vuln.hackerone
Introduction
The tags begin with vuln.hackerone identifies events generated by HackerOne.
Tag structure
The full tag must have four levels. The first two are fixed as vuln.hackerone. The third level identifies the type of events sent. The fourth level identifies the event subtype.
Technology | Brand | Product | Type |
---|---|---|---|
vuln | hackerone | audit |
|
These are the valid tags and corresponding data tables that will receive the parsers' data:
Tag | Data table |
---|---|
vuln.hackerone.audit.logs | vuln.hackerone.audit.logs |
Field transformation
vuln.hackerone.audit.logs
Field | Type | Extra Label |
---|---|---|
eventdate |
| - |
hostname |
| - |
id |
| - |
type |
| - |
attributes__log |
| - |
attributes__event |
| - |
attributes__source |
| - |
attributes__subject |
| - |
attributes__user_agent |
| - |
attributes__country |
| - |
attributes__parameters |
| - |
attributes__created_at |
| - |
program |
| - |
at_devo_pulling_id |
| - |
hostchain |
| ✓ |
tag |
| ✓ |
rawMessage |
| ✓ |