vulnerability exploit

  • vul_exploit_0003: MySQL vulnerability exploit

  • rootkit_0001: suspicious rootkit file

  • rootkit_0002: suspicious kernel module

  • RASP_0004: web shell upload

  • RASP_0018: fileless web shell

  • blockexec_001: known ransomware attack

  • hips_0001: Windows Defender disabled

  • hips_0002: suspicious hacker tool

  • hips_0003: suspicious ransomware encryption behavior

  • hips_0004: hidden account creation

  • hips_0005: user password and credential reading

  • hips_0006: suspicious SAM file export

  • hips_0007: suspicious shadow copy deletion

  • hips_0008: backup file deletion

  • hips_0009: registry operation probably performed by ransomware

  • hips_0010: suspicious abnormal process

  • hips_0011: suspicious scan

  • hips_0012: suspicious ransomware script execution

  • hips_0013: suspicious mining command execution

  • hips_0014: suspicious Windows security center disabling

  • hips_0015: suspicious firewall disabling

  • hips_0016: suspicious disabling of system automatic recovery

  • hips_0017: executable file creation in Office

  • hips_0018: abnormal file creation with macros in Office

  • hips_0019: suspicious registry operation

  • hips_0020: Confluence remote code execution

  • hips_0021: MSDT remote code execution

  • portscan_0001: common port scan

  • portscan_0002: secret port scan

  • k8s_1001: Kubernetes event deletion

  • k8s_1002: privileged pod creation

  • k8s_1003: interactive shell used in pod

  • k8s_1004: pod created with sensitive directory

  • k8s_1005: pod created with server network

  • k8s_1006: pod created with host PID space

  • k8s_1007: authentication failure when common pods access API server

  • k8s_1008: API server access from common pod using cURL

  • k8s_1009: exec in system management space

  • k8s_1010: pod created in management space

  • k8s_1011: static pod creation

  • k8s_1012: DaemonSet creation

  • k8s_1013: scheduled cluster task creation

  • k8s_1014: operation on secrets

  • k8s_1015: allowed operation enumeration

  • k8s_1016: high privilege RoleBinding or ClusterRoleBinding

  • k8s_1017: ServiceAccount creation

  • k8s_1018: Cronjob creation

  • k8s_1019: interactive shell used for exec in pods

  • k8s_1020: unauthorized access to API server

  • k8s_1021: access to API server with curl

  • k8s_1022: Ingress vulnerability

  • k8s_1023: man-in-the-middle (MITM) attack

  • k8s_1024: worm, mining, or Trojan

  • k8s_1025: K8s event deletion

  • k8s_1026: SelfSubjectRulesReview

  • imgblock_0001: image blocking based on whitelist

  • imgblock_0002: image blocking based on blacklist

  • imgblock_0003: image tag blocking based on whitelist

  • imgblock_0004: image tag blocking based on blacklist

  • imgblock_0005: container creation blocked based on whitelist

  • imgblock_0006: container creation blocked based on blacklist

  • imgblock_0007: container mount proc

  • imgblock_0008: container seccomp unconfined

  • imgblock_0009: container privilege blocking

  • imgblock_0010: container capabilities blocking

  • honeypot_0001: suspicious honeypot access

Default Value

N/A

severity_list

No

Array of strings

Definition

Risk level.

Constraints

N/A

Range

  • Security

  • Low

  • Medium

  • High

  • Critical

Default Value

N/A

attack_tag

No

String

Definition

Attack tag.

Constraints

N/A

Range

  • attack_success: successful attack

  • attack_attempt: attack attempt

  • attack_blocked: attack blocked

  • abnormal_behavior: abnormal behavior

  • collapsible_host: server compromised

  • system_vulnerability: system vulnerability

Default Value

N/A

asset_value

No

String

Definition

Asset importance.

Constraints

N/A

Range

  • important

  • common

  • test

Default Value

N/A

tag_list

No

Array of strings

Definition

Event tag list.

Constraints

N/A

Range

N/A

Default Value

N/A

att_ck

No

String

Definition

ATT&CK phase.

Constraints

N/A

Range

  • Reconnaissance

  • Initial Access

  • Execution

  • Persistence

  • Privilege Escalation

  • Defense Evasion

  • Credential Access

  • Command and Control

  • Impact

Default Value

N/A

event_name

No

String

Definition

Alarm name.

Constraints

N/A

Range

The value can contain 1 to 128 characters.

Default Value

N/A

event_id_list

No

Array of strings

Definition

Alarm ID set.

Constraints

N/A

Range

N/A

Default Value

N/A

auto_block

No

Boolean

Definition

Whether to automatically block alarms.

Constraints

N/A

Range

  • true: Automatically block alarms.

  • false: Do not automatically block alarms.

Default Value

N/A

cluster_id

No

String

Definition

Cluster ID.

Constraints

N/A

Range

The value can contain 1 to 64 characters.

Default Value

N/A

event_id

Yes

String

Definition

Case code.

Constraints

N/A

Range

The value can contain 1 to 128 characters.

Default Value

N/A

public_ip

No

String

Definition

Server EIP.

Constraints

N/A

Range

Length: 1 to 128 characters

Default Value

N/A

Request Parameters

Table 3 Request header parameters

Parameter

Mandatory

Type

Description

X-Auth-Token

Yes

String

Definition

User token, which contains user identity and permissions. The token can be used for identity authentication when an API is called. For details about how to obtain the token, see Obtaining a User Token.

Constraints

N/A

Range

The value can contain 1 to 32,768 characters.

Default Value

N/A

Table 4 Request body parameters

Parameter

Mandatory

Type

Description

[items]

Yes

Array of ExportHead objects

Definition

Export data table header details.

Constraints

The table header information must be in the following format**: [[Field 1, Display name of table header 1], [Field 2, Display name of table header 2], [Field 3, Display name of table header 3]]

Range

You can select some or all of the following values to form the table header information. All assets have the following fields**:

  • host_name: server name

  • host_ip: server IP address. This field is specific to other asset types.

  • **users

  • user_name: username

  • login_permission: Whether the user has the login permission.

  • root_permission: Whether the user has the root permission.

  • user_group_name: user group

  • user_home_dir: user directory

  • shell: user startup shell

  • recent_scan_time: last scan time

  • first_scan_time: first scan time

  • container_id: container ID

  • container_name: container name

  • **auto_launch

  • name: name

  • type: type

  • path: file path

  • hash: file hash

  • run_user: The user who runs it.

  • recent_scan_time: last scan time

  • container_id: container ID

  • container_name: container name

  • **database

  • **web_cms

  • **web_service

  • name: software name

  • version: software version

  • install_path: installation path

  • config_path: configuration file path

  • uid: user ID

  • mode: software file permission

  • pid: software process ID

  • proc_path: software process path

  • record_time: scan time

  • container_id: container ID

  • container_name: container name

  • **jar_package

  • name: name

  • file_name: file name

  • catalogue: category

  • file_type: file type

  • version: version

  • path: file path

  • hash: file hash

  • uid: user ID

  • gid: user group ID

  • mode: file permission

  • pid: process ID

  • proc_path: process path

  • is_embedded: Whether the package is an inner JAR package.

  • package_path: path of the outer JAR package

  • record_time: scan time

  • container_id: container ID

  • container_name: container name

  • **port

  • port_status: Whether the port needs to be processed.

  • port: port number

  • type: type

  • pid: process ID

  • path: program file path

  • laddr: listening IP address

  • container_id: container ID

  • container_name: container name

  • **process

  • process_path: process path

  • launch_params: startup parameter

  • launch_time: start time

  • user_name: The user who runs it.

  • run_permission: execution permission

  • process_pid: process ID

  • hash: file hash

  • container_id: container ID

  • container_name: container name

  • **web_framework

  • name: name

  • file_name: file name

  • catalogue: category

  • file_type: file type

  • version: version

  • path: file path

  • hash: file hash

  • uid: user ID

  • gid: user group ID

  • mode: file permission

  • pid: process ID

  • proc_path: process path

  • record_time: scan time

  • container_id: container ID

  • container_name: container name

  • **web_site

  • domain: external domain name

  • port: external port number

  • url_path: URL path

  • path: web directory

  • mode: web directory file permission

  • uid: user ID

  • record_time: scan time

  • is_https: Whether HTTPS is used.

  • pid: process ID

  • cert_issuer: SSL certificate issuer

  • cert_user: SSL certificate user

  • cert_issue_time: SSL certificate issue time

  • cert_expired_time: SSL certificate expiration time

  • container_id: container ID

  • container_name: container name

  • **app

  • app_name: software name

  • version: version number

  • update_time: update time

  • recent_scan_time: last scan time

  • container_id: container ID

  • container_name: container name

  • **kernel_module

  • name: name

  • version: version

  • srcversion: source code version

  • desc: description

  • path: file path

  • size: file size

  • mode: file permission

  • uid: user ID

  • ctime: file creation time

  • mtime: last modification time

  • hash: file hash

  • record_time: scan time

Default Value

N/A

Table 5 ExportHead

Parameter

Mandatory

Type

Description

[items]

No

Array of strings

Definition

Export data table header details.

Constraints

The table header information must be in the following format**: [[Field 1, Display name of table header 1], [Field 2, Display name of table header 2], [Field 3, Display name of table header 3]]

Range

You can select some or all of the following values to form the table header information. All assets have the following fields**:

  • host_name: server name

  • host_ip: server IP address. This field is specific to other asset types.

  • **users

  • user_name: username

  • login_permission: Whether the user has the login permission.

  • root_permission: Whether the user has the root permission.

  • user_group_name: user group

  • user_home_dir: user directory

  • shell: user startup shell

  • recent_scan_time: last scan time

  • first_scan_time: first scan time

  • container_id: container ID

  • container_name: container name

  • **auto_launch

  • name: name

  • type: type

  • path: file path

  • hash: file hash

  • run_user: The user who runs it.

  • recent_scan_time: last scan time

  • container_id: container ID

  • container_name: container name

  • **database

  • **web_cms

  • **web_service

  • name: software name

  • version: software version

  • install_path: installation path

  • config_path: configuration file path

  • uid: user ID

  • mode: software file permission

  • pid: software process ID

  • proc_path: software process path

  • record_time: scan time

  • container_id: container ID

  • container_name: container name

  • **jar_package

  • name: name

  • file_name: file name

  • catalogue: category

  • file_type: file type

  • version: version

  • path: file path

  • hash: file hash

  • uid: user ID

  • gid: user group ID

  • mode: file permission

  • pid: process ID

  • proc_path: process path

  • is_embedded: Whether the package is an inner JAR package.

  • package_path: path of the outer JAR package

  • record_time: scan time

  • container_id: container ID

  • container_name: container name

  • **port

  • port_status: Whether the port needs to be processed.

  • port: port number

  • type: type

  • pid: process ID

  • path: program file path

  • laddr: listening IP address

  • container_id: container ID

  • container_name: container name

  • **process

  • process_path: process path

  • launch_params: startup parameter

  • launch_time: start time

  • user_name: The user who runs it.

  • run_permission: execution permission

  • process_pid: process ID

  • hash: file hash

  • container_id: container ID

  • container_name: container name

  • **web_framework

  • name: name

  • file_name: file name

  • catalogue: category

  • file_type: file type

  • version: version

  • path: file path

  • hash: file hash

  • uid: user ID

  • gid: user group ID

  • mode: file permission

  • pid: process ID

  • proc_path: process path

  • record_time: scan time

  • container_id: container ID

  • container_name: container name

  • **web_site

  • domain: external domain name

  • port: external port number

  • url_path: URL path

  • path: web directory

  • mode: web directory file permission

  • uid: user ID

  • record_time: scan time

  • is_https: Whether HTTPS is used.

  • pid: process ID

  • cert_issuer: SSL certificate issuer

  • cert_user: SSL certificate user

  • cert_issue_time: SSL certificate issue time

  • cert_expired_time: SSL certificate expiration time

  • container_id: container ID

  • container_name: container name

  • **app

  • app_name: software name

  • version: version number

  • update_time: update time

  • recent_scan_time: last scan time

  • container_id: container ID

  • container_name: container name

  • **kernel_module

  • name: name

  • version: version

  • srcversion: source code version

  • desc: description

  • path: file path

  • size: file size

  • mode: file permission

  • uid: user ID

  • ctime: file creation time

  • mtime: last modification time

  • hash: file hash

  • record_time: scan time

Default Value

N/A

Response Parameters

Status code: 200

Table 6 Response body parameters

Parameter

Type

Description

record_total_num

Integer

Definition

Total number of exported records.

Range

N/A

task_id

String

Definition

Export task ID.

Range

N/A

Example Requests

[ [ [ "app_name", "Software name" ], [ "version", "Version" ], [ "update_time", "Update time." ], [ "recent_scan_time", "Last scan time." ], [ "container_id", "Container ID" ], [ "container_name", "Container name" ], [ "host_name", "Server name." ], [ "host_ip", "Server IP address." ] ] ]

Example Responses

Status code: 200

Request succeeded.

{
  "record_total_num" : 1,
  "task_id" : "asdwwqdtut01"
}

Status Codes

Status Code

Description

200

Request succeeded.

Error Codes

See Error Codes.