vuln.hackerone
[ 1 Introduction ] [ 2 Valid tags and data tables ] [ 3 Table structure ]
Introduction
The tags begin with vuln.hackerone
identifies events generated by HackerOne.
Valid tags and data tables
The full tag must have four levels. The first two are fixed as vuln.hackerone
. The third level identifies the type of events sent. The fourth level identifies the event subtype.
Table structure
vuln.hackerone.audit.logs
Field | Type | Extra Label |
---|---|---|
eventdate |
| Â |
hostname |
| Â |
id |
| Â |
type |
| Â |
attributes__log |
| Â |
attributes__event |
| Â |
attributes__source |
| Â |
attributes__subject |
| Â |
attributes__user_agent |
| Â |
attributes__country |
| Â |
attributes__parameters |
| Â |
attributes__created_at |
| Â |
program |
| Â |
at_devo_pulling_id |
| Â |
hostchain |
| ✓ |
tag |
| ✓ |
rawMessage |
| ✓ |