/
vuln.hackerone
vuln.hackerone
[ 1 Introduction ] [ 2 Valid tags and data tables ] [ 3 Table structure ]
Introduction
The tags begin with vuln.hackerone
identifies events generated by HackerOne.
Valid tags and data tables
The full tag must have four levels. The first two are fixed as vuln.hackerone
. The third level identifies the type of events sent. The fourth level identifies the event subtype.
Table structure
vuln.hackerone.audit.logs
Field | Type | Extra Label |
---|---|---|
eventdate |
|
|
hostname |
|
|
id |
|
|
type |
|
|
attributes__log |
|
|
attributes__event |
|
|
attributes__source |
|
|
attributes__subject |
|
|
attributes__user_agent |
|
|
attributes__country |
|
|
attributes__parameters |
|
|
attributes__created_at |
|
|
program |
|
|
at_devo_pulling_id |
|
|
hostchain |
| ✓ |
tag |
| ✓ |
rawMessage |
| ✓ |