Expand description

The main module containing the scoring mechanism & deployment contexts

Structs

The staging area for analyzing a piece of software

The context that describes the environment in which the vulnerability was found.

The score report of a single piece of software.

General information about a what scayl version generated a particular score.

The broken-down score of a single vulnerability.

Enums

An error that occurred while analyzing a piece of software

Describes how much access the service has access to the file-system. This information is used in conjunction with information sensitivity to determine the effect of file-system exploits. Selection of these categories should fall on the highest value based on read + write. If a service cannot write to every file but can read every file, it should be given the “Full” identifier.

The Information-Sensitivity category describes the sensitivity of the deployed service’s information. This category is used to analyze the effect of information-targeting vulnerabilities.

The Network Deployment category describes the public internet’s access to the deployed service. This category is used to evaluate the effect of a network-based vulnerability’s impact on the deployed service.

Describes the level of commandline access this service has access to. This category is used to analyze the effect of code-execution vulnerabilities.

The Remote-Access category describes the remote access to the deployed service. This category is used to evaluate the effect of a remote-access vulnerability’s impact on the deployed service.

Traits

A single cvss provider