{"info":{"_postman_id":"ddec4b75-aa88-43d4-b517-8799020592b5","name":"HackEDU API","description":"<html><head></head><body><p>Welcome to the HackEDU Developer API! We're excited to help get you started.</p>\n<h1 id=\"authentication\">Authentication</h1>\n<p>You need an API Key to authenticate with the HackEDU Developer API. Include your key in the <code>X-API-Key</code> header on each request.</p>\n<p>You can obtain an API Key from your Admin Dashboard or by contacting <a href=\"mailto:support@hackedu.com\">support@securityjourney.com</a>.</p>\n<h1 id=\"errors\">Errors</h1>\n<p>HackEDU uses conventional HTTP response codes to indicate the success or failure of an API request. In general: Codes in the <code>2xx</code> range indicate success. Codes in the <code>4xx</code> range indicate an error that failed given the information provided (e.g., a required parameter was omitted, a uuid was malformed, etc.). Codes in the <code>5xx</code> range indicate an error with HackEDU's servers (these are rare).</p>\n<p>Some <code>4xx</code> errors that could be handled programmatically include an error code that briefly explains the error reported.</p>\n<h1 id=\"getting-started\">Getting Started</h1>\n<p>There are three groups of endpoints in our API Documentation: <code>Users</code>, <code>Teams</code>, and <code>Content</code>.</p>\n<p><em>Users</em></p>\n<p>These endpoints give you information about the users in your organization, and allows you to assign content to individuals in a couple different ways.</p>\n<p><em>Teams</em></p>\n<p>These team routes give you the ability to see where users are at in the context of a team they are on. You can also see a list of teams in your organization.</p>\n<p><em>Content</em></p>\n<p>The two routes within this content group give you information about all of the content in our platform as well as a vulnerabilities endpoint that describes our vulnerability category taxonomy.</p>\n<p><em>Issue Sources</em></p>\n<p>Issue Sources can either be one of our native integrations, or they can be a custom source. Custom sources cannot be synced automatically by HackEDU, so you will have to push Issues to custom sources yourself, using the /issues endpoints.</p>\n<p><em>Issues</em></p>\n<p>Issues are things like findings from vulnerability scans or bug bounty programs. They have vulnerabilities associated with them, which are used as a data source to inform your HackEDU adaptive training plans. Issues belong to an Issue Source.</p>\n<h2 id=\"example-use-cases\">Example Use Cases</h2>\n<p>Lets look at a couple use cases to help get you started looking at our APIs.</p>\n<p><strong>Create a Leaderboard</strong></p>\n<p>To get started with a simple Leaderboard, first take a look at the <code>/users</code> endpoint. You will see that this route returns a list of users. Each user looks similar to this:</p>\n<pre class=\"click-to-expand-wrapper is-snippet-wrapper\"><code>{\n  \"uuid\": \"a1fa3ee2-0d74-4e0a-971d-e25cee654e72\",\n  \"email\": \"alice@acme.com\",\n  \"progress\": 95,\n  \"points\": 10,\n  \"teams\": [\n    {\n      \"uuid\": \"befd585f-cb60-4f1a-954f-4219dd3aade5\",\n      \"name\": \"Mobile Team\",\n      \"complete\": false\n    }\n  ]\n}\n\n</code></pre><p>The <code>points</code> attribute is the number of points a user has scored in the different challenges in our platform.</p>\n<p>In the code snippet below, you will see an example of how you can use <code>requests</code> in Python 3 to call this endpoint with your API Key, sort by the number of points scored, and then print the results in order:</p>\n<pre class=\"click-to-expand-wrapper is-snippet-wrapper\"><code>import requests\nurl = \"https://api.hackedu.com/v1/users\"\nheaders= {\"X-API-Key\": \"YOUR_API_KEY_HERE\"}\nresponse = requests.request(\"GET\", url, headers=headers).json()\nusers = response[\"users\"]\nleaderboard = sorted(users, key = lambda i: i['points'], reverse=True)\nfor user in leaderboard:\n    if user[\"points\"] &gt; 0:\n      print(\"{0} points -- {1}\".format(user[\"points\"], user[\"email\"]))\n\n</code></pre><p><strong>Just-In-Time Training Example</strong></p>\n<p>Lets assume you have a scanner in place and want to automatically assign the XXE lesson to anyone who commits code with an XXE vulnerability in it.</p>\n<p>The first step is to find the <code>uuid</code> of the user you are trying to assign training to (<code>bob@acme.com</code> in this example). Keep in mind, these examples are meant to be examples, not production code:</p>\n<pre class=\"click-to-expand-wrapper is-snippet-wrapper\"><code>import requests\nurl = \"https://api.hackedu.com/v1/users\"\nheaders= {\"X-API-Key\": \"YOUR_API_KEY_HERE\"}\npayload = {\"query\": \"bob@acme.com\"}\nresponse = requests.request(\"GET\", url, headers=headers, params=payload).json()\nuser_uuid = response[\"users\"][0][\"uuid\"]\n\n</code></pre><p>After getting the user's uuid, you can find the XXE lesson from the <code>/courses</code> endpoint:</p>\n<pre class=\"click-to-expand-wrapper is-snippet-wrapper\"><code>{\n    \"uuid\": \"3f36f4fb-85b0-4e62-a3ee-0c2313efa704\",\n    \"title\": \"XML External Entities\",\n    \"metrics\": {\n        \"users_completed\": 10,\n        \"users_assigned\": 20,\n        \"average_time\": \"01:25\"\n    },\n    \"locked\": False\n}\n\n</code></pre><p>And the last step is making a POST to the <code>/users/:user_uuid/content/:content_uuid</code> endpoint to finally assign the lesson:</p>\n<pre class=\"click-to-expand-wrapper is-snippet-wrapper\"><code>url = \"https://api.hackedu.com/v1/users/{0}/content/{1}\".format(user_uuid, content_uuid)\nheaders= {\"X-API-Key\": \"YOUR_API_KEY_HERE\"}\nresponse = requests.request(\"POST\", url, headers=headers)\n\n</code></pre><h1 id=\"hackedu-cli\">HackEDU CLI</h1>\n<p>HackEDU has a command line interface to the API.</p>\n<p>In addition to interfacing with the API, we have also built native integrations with the following security tools:</p>\n<ul>\n<li>SonarQube</li>\n</ul>\n<p>See the documentation at <a href=\"https://github.com/hack-edu/hackedu-cli\">https://github.com/hack-edu/hackedu-cli</a></p>\n<h1 id=\"proficiency\">Proficiency</h1>\n<p>Proficiency is calculated for each top level Vulnerability Category. You can see the vulnerability categories on the <code>/vulnerabilities</code> route, but the top level categories are:</p>\n<ul>\n<li>Injection</li>\n<li>Authentication &amp; Access Control</li>\n<li>Cross Site Scripting (XSS)</li>\n<li>Request Forgery</li>\n<li>Other Web Attacks</li>\n<li>Memory Management</li>\n</ul>\n<p>You can see a description of each Proficiency level in the table below:</p>\n<table><tbody><tr><td><b>Expert</b></td><td>This user has completed all of the lessons in this vulnerability category and patched them in less time with fewer incorrect patches than average.</td></tr><tr><td><b>Average</b></td><td>This user has completed most of the lessons in this vulnerability category with an average number of patch attempts.</td></tr><tr><td><b>Needs Attention</b></td><td>This user either hasn't completed many lessons in this vulnerability category or takes more patch attempts than average to complete lessons.</td></tr><tr><td><b>Not Enough Data</b></td><td>We don't have enough data yet to know how this user is doing in this vulnerability category.</td></tr></tbody></table>\n\n<h1 id=\"changelog\">Changelog</h1>\n<h2 id=\"may-21-2021\">May 21, 2021</h2>\n<p>Renamed \"Mastery\" to \"Proficiency\" across our API Endpoints.</p>\n<h2 id=\"march-10-2021\">March 10, 2021</h2>\n<p>Added the <code>issue-sources/types</code> endpoint.</p>\n<h2 id=\"february-24-2021\">February 24, 2021</h2>\n<p><strong>Breaking Change on /vulnerabilities</strong></p>\n<p>Changed <code>/vulnerabilities</code> from returning a nested map of vulnerabilities by category to a flat list of vulnerabilties with filters. Vulnerabilities can now be filtered by:</p>\n<ul>\n<li>CWE</li>\n<li>CVE</li>\n<li>CAPEC</li>\n<li>Text Search</li>\n<li>Category Key</li>\n</ul>\n<p>Added <code>/vulnerabilities/:id</code> endpoint to get vulnerability details.</p>\n<h2 id=\"january-2-2021\">January 2, 2021</h2>\n<p>Removed \"beta\" tag from version number. Official \"v1\" release.</p>\n</body></html>","schema":"https://schema.getpostman.com/json/collection/v2.0.0/collection.json","toc":[{"content":"Authentication","slug":"authentication"},{"content":"Errors","slug":"errors"},{"content":"Getting Started","slug":"getting-started"},{"content":"HackEDU CLI","slug":"hackedu-cli"},{"content":"Proficiency","slug":"proficiency"},{"content":"Changelog","slug":"changelog"}],"owner":"23921186","collectionId":"ddec4b75-aa88-43d4-b517-8799020592b5","publishedId":"2sB2jAbo71","public":true,"customColor":{"top-bar":"FFFFFF","right-sidebar":"303030","highlight":"FF6C37"},"publishDate":"2025-05-12T17:06:41.000Z"},"item":[{"name":"Users","item":[{"name":"Get a list of users","id":"f68ab221-fd37-4bf6-af0a-c9133d0f8e22","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"X-API-Key","value":"{{API_KEY}}","description":"<p>API Key from the HackEDU Dashboard</p>\n","type":"text"}],"url":"https://api.hackedu.com/v1/users?query=","urlObject":{"path":["users"],"host":["https://api.hackedu.com/v1"],"query":[{"description":{"content":"<p>Optional search query</p>\n","type":"text/plain"},"key":"query","value":""}],"variable":[]}},"response":[{"id":"22510a91-12f6-4dfd-83bc-7c80a7ed05fe","name":"Get a list of users","originalRequest":{"method":"GET","header":[],"url":{"raw":"https://api.hackedu.com/v1/users","host":["https://api.hackedu.com/v1"],"path":["users"],"query":[{"key":null,"value":"","type":"text","disabled":true}]}},"status":"OK","code":200,"_postman_previewlanguage":"json","header":null,"cookie":[],"responseTime":null,"body":"{\n\t\"users\": [\n\t\t{\n\t\t\t\"uuid\": \"a1fa3ee2-0d74-4e0a-971d-e25cee654e72\",\n\t\t\t\"email\": \"alice@acme.com\",\n\t\t\t\"progress\": 95,\n\t\t\t\"points\": 10,\n\t\t\t\"teams\": [\n\t\t\t\t{\n\t\t\t\t\t\"uuid\": \"befd585f-cb60-4f1a-954f-4219dd3aade5\",\n\t\t\t\t\t\"name\": \"Mobile Team\",\n\t\t\t\t\t\"complete\": false\n\t\t\t\t}\n\t\t\t]\n            \"license_expiration\": \"2023-02-07\",\n            \"licensed\": true\n\t\t}\n\t]\n}"}],"_postman_id":"f68ab221-fd37-4bf6-af0a-c9133d0f8e22"},{"name":"Get user details","id":"1c875262-a4c6-4583-934f-4ef68ee5a8ea","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"X-API-Key","value":"{{API_KEY}}","description":"<p>API Key from the HackEDU Dashboard</p>\n","type":"text"}],"url":"https://api.hackedu.com/v1/users/:user_uuid","urlObject":{"path":["users",":user_uuid"],"host":["https://api.hackedu.com/v1"],"query":[],"variable":[{"id":"9aa054b9-49e8-4f31-8978-5d4e4e1ce192","description":{"content":"<p>UUID of the user you are retrieving</p>\n","type":"text/plain"},"type":"any","value":"6ebb848e-0ac3-4f69-bd99-ba2170d2c1b6","key":"user_uuid"}]}},"response":[{"id":"4fc2fc71-4b63-4a3d-8984-92b9263eee44","name":"Get user details","originalRequest":{"method":"GET","header":[],"url":"https://api.hackedu.com/v1/users"},"_postman_previewlanguage":"json","header":null,"cookie":[],"responseTime":null,"body":"{\n\t\"uuid\": \"a1fa3ee2-0d74-4e0a-971d-e25cee654e72\",\n\t\"email\": \"alice@acme.com\",\n\t\"progress\": 95,\n\t\"proficiency\": {\n\t\t\"injection\": \"expert\",\n\t\t\"authentication_access_control\": \"expert\",\n\t\t\"xss\": \"needs_attention\",\n\t\t\"request_forgery\": \"average\",\n\t\t\"other_web_attacks\": \"expert\",\n\t\t\"memory_management\": \"not_enough_data\"\n\t},\n\t\"completed_at\": null,\n\t\"training_time\": \"12:36\",\n\t\"code_submissions\": 82,\n\t\"points\": 10,\n\t\"role\": \"member\",\n\t\"teams\": [\n\t\t{\n\t\t\t\"uuid\": \"befd585f-cb60-4f1a-954f-4219dd3aade5\",\n\t\t\t\"name\": \"Mobile Team\",\n\t\t\t\"complete\": false,\n\t\t\t\"role\": \"team_admin\"\n\t\t}\n\t]\n}"}],"_postman_id":"1c875262-a4c6-4583-934f-4ef68ee5a8ea"},{"name":"Get a list of users completions","id":"bfa9b119-6104-46d0-a8ed-e6c1c66a19c5","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"X-API-Key","value":"{{API_KEY}}","description":"<p>API Key from the HackEDU Dashboard</p>\n","type":"text"}],"url":"https://api.hackedu.com/v1/users/completions","urlObject":{"path":["users","completions"],"host":["https://api.hackedu.com/v1"],"query":[],"variable":[]}},"response":[{"id":"f85a22bc-4261-4ac2-8e1e-e82aa41b2613","name":"Get a list of users completions","originalRequest":{"method":"GET","header":[],"url":{"raw":"https://api.hackedu.com/v1/users/completions","host":["https://api.hackedu.com/v1"],"path":["users","completions"],"query":[{"key":null,"value":"","type":"text","disabled":true}]}},"status":"OK","code":200,"_postman_previewlanguage":"json","header":null,"cookie":[],"responseTime":null,"body":"{\n\t\"alice@acme.com\": {\n        \"lessons\": {\n            \"6f2d6933-e632-4e01-8add-2d161bb6b059\": {\n                \"completion_time\": None,\n                \"description\": \"Learn about SQL Injection\",\n                \"due_date\": None,\n                \"max_progress\": None,\n                \"title\": \"SQL Injection\"\n            },\n            \"6a89f8ae-1e04-11eb-8a05-12a5332c4ca3\": {\n                \"completion_time\": \"2022-01-01 00:00:00\",\n                \"description\": \"Learn about API Security\",\n                \"due_date\": \"2038-01-01 00:00:00+00\",\n                \"max_progress\": 7,\n                \"title\": \"API Security\"\n            }\n        },\n        \"plans\": {\n            \"a5cf4e5d-c256-4ac0-a461-f7a323e92cc8\": {\n                \"10c267e6-a026-454c-a0b7-0df0bf33205b\": {\n                    \"completion_date\": \"2022-01-01 00:00:00\",\n                    \"due_date\": \"2038-01-01 00:00:00+00\",\n                    \"phase_title\": \"Web Application Security\"\n                },\n                \"10c267e6-a026-454c-a0b7-0df0bf33205b\": {\n                    \"completion_date\": \"None\",\n                    \"due_date\": \"None\",\n                    \"phase_title\": \"Web API Security\"\n                },\n                \"plan_title\": \"Secure Development Training\"\n            }\n        }\n    }\n}"}],"_postman_id":"bfa9b119-6104-46d0-a8ed-e6c1c66a19c5"},{"name":"Add a user","id":"cea2d0af-ba6c-4176-a15f-160369de8dc2","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"POST","header":[{"description":"<p>API Key from the HackEDU Dashboard</p>\n","key":"X-API-Key","type":"text","value":"{{API_KEY}}"},{"key":"Content-Type","name":"Content-Type","value":"application/x-www-form-urlencoded, application/json","type":"text"}],"body":{"mode":"raw","raw":"{\n    \"email\": \"alice@acme.com\", // Users email you are adding to your organization\n    \"team_uuid\": \"befd585f-cb60-4f1a-954f-4219dd3aade5\" //UUID of the team you are assinging user to (optional)\n}","options":{"raw":{"language":"json"}}},"url":"https://api.hackedu.com/v1/users","urlObject":{"path":["users"],"host":["https://api.hackedu.com/v1"],"query":[],"variable":[]}},"response":[{"id":"1eaa703f-0385-41ec-b631-51a27bc0fbac","name":"Error - team not found","originalRequest":{"method":"POST","header":[{"key":"X-API-Key","type":"text","value":"{{API_KEY}}"},{"key":"Content-Type","name":"Content-Type","value":"application/x-www-form-urlencoded","type":"text","disabled":true}],"body":{"mode":"urlencoded","urlencoded":[{"key":"email","value":"alice@acme.com","description":"Users email you are adding to your organization","type":"text"},{"key":"team_uuid","value":"befd585f-cb60-4f1a-954f-4219dd3aade5","description":"UUID of the team you are assinging user to (optional)","type":"text"}]},"url":"https://api.hackedu.com/v1/users"},"status":"NOT FOUND","code":404,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Thu, 03 Dec 2020 22:19:58 GMT"},{"key":"Content-Type","value":"application/json"},{"key":"Content-Length","value":"34"},{"key":"Connection","value":"keep-alive"},{"key":"X-Request-Id","value":"7453342f-432b-431a-8db7-d43fcb8c7a3c"},{"key":"Access-Control-Allow-Origin","value":"*"},{"key":"Server","value":"Werkzeug/1.0.1 Python/3.8.6"}],"cookie":[],"responseTime":null,"body":"{\n    \"error\": \"Team not found\"\n}"},{"id":"962efcc4-943b-46c8-948a-d8d1c4719a27","name":"Successful Request","originalRequest":{"method":"GET","header":[],"url":"https://api.hackedu.com/v1/users"},"_postman_previewlanguage":"json","header":null,"cookie":[],"responseTime":null,"body":"{\n\t\"uuid\": \"a1fa3ee2-0d74-4e0a-971d-e25cee654e72\",\n\t\"email\": \"alice@acme.com\",\n\t\"progress\": 0,\n\t\"proficiency\": {\n\t\t\"injection\": \"not_enough_data\",\n\t\t\"authentication_access_control\": \"not_enough_data\",\n\t\t\"xss\": \"not_enough_data\",\n\t\t\"request_forgery\": \"not_enough_data\",\n\t\t\"other_web_attacks\": \"not_enough_data\",\n\t\t\"memory_management\": \"not_enough_data\"\n\t},\n\t\"completed_at\": null,\n\t\"training_time\": \"00:00\",\n\t\"code_submissions\": 0,\n\t\"points\": 0,\n\t\"role\": \"member\",\n\t\"teams\": [\n\t\t{\n\t\t\t\"uuid\": \"befd585f-cb60-4f1a-954f-4219dd3aade5\",\n\t\t\t\"name\": \"Mobile Team\",\n\t\t\t\"complete\": false,\n\t\t\t\"role\": \"team_member\"\n\t\t}\n\t]\n}"},{"id":"12808a80-0371-4e01-9e04-410adacff69a","name":"Add a user","originalRequest":{"method":"POST","header":[{"description":"API Key from the HackEDU Dashboard","key":"X-API-Key","type":"text","value":"{{API_KEY}}"},{"key":"Content-Type","name":"Content-Type","value":"application/json","type":"text"}],"body":{"mode":"raw","raw":"{\n    \"email\": \"alice@acme.com\", // Users email you are adding to your organization\n    \"team_uuid\": \"befd585f-cb60-4f1a-954f-4219dd3aade5\" //UUID of the team you are assinging user to (optional)\n}","options":{"raw":{"language":"json"}}},"url":"https://api.hackedu.com/v1/users"},"_postman_previewlanguage":"Text","header":null,"cookie":[],"responseTime":null,"body":null}],"_postman_id":"cea2d0af-ba6c-4176-a15f-160369de8dc2"},{"name":"Assign content","id":"969b3b94-1601-4d38-be04-f1a9532daedd","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"POST","header":[{"key":"X-API-Key","value":"{{API_KEY}}","description":"<p>API Key from the HackEDU Dashboard</p>\n","type":"text"}],"url":"https://api.hackedu.com/v1/users/:user_uuid/content/:content_uuid","description":"<p>If you know what content you want to assign and the uuid of the user you'd like to assign it to, you can do that directly on this route.</p>\n<p>You can find the UUID of content on the <code>/courses</code> route.</p>\n","urlObject":{"path":["users",":user_uuid","content",":content_uuid"],"host":["https://api.hackedu.com/v1"],"query":[],"variable":[{"id":"6f3e5574-460e-49a3-a9a1-e7a2de7b1705","description":{"content":"<p>UUID of the user you are assinging lessons to</p>\n","type":"text/plain"},"type":"any","value":"3c82c96d-7dd2-45ee-9040-febb6510e600","key":"user_uuid"},{"id":"e003bb40-5885-4d31-9e6b-079a5892f24d","description":{"content":"<p>UUID of the content you want to assign</p>\n","type":"text/plain"},"type":"any","value":"ffaf1a2c-563c-49ea-94f9-a9be559a21b9","key":"content_uuid"}]}},"response":[{"id":"4710cc89-eb5f-4b44-8785-b284b9af248d","name":"Assign content","originalRequest":{"method":"GET","header":[],"url":{"raw":"https://api.hackedu.com/v1/users/:user_uuid/content/:content_uuid","host":["https://api.hackedu.com/v1"],"path":["users",":user_uuid","content",":content_uuid"],"variable":[{"key":"user_uuid","value":"3c82c96d-7dd2-45ee-9040-febb6510e600","description":"UUID of the user you are assinging lessons to"},{"key":"content_uuid","value":"ffaf1a2c-563c-49ea-94f9-a9be559a21b9","description":"UUID of the content you want to assign"}]}},"_postman_previewlanguage":"json","header":null,"cookie":[],"responseTime":null,"body":""}],"_postman_id":"969b3b94-1601-4d38-be04-f1a9532daedd"},{"name":"Add to a team","id":"06446e1a-04ec-4217-828d-9cc8d6164c42","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"POST","header":[{"description":"<p>API Key from the HackEDU Dashboard</p>\n","key":"X-API-Key","type":"text","value":"{{API_KEY}}"}],"url":"https://api.hackedu.com/v1/users/:user_uuid/teams/:team_uuid","urlObject":{"path":["users",":user_uuid","teams",":team_uuid"],"host":["https://api.hackedu.com/v1"],"query":[],"variable":[{"id":"a2816ad4-effc-4330-b7f2-375eadcfe813","description":{"content":"<p>UUID of the user you are adding to a team</p>\n","type":"text/plain"},"type":"any","value":"6ebb848e-0ac3-4f69-bd99-ba2170d2c1b6","key":"user_uuid"},{"id":"4ae8ddb5-5610-4ea8-ba68-17efd5d66553","description":{"content":"<p>UUID of the team you are adding to a user</p>\n","type":"text/plain"},"type":"any","value":"e1d074a6-86fa-48be-be14-ea95419c7005","key":"team_uuid"}]}},"response":[{"id":"80539579-39b6-497e-982f-2ffe45812f40","name":"Add to a team","originalRequest":{"method":"POST","header":[{"description":"API Key from the HackEDU Dashboard","key":"X-API-Key","type":"text","value":"{{API_KEY}}"}],"url":{"raw":"https://api.hackedu.com/v1/users/:user_uuid/teams/:team_uuid","host":["https://api.hackedu.com/v1"],"path":["users",":user_uuid","teams",":team_uuid"],"variable":[{"key":"user_uuid","value":"6ebb848e-0ac3-4f69-bd99-ba2170d2c1b6","description":"UUID of the user you are adding to a team"},{"key":"team_uuid","value":"e1d074a6-86fa-48be-be14-ea95419c7005","description":"UUID of the team you are adding to a user"}]}},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Sat, 19 Dec 2020 03:21:13 GMT"},{"key":"Content-Type","value":"application/json"},{"key":"Content-Length","value":"18"},{"key":"Connection","value":"keep-alive"},{"key":"X-Request-Id","value":"036ad694-6d58-44ac-b330-2609e4d65356"},{"key":"Access-Control-Allow-Origin","value":"*"},{"key":"Server","value":"Werkzeug/1.0.1 Python/3.8.6"}],"cookie":[],"responseTime":null,"body":"{\n    \"success\": true\n}"}],"_postman_id":"06446e1a-04ec-4217-828d-9cc8d6164c42"},{"name":"Remove from a team","id":"83ac9069-53fc-4b59-adba-3020038cf7d6","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"DELETE","header":[{"description":"<p>API Key from the HackEDU Dashboard</p>\n","key":"X-API-Key","type":"text","value":"{{API_KEY}}"}],"url":"https://api.hackedu.com/v1/users/:user_uuid/teams/:team_uuid","urlObject":{"path":["users",":user_uuid","teams",":team_uuid"],"host":["https://api.hackedu.com/v1"],"query":[],"variable":[{"id":"7c2e9361-fd4c-49b7-9480-f7ad62225a7e","description":{"content":"<p>UUID of the user you are removing from a team</p>\n","type":"text/plain"},"type":"any","value":"6ebb848e-0ac3-4f69-bd99-ba2170d2c1b6","key":"user_uuid"},{"id":"a72921c4-783b-4fb1-9251-db243eb1e244","description":{"content":"<p>UUID of the team you are removing from a user</p>\n","type":"text/plain"},"type":"any","value":"e1d074a6-86fa-48be-be14-ea95419c7005","key":"team_uuid"}]}},"response":[{"id":"4f126789-c85b-4618-a43d-58e5dbacb505","name":"Remove from a team","originalRequest":{"method":"DELETE","header":[{"description":"API Key from the HackEDU Dashboard","key":"X-API-Key","type":"text","value":"{{API_KEY}}"}],"url":{"raw":"https://api.hackedu.com/v1/users/:user_uuid/teams/:team_uuid","host":["https://api.hackedu.com/v1"],"path":["users",":user_uuid","teams",":team_uuid"],"variable":[{"key":"user_uuid","value":"6ebb848e-0ac3-4f69-bd99-ba2170d2c1b6","description":"UUID of the user you are removing from a team"},{"key":"team_uuid","value":"e1d074a6-86fa-48be-be14-ea95419c7005","description":"UUID of the team you are removing from a user"}]}},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Sat, 19 Dec 2020 03:21:36 GMT"},{"key":"Content-Type","value":"application/json"},{"key":"Content-Length","value":"17"},{"key":"Connection","value":"keep-alive"},{"key":"X-Request-Id","value":"9aa0e299-4848-4e29-a412-8cb0c7a2a3f3"},{"key":"Access-Control-Allow-Origin","value":"*"},{"key":"Server","value":"Werkzeug/1.0.1 Python/3.8.6"}],"cookie":[],"responseTime":null,"body":"{\n    \"sucess\": true\n}"}],"_postman_id":"83ac9069-53fc-4b59-adba-3020038cf7d6"}],"id":"37cc7c5d-c771-463c-a346-407c279b26f7","event":[{"listen":"prerequest","script":{"id":"9af68669-6c55-401c-b6b2-2b335bedfd95","type":"text/javascript","exec":[""]}},{"listen":"test","script":{"id":"1cd536fd-321d-4227-8354-463e7f7b2a26","type":"text/javascript","exec":[""]}}],"_postman_id":"37cc7c5d-c771-463c-a346-407c279b26f7","description":""},{"name":"Teams","item":[{"name":"Get a list of all teams","id":"c9429127-c274-4be7-8820-2206521e79a4","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"X-API-Key","value":"{{API_KEY}}","description":"<p>API Key from the HackEDU Dashboard</p>\n","type":"text"}],"url":"https://api.hackedu.com/v1/teams","urlObject":{"path":["teams"],"host":["https://api.hackedu.com/v1"],"query":[],"variable":[]}},"response":[{"id":"ca306b1b-a51c-48c7-b9e2-149ecbf3b4db","name":"Get a list of all teams","originalRequest":{"method":"GET","header":[],"url":"https://api.hackedu.com/v1/teams"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[],"cookie":[],"responseTime":null,"body":"{\n\t\"teams\": [\n\t\t{\n\t\t\t\"uuid\": \"10d0e32d-d30d-46ec-aed4-ad8c2250bd20\",\n\t\t\t\"name\": \"DevOps Team\",\n\t\t\t\"users\": {\n\t\t\t\t\"total_count\": 23,\n\t\t\t\t\"trained_count\": 10\n\t\t\t},\n\t\t\t\"progress\": 83\n\t\t},\n\t\t...\n\t]\n}"}],"_postman_id":"c9429127-c274-4be7-8820-2206521e79a4"},{"name":"Add a team","id":"73879077-5ce8-4d41-8dd9-b36e32a3afd6","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"POST","header":[{"description":"<p>API Key from the HackEDU Dashboard</p>\n","key":"X-API-Key","type":"text","value":"{{API_KEY}}"},{"key":"Content-Type","name":"Content-Type","type":"text","value":"application/x-www-form-urlencoded"}],"body":{"mode":"urlencoded","urlencoded":[{"description":"<p>Name of the team you are adding to your organization</p>\n","key":"name","type":"text","value":"Example Team 3"},{"key":"plan_uuid","value":"319600e4-aac3-4fbb-bc31-588136973789","description":"<p>UUID of the plan to assign to this new team (optional)</p>\n","type":"text"}]},"url":"https://api.hackedu.com/v1/teams","urlObject":{"path":["teams"],"host":["https://api.hackedu.com/v1"],"query":[],"variable":[]}},"response":[{"id":"a0978b2a-e3e8-42eb-b5f1-bfc14d449624","name":"Add a team","originalRequest":{"method":"GET","header":[],"url":"https://api.hackedu.com/v1/teams"},"_postman_previewlanguage":"json","header":null,"cookie":[],"responseTime":null,"body":"{\n    \"uuid\": \"5d865293-2727-48e6-b5cd-4c926b59d29e\",\n    \"name\": \"Example Team\",\n    \"organization_uuid\": \"d2ef4fd6-27cd-47a8-9f73-952c5e32e669\",\n    \"plan_uuid\": null\n}"}],"_postman_id":"73879077-5ce8-4d41-8dd9-b36e32a3afd6"},{"name":"Get details about a team","id":"11a080e7-f6dc-4681-9765-781c3ef637c1","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"X-API-Key","value":"{{API_KEY}}","description":"<p>API Key from the HackEDU Dashboard</p>\n","type":"text"}],"url":"https://api.hackedu.com/v1/teams/:team_uuid","urlObject":{"path":["teams",":team_uuid"],"host":["https://api.hackedu.com/v1"],"query":[],"variable":[{"id":"91291a2d-57d8-4a8a-95d9-6c55d08ac7b8","description":{"content":"<p>UUID of the team you are retreiving</p>\n","type":"text/plain"},"type":"any","value":"0a3801a6-376d-467d-9607-dd7ede59cdbb","key":"team_uuid"}]}},"response":[{"id":"903db8f8-7d40-47da-adbc-f54b04b0d7cb","name":"Get details about a team","originalRequest":{"method":"GET","header":[{"key":"X-API-Key","value":"{{API_KEY}}","type":"text"}],"url":{"raw":"https://api.hackedu.com/v1/teams/:team_uuid","host":["https://api.hackedu.com/v1"],"path":["teams",":team_uuid"],"variable":[{"key":"team_uuid","value":"0a3801a6-376d-467d-9607-dd7ede59cdbb","description":"UUID of the team you are retreiving"}]}},"_postman_previewlanguage":"json","header":null,"cookie":[],"responseTime":null,"body":"{\n\t\"uuid\": \"10d0e32d-d30d-46ec-aed4-ad8c2250bd20\",\n\t\"name\": \"DevOps Team\",\n\t\"total_count\": 23,\n\t\"trained_count\": 10,\n\t\"progress\": 89,\n\t\"users\": [\n\t\t{\n\t\t\t\"uuid\": \"3c82c96d-7dd2-45ee-9040-febb6510e600\",\n\t\t\t\"email\": \"amanda.patel@acme.com\",\n\t\t\t\"progress\": 100\n\t\t}, {\n\t\t\t\"uuid\": \"3517a58c-c0d1-4bee-b4f5-90cb401bf5e8\",\n\t\t\t\"email\": \"jim.mills@acme.com\",\n\t\t\t\"progress\": 64\n\t\t}\n\t],\n    \"settings\": {\n        \"adaptive_plans\": {\n            \"training_term\": \"monthly\",\n            \"vulnerability_refresh_days\": 45,\n            \"max_content\": 4,\n            \"grace_period\": 30\n        },\n        \"coding_test_required\": true,\n        \"created_by_sso\": false\n    }\n}"}],"_postman_id":"11a080e7-f6dc-4681-9765-781c3ef637c1"},{"name":"Get users on a team","id":"206a2613-1aa2-442a-ae83-7bf6931d50e0","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"X-API-Key","value":"{{API_KEY}}","description":"<p>API Key from the HackEDU Dashboard</p>\n","type":"text"}],"url":"https://api.hackedu.com/v1/teams/:team_uuid/users","urlObject":{"path":["teams",":team_uuid","users"],"host":["https://api.hackedu.com/v1"],"query":[],"variable":[{"id":"d8463b52-ab23-40af-aec5-c0af3d8a2b83","description":{"content":"<p>UUID of the team you are retreving users for</p>\n","type":"text/plain"},"type":"any","value":"3ac176df-c20b-4a18-9f80-6bd25dc76c69","key":"team_uuid"}]}},"response":[{"id":"adfd5cae-76dd-4b99-9dc1-dc2a47e63c98","name":"Get users on a team","originalRequest":{"method":"GET","header":[],"url":{"raw":"https://api.hackedu.com/v1/teams/:uuid/users","host":["https://api.hackedu.com/v1"],"path":["teams",":uuid","users"],"variable":[{"key":"uuid","value":"0a3801a6-376d-467d-9607-dd7ede59cdbb","description":"UUID of the team you are retreving users for"}]}},"_postman_previewlanguage":"json","header":null,"cookie":[],"responseTime":null,"body":"{\n\t\"users\": [\n\t\t{\n\t\t\t\"uuid\": \"3c82c96d-7dd2-45ee-9040-febb6510e600\",\n\t\t\t\"email\": \"amanda.patel@acme.com\",\n\t\t\t\"proficiency\": {\n\t\t\t\t\"injection\": \"expert\",\n\t\t\t\t\"authentication_access_control\": \"expert\",\n\t\t\t\t\"xss\": \"needs_attention\",\n\t\t\t\t\"request_forgery\": \"average\",\n\t\t\t\t\"other_web_attacks\": \"expert\",\n\t\t\t\t\"memory_management\": \"not_enough_data\"\n\t\t\t},\n\t\t\t\"completed_at\": null,\n\t\t\t\"progress\": 95,\n\t\t\t\"training_time\": \"12:36\",\n\t\t\t\"code_submissions\": 82,\n\t\t\t\"points\": 10,\n\t\t\t\"role\": \"member\",\n\t\t\t\"training_remaining\": [\n\t\t\t\t{\n\t\t\t\t\t\"uuid\": \"ca87cb7d-ec7c-4b7e-86e4-50358c4547f7\",\n\t\t\t\t\t\"title\": \"Command Injection\"\n\t\t\t\t}\t\n\t\t\t]\n\t\t}\t\n\t]\n}"}],"_postman_id":"206a2613-1aa2-442a-ae83-7bf6931d50e0"}],"id":"ad36b3f9-d322-4c75-9b9a-930be5e1f7e7","_postman_id":"ad36b3f9-d322-4c75-9b9a-930be5e1f7e7","description":""},{"name":"Content","item":[{"name":"Get content","id":"27d6ba98-4878-452b-8fdb-463e4890a5d8","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"X-API-Key","value":"{{API_KEY}}","description":"<p>API Key from the HackEDU Dashboard</p>\n","type":"text"}],"url":"https://api.hackedu.com/v1/content?content_type=lesson","urlObject":{"path":["content"],"host":["https://api.hackedu.com/v1"],"query":[{"description":{"content":"<p>The type of content you would like returned (optional). Possible options include: \"practice\", \"article\", \"coding_challenge\", \"hacking_challenge\", and \"lesson\"</p>\n","type":"text/plain"},"key":"content_type","value":"lesson"}],"variable":[]}},"response":[{"id":"36823f07-4309-48b0-90d3-5fb836c59d41","name":"Get content","originalRequest":{"method":"GET","header":[],"url":"https://api.hackedu.com/v1/content"},"_postman_previewlanguage":"json","header":[],"cookie":[],"responseTime":null,"body":"{\n\t\"content\": [\n\t\t{\n\t\t\t\"uuid\": \"ffaf1a2c-563c-49ea-94f9-a9be559a21b9\",\n\t\t\t\"title\": \"SQL Injection: Part 1\",\n\t\t\t\"content_type\": \"coding_challenge\",\n\t\t\t\"course\": \"OWASP Top 10\",\n\t\t\t\"metrics\": {\n\t\t\t\t\"users_completed\": 10,\n\t\t\t\t\"users_assigned\": 20,\n\t\t\t\t\"average_time\": \"01:25\"\n\t\t\t},\n\t\t\t\"vulnerabilities\": [\n\t\t\t\t{\n\t\t\t\t\t\"key\": \"sql_injection\",\n\t\t\t\t\t\"title\": \"SQL Injection\"\n\t\t\t\t}\n\t\t\t],\n\t\t\t\"locked\": false\n\t\t},\n\t\t...\n\t]\n}"}],"_postman_id":"27d6ba98-4878-452b-8fdb-463e4890a5d8"},{"name":"Get vulnerabilities","id":"1ad94d11-6fa5-4657-ab12-a6b9fd646a03","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"X-API-Key","value":"{{API_KEY}}","description":"<p>API Key from the HackEDU Dashboard</p>\n","type":"text"}],"url":"https://api.hackedu.com/v1/vulnerabilities?cwe=284&capec=79&cve=cve-2020-11023&text=Injection&category=injection","urlObject":{"path":["vulnerabilities"],"host":["https://api.hackedu.com/v1"],"query":[{"description":{"content":"<p>The cwe to search for (optional).</p>\n","type":"text/plain"},"key":"cwe","value":"284"},{"description":{"content":"<p>The capec to search for (optional).</p>\n","type":"text/plain"},"key":"capec","value":"79"},{"description":{"content":"<p>The cve to search for (optional).</p>\n","type":"text/plain"},"key":"cve","value":"cve-2020-11023"},{"description":{"content":"<p>A search query to find vulnerabilites by matching text (optional).</p>\n","type":"text/plain"},"key":"text","value":"Injection"},{"description":{"content":"<p>The category key to return (optional). Possible options include: \"injection\", \"authentication_access_control\", \"xss\", \"request_forgery\", \"other_web_attacks\", \"memory_management\", and \"resource_management_errors\"</p>\n","type":"text/plain"},"key":"category","value":"injection"}],"variable":[]}},"response":[{"id":"1765ec62-3ceb-4eb6-ab34-480c1e0c33d8","name":"Get vulnerabilities","originalRequest":{"method":"GET","header":[],"url":"https://api.hackedu.com/v1/vulnerabilities"},"_postman_previewlanguage":"json","header":null,"cookie":[],"responseTime":null,"body":"{\n    \"vulnerabilities\": [\n        {\n            \"title\": \"SQL Injection\",\n            \"key\": \"sql_injection\",\n            \"id\": 1,\n            \"category\": {\n                \"title\": \"Injection\",\n                \"key\": \"injection\"\n            }\n        },\n        ...\n    ]\n}"}],"_postman_id":"1ad94d11-6fa5-4657-ab12-a6b9fd646a03"},{"name":"Get vulnerability details","id":"b7361780-3063-4879-b9b2-11ec422cd4bd","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"X-API-Key","value":"{{API_KEY}}","description":"<p>API Key from the HackEDU Dashboard</p>\n","type":"text"}],"url":"https://api.hackedu.com/v1/vulnerabilities/:id","urlObject":{"path":["vulnerabilities",":id"],"host":["https://api.hackedu.com/v1"],"query":[],"variable":[{"id":"4de3967c-0475-40c6-a851-69dc3e638c0f","description":{"content":"<p>The vulnerability id, found in the \"Get vulnerabilities\" endpoint.</p>\n","type":"text/plain"},"type":"any","value":"1","key":"id"}]}},"response":[{"id":"adb2a1ca-0a08-4e51-9200-146239ef7adf","name":"Get vulnerability details","originalRequest":{"method":"GET","header":[{"key":"X-API-Key","value":"{{API_KEY}}","description":"API Key from the HackEDU Dashboard","type":"text"}],"url":{"raw":"https://api.hackedu.com/v1/vulnerabilities/:id","host":["https://api.hackedu.com/v1"],"path":["vulnerabilities",":id"],"variable":[{"key":"id","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Content-Type","value":"application/json"},{"key":"Content-Length","value":"156"},{"key":"X-Request-Id","value":"04345eb1-a269-490e-a7ec-8630f6f6c869"},{"key":"Access-Control-Allow-Origin","value":"*"},{"key":"Server","value":"Werkzeug/1.0.1 Python/3.8.6"},{"key":"Date","value":"Thu, 25 Feb 2021 02:26:52 GMT"}],"cookie":[],"responseTime":null,"body":"{\n    \"title\": \"SQL Injection\",\n    \"key\": \"sql_injection\",\n    \"id\": 1,\n    \"category\": {\n        \"title\": \"Injection\",\n        \"key\": \"injection\"\n    }\n}"}],"_postman_id":"b7361780-3063-4879-b9b2-11ec422cd4bd"}],"id":"6866e299-215e-466b-8bf2-8ac6953d9f5a","_postman_id":"6866e299-215e-466b-8bf2-8ac6953d9f5a","description":""},{"name":"Issue Sources","item":[{"name":"Get a list of issue sources","id":"27e19daa-f802-465d-bb0b-a948cf2639e4","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"X-Api-Key","value":"{{API_KEY}}","description":"<p>API Key from the HackEDU Dashboard</p>\n","type":"text"}],"url":"https://api.hackedu.com/v1/issue-sources","urlObject":{"path":["issue-sources"],"host":["https://api.hackedu.com/v1"],"query":[],"variable":[]}},"response":[],"_postman_id":"27e19daa-f802-465d-bb0b-a948cf2639e4"},{"name":"Create an issue source","id":"1065394d-a121-4f92-bb3b-a5a9d99c8a36","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"POST","header":[{"key":"X-Api-Key","value":"{{API_KEY}}","description":"<p>API Key from the HackEDU Dashboard</p>\n","type":"text"}],"body":{"mode":"urlencoded","urlencoded":[{"key":"title","value":"Example Title","type":"text"},{"key":"team_uuid","value":"c6aea1c0-b335-4cf7-8ab8-2849d9073e45","type":"text"},{"key":"settings","value":"{\"key\": \"value\"}","type":"text"}]},"url":"https://api.hackedu.com/v1/issue-sources","urlObject":{"path":["issue-sources"],"host":["https://api.hackedu.com/v1"],"query":[],"variable":[]}},"response":[],"_postman_id":"1065394d-a121-4f92-bb3b-a5a9d99c8a36"},{"name":"Get issue source details","id":"2aaa28a6-362f-49a3-9070-d072d17a7c76","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"X-Api-Key","value":"{{API_KEY}}","description":"<p>API Key from the HackEDU Dashboard</p>\n","type":"text"}],"url":"https://api.hackedu.com/v1/issue-sources/:issue_source_uuid","urlObject":{"path":["issue-sources",":issue_source_uuid"],"host":["https://api.hackedu.com/v1"],"query":[],"variable":[{"id":"5ccba52e-d77c-41fa-871b-37945d20a444","description":{"content":"<p>UUID of the issue source you are retrieving (required)</p>\n","type":"text/plain"},"type":"any","value":"9674813d-d46f-41db-8850-45a80abdad1a","key":"issue_source_uuid"}]}},"response":[],"_postman_id":"2aaa28a6-362f-49a3-9070-d072d17a7c76"},{"name":"Update an issue source","id":"87f09ea2-cc52-4b91-b35e-d6850a35ab99","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"PATCH","header":[{"key":"X-Api-Key","value":"{{API_KEY}}","description":"<p>API Key from the HackEDU Dashboard</p>\n","type":"text"}],"url":"https://api.hackedu.com/v1/issue-sources/:issue_source_uuid","urlObject":{"path":["issue-sources",":issue_source_uuid"],"host":["https://api.hackedu.com/v1"],"query":[],"variable":[{"id":"3f30e1d3-2b40-47a5-a6fc-a5a967befa8d","type":"any","value":"","key":"issue_source_uuid"}]}},"response":[],"_postman_id":"87f09ea2-cc52-4b91-b35e-d6850a35ab99"},{"name":"Remove issue source","id":"f8117bed-5600-448c-bf7e-26b74365da58","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"DELETE","header":[{"key":"X-Api-Key","value":"{{API_KEY}}","description":"<p>API Key from the HackEDU Dashboard</p>\n","type":"text"}],"url":"https://api.hackedu.com/v1/issue-sources/:issue_source_uuid","urlObject":{"path":["issue-sources",":issue_source_uuid"],"host":["https://api.hackedu.com/v1"],"query":[],"variable":[{"id":"429136cf-4561-40a8-afe5-7e0bdb8fab4a","type":"any","value":"","key":"issue_source_uuid"}]}},"response":[],"_postman_id":"f8117bed-5600-448c-bf7e-26b74365da58"},{"name":"Get issue source types","id":"4f2998c8-7f6c-4b3b-ab01-6b12bd652234","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"X-Api-Key","value":"{{API_KEY}}","description":"<p>API Key from the HackEDU Dashboard</p>\n","type":"text"}],"url":"https://api.hackedu.com/v1/issue-sources/types","urlObject":{"path":["issue-sources","types"],"host":["https://api.hackedu.com/v1"],"query":[],"variable":[]}},"response":[],"_postman_id":"4f2998c8-7f6c-4b3b-ab01-6b12bd652234"}],"id":"17b2344c-33ef-4160-826b-9119ded05658","description":"<p>Issue Sources can either be one of our native integrations, or they can be a custom source.  Custom sources cannot be synced automatically by HackEDU, so you will have to push Issues to custom sources yourself, using the /issues endpoints.</p>\n","event":[{"listen":"prerequest","script":{"id":"f539122d-d706-4c38-a03a-092a41e6b945","type":"text/javascript","exec":[""]}},{"listen":"test","script":{"id":"c14af4f6-3c1f-44d3-84ea-14b43b62ff4c","type":"text/javascript","exec":[""]}}],"_postman_id":"17b2344c-33ef-4160-826b-9119ded05658"},{"name":"Issues","item":[{"name":"Get a list of issues","id":"d054f1d3-3a8e-45fc-9efb-06d5618aea1d","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"X-Api-Key","value":"{{API_KEY}}","description":"<p>API Key from the HackEDU Dashboard</p>\n","type":"text"}],"url":"https://api.hackedu.com/v1/issues","urlObject":{"path":["issues"],"host":["https://api.hackedu.com/v1"],"query":[],"variable":[]}},"response":[{"id":"572ec103-bf38-47a1-bbb3-d20a7cb556da","name":"Get a list of issues","originalRequest":{"method":"GET","header":[{"key":"X-Api-Key","value":"{{API_KEY}}","description":"API Key from the HackEDU Dashboard","type":"text"}],"url":"https://api.hackedu.com/v1/issues"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Sun, 03 Jan 2021 07:13:02 GMT"},{"key":"Content-Type","value":"application/json"},{"key":"Content-Length","value":"48675"},{"key":"Connection","value":"keep-alive"},{"key":"X-Request-Id","value":"8c16b3d4-fe40-44f2-b50d-4ae851871bba"},{"key":"Access-Control-Allow-Origin","value":"*"},{"key":"Server","value":"Werkzeug/1.0.1 Python/3.8.6"}],"cookie":[],"responseTime":null,"body":"{\n    \"pagination\": {\n        \"total\": 338,\n        \"total_pages\": 12,\n        \"curent_page\": 1,\n        \"next\": \"https://api.hackedu.com/v1/issues?p=2\"\n    },\n    \"issues\": [\n        {\n            \"uuid\": \"f9529815-f3eb-40a6-90fb-198106a3795f\",\n            \"title\": \"Example Title\",\n            \"description\": \"This is an example description\",\n            \"timestamp\": \"2020-12-01 00:00:00\",\n            \"issue_source_uuid\": \"41d12e24-b9ae-4b65-a45a-a7c77bf3f0fe\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-15 00:54:15.960195\",\n            \"issue_source_unique_id\": \"1002\",\n            \"severity\": 9.1,\n            \"url\": \"http://internal/id=1001\",\n            \"raw_data\": {\n                \"key\": \"value\"\n            },\n            \"app_id\": \"Test App\"\n        },\n        {\n            \"uuid\": \"b14f48c0-3c38-4d3e-89d3-c0841763796e\",\n            \"title\": \"Example Title\",\n            \"description\": \"This is an example description\",\n            \"timestamp\": \"2020-12-01 00:00:00\",\n            \"issue_source_uuid\": \"41d12e24-b9ae-4b65-a45a-a7c77bf3f0fe\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 22:53:10.616926\",\n            \"issue_source_unique_id\": \"1001\",\n            \"severity\": 9.1,\n            \"url\": \"http://internal/id=1001\",\n            \"raw_data\": {\n                \"key\": \"value\"\n            },\n            \"app_id\": \"Test App\"\n        },\n        {\n            \"uuid\": \"cc176b57-52d0-46fb-925b-9130e12b2af6\",\n            \"title\": \"test3\",\n            \"description\": \"This is an example description\",\n            \"timestamp\": \"2020-12-01 00:00:00\",\n            \"issue_source_uuid\": \"41d12e24-b9ae-4b65-a45a-a7c77bf3f0fe\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 03:25:50.885668\",\n            \"issue_source_unique_id\": \"4\",\n            \"severity\": 9.1,\n            \"url\": \"http://internal/id=1\",\n            \"raw_data\": {\n                \"key\": \"value\"\n            },\n            \"app_id\": \"Test12\"\n        },\n        {\n            \"uuid\": \"b378a23c-6e83-416c-a4e0-491599db9570\",\n            \"title\": \"test3\",\n            \"description\": null,\n            \"timestamp\": \"2020-12-01 00:00:00\",\n            \"issue_source_uuid\": \"41d12e24-b9ae-4b65-a45a-a7c77bf3f0fe\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 03:21:48.91118\",\n            \"issue_source_unique_id\": \"3\",\n            \"severity\": 9.1,\n            \"url\": null,\n            \"raw_data\": null,\n            \"app_id\": \"Test12\"\n        },\n        {\n            \"uuid\": \"8c0d1a94-822c-4438-9722-7cb12df4f82f\",\n            \"title\": \"test\",\n            \"description\": null,\n            \"timestamp\": null,\n            \"issue_source_uuid\": \"41d12e24-b9ae-4b65-a45a-a7c77bf3f0fe\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 03:21:37.38714\",\n            \"issue_source_unique_id\": \"2\",\n            \"severity\": null,\n            \"url\": null,\n            \"raw_data\": null,\n            \"app_id\": \"Test12\"\n        },\n        {\n            \"uuid\": \"d793af4e-1680-42f4-9feb-20625e5cda65\",\n            \"title\": \"test\",\n            \"description\": null,\n            \"timestamp\": null,\n            \"issue_source_uuid\": \"41d12e24-b9ae-4b65-a45a-a7c77bf3f0fe\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 03:21:10.204929\",\n            \"issue_source_unique_id\": \"1\",\n            \"severity\": null,\n            \"url\": null,\n            \"raw_data\": null,\n            \"app_id\": null\n        },\n        {\n            \"uuid\": \"0938d72b-4973-4109-a971-141d5f285138\",\n            \"title\": \"Log Injection from \\\"Screen\\\" Parameter, \\\"action\\\" Parameter, \\\"employee_id\\\" Parameter and 3 Other Sources on \\\"/WebGoat/attack\\\" page\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:49.372915\",\n            \"issue_source_unique_id\": \"540P-SU3Z-U689-NZWM\",\n            \"severity\": 0,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/540P-SU3Z-U689-NZWM\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"Injection\",\n                \"category_label\": \"Injection\",\n                \"closed_time\": null,\n                \"confidence\": \"High\",\n                \"confidence_label\": \"High\",\n                \"default_severity\": \"NOTE\",\n                \"default_severity_label\": \"Note\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"Low\",\n                \"impact_label\": \"Low\",\n                \"instance_uuid\": \"540P-SU3Z-U689-NZWM\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"Low\",\n                \"likelihood_label\": \"Low\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"log-injection\",\n                \"rule_title\": \"Log Injection\",\n                \"severity\": \"Note\",\n                \"severity_label\": \"Note\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"Log Injection from \\\"Screen\\\" Parameter, \\\"action\\\" Parameter, \\\"employee_id\\\" Parameter and 3 Other Sources on \\\"/WebGoat/attack\\\" page\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"Log Injection from \\\"Screen\\\" Parameter, \\\"action\\\" Parameter, \\\"employee_id\\\" Parameter and 3 Other Sources on \\\"/WebGoat/attack\\\" page\",\n                \"total_traces_received\": 1,\n                \"uuid\": \"540P-SU3Z-U689-NZWM\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"a083c244-0f65-43d4-8d25-bb2c6ac2ac05\",\n            \"title\": \"Log Injection from \\\"Password\\\" Parameter, \\\"SUBMIT\\\" Parameter, \\\"Screen\\\" Parameter and 3 Other Sources on \\\"/WebGoat/attack\\\" page\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:49.171557\",\n            \"issue_source_unique_id\": \"1P7O-0DPY-7P41-E4K1\",\n            \"severity\": 0,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/1P7O-0DPY-7P41-E4K1\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"Injection\",\n                \"category_label\": \"Injection\",\n                \"closed_time\": null,\n                \"confidence\": \"High\",\n                \"confidence_label\": \"High\",\n                \"default_severity\": \"NOTE\",\n                \"default_severity_label\": \"Note\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"Low\",\n                \"impact_label\": \"Low\",\n                \"instance_uuid\": \"1P7O-0DPY-7P41-E4K1\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"Low\",\n                \"likelihood_label\": \"Low\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"log-injection\",\n                \"rule_title\": \"Log Injection\",\n                \"severity\": \"Note\",\n                \"severity_label\": \"Note\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"Log Injection from \\\"Password\\\" Parameter, \\\"SUBMIT\\\" Parameter, \\\"Screen\\\" Parameter and 3 Other Sources on \\\"/WebGoat/attack\\\" page\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"Log Injection from \\\"Password\\\" Parameter, \\\"SUBMIT\\\" Parameter, \\\"Screen\\\" Parameter and 3 Other Sources on \\\"/WebGoat/attack\\\" page\",\n                \"total_traces_received\": 1,\n                \"uuid\": \"1P7O-0DPY-7P41-E4K1\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"6eb90f01-8a71-4ea1-8df0-d671f5e86bd9\",\n            \"title\": \"Log Injection from \\\"SUBMIT\\\" Parameter, \\\"Screen\\\" Parameter, \\\"cs_csrf_tkn\\\" Parameter and 4 Other Sources on \\\"/WebGoat/attack\\\" page\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:48.980015\",\n            \"issue_source_unique_id\": \"1N4G-3DRK-P5FC-K19V\",\n            \"severity\": 0,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/1N4G-3DRK-P5FC-K19V\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"Injection\",\n                \"category_label\": \"Injection\",\n                \"closed_time\": null,\n                \"confidence\": \"High\",\n                \"confidence_label\": \"High\",\n                \"default_severity\": \"NOTE\",\n                \"default_severity_label\": \"Note\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"Low\",\n                \"impact_label\": \"Low\",\n                \"instance_uuid\": \"1N4G-3DRK-P5FC-K19V\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"Low\",\n                \"likelihood_label\": \"Low\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"log-injection\",\n                \"rule_title\": \"Log Injection\",\n                \"severity\": \"Note\",\n                \"severity_label\": \"Note\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"Log Injection from \\\"SUBMIT\\\" Parameter, \\\"Screen\\\" Parameter, \\\"cs_csrf_tkn\\\" Parameter and 4 Other Sources on \\\"/WebGoat/attack\\\" page\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"Log Injection from \\\"SUBMIT\\\" Parameter, \\\"Screen\\\" Parameter, \\\"cs_csrf_tkn\\\" Parameter and 4 Other Sources on \\\"/WebGoat/attack\\\" page\",\n                \"total_traces_received\": 1,\n                \"uuid\": \"1N4G-3DRK-P5FC-K19V\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"a085d28b-7604-4409-a261-1f9cacb832c1\",\n            \"title\": \"Cross-Site Scripting from \\\"Password\\\" Parameter, \\\"Username\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:48.770542\",\n            \"issue_source_unique_id\": \"UAKD-CR7W-JCUF-97I7\",\n            \"severity\": 7.5,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/UAKD-CR7W-JCUF-97I7\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"XSS\",\n                \"category_label\": \"XSS\",\n                \"closed_time\": null,\n                \"confidence\": \"High\",\n                \"confidence_label\": \"High\",\n                \"default_severity\": \"HIGH\",\n                \"default_severity_label\": \"High\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"Medium\",\n                \"impact_label\": \"Medium\",\n                \"instance_uuid\": \"UAKD-CR7W-JCUF-97I7\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"High\",\n                \"likelihood_label\": \"High\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"reflected-xss\",\n                \"rule_title\": \"Cross-Site Scripting\",\n                \"severity\": \"High\",\n                \"severity_label\": \"High\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"Cross-Site Scripting from \\\"Password\\\" Parameter, \\\"Username\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"Cross-Site Scripting from \\\"Password\\\" Parameter, \\\"Username\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n                \"total_traces_received\": 1,\n                \"uuid\": \"UAKD-CR7W-JCUF-97I7\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"65d1cf5a-8a7d-4eb2-89fb-82748b819736\",\n            \"title\": \"Log Injection from \\\"Screen\\\" Parameter, \\\"action\\\" Parameter, \\\"httponly\\\" Parameter and 4 Other Sources on \\\"/WebGoat/attack\\\" page\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:48.573021\",\n            \"issue_source_unique_id\": \"23JM-XAJM-W2BS-HN4G\",\n            \"severity\": 0,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/23JM-XAJM-W2BS-HN4G\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"Injection\",\n                \"category_label\": \"Injection\",\n                \"closed_time\": null,\n                \"confidence\": \"High\",\n                \"confidence_label\": \"High\",\n                \"default_severity\": \"NOTE\",\n                \"default_severity_label\": \"Note\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"Low\",\n                \"impact_label\": \"Low\",\n                \"instance_uuid\": \"23JM-XAJM-W2BS-HN4G\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"Low\",\n                \"likelihood_label\": \"Low\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"log-injection\",\n                \"rule_title\": \"Log Injection\",\n                \"severity\": \"Note\",\n                \"severity_label\": \"Note\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"Log Injection from \\\"Screen\\\" Parameter, \\\"action\\\" Parameter, \\\"httponly\\\" Parameter and 4 Other Sources on \\\"/WebGoat/attack\\\" page\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"Log Injection from \\\"Screen\\\" Parameter, \\\"action\\\" Parameter, \\\"httponly\\\" Parameter and 4 Other Sources on \\\"/WebGoat/attack\\\" page\",\n                \"total_traces_received\": 1,\n                \"uuid\": \"23JM-XAJM-W2BS-HN4G\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"8e27a3fd-e497-4368-a187-5ac2b81e0043\",\n            \"title\": \"Log Injection from \\\"SUBMIT\\\" Parameter, \\\"Screen\\\" Parameter, \\\"Username\\\" Parameter and 2 Other Sources on \\\"/WebGoat/attack\\\" page\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:48.377066\",\n            \"issue_source_unique_id\": \"B6SP-1CNE-CVN1-LGPZ\",\n            \"severity\": 0,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/B6SP-1CNE-CVN1-LGPZ\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"Injection\",\n                \"category_label\": \"Injection\",\n                \"closed_time\": null,\n                \"confidence\": \"High\",\n                \"confidence_label\": \"High\",\n                \"default_severity\": \"NOTE\",\n                \"default_severity_label\": \"Note\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"Low\",\n                \"impact_label\": \"Low\",\n                \"instance_uuid\": \"B6SP-1CNE-CVN1-LGPZ\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"Low\",\n                \"likelihood_label\": \"Low\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"log-injection\",\n                \"rule_title\": \"Log Injection\",\n                \"severity\": \"Note\",\n                \"severity_label\": \"Note\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"Log Injection from \\\"SUBMIT\\\" Parameter, \\\"Screen\\\" Parameter, \\\"Username\\\" Parameter and 2 Other Sources on \\\"/WebGoat/attack\\\" page\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"Log Injection from \\\"SUBMIT\\\" Parameter, \\\"Screen\\\" Parameter, \\\"Username\\\" Parameter and 2 Other Sources on \\\"/WebGoat/attack\\\" page\",\n                \"total_traces_received\": 1,\n                \"uuid\": \"B6SP-1CNE-CVN1-LGPZ\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"1bb7473f-3c4c-4bea-a976-cc2d4fa65b8a\",\n            \"title\": \"Cross-Site Scripting from \\\"WEAKID\\\" HTTP Cookie on \\\"/WebGoat/attack\\\" page\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:48.173987\",\n            \"issue_source_unique_id\": \"9W6V-VVDN-WGMX-MORA\",\n            \"severity\": 7.5,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/9W6V-VVDN-WGMX-MORA\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"XSS\",\n                \"category_label\": \"XSS\",\n                \"closed_time\": null,\n                \"confidence\": \"High\",\n                \"confidence_label\": \"High\",\n                \"default_severity\": \"HIGH\",\n                \"default_severity_label\": \"High\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"Medium\",\n                \"impact_label\": \"Medium\",\n                \"instance_uuid\": \"9W6V-VVDN-WGMX-MORA\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"High\",\n                \"likelihood_label\": \"High\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"reflected-xss\",\n                \"rule_title\": \"Cross-Site Scripting\",\n                \"severity\": \"High\",\n                \"severity_label\": \"High\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"Cross-Site Scripting from \\\"WEAKID\\\" HTTP Cookie on \\\"/WebGoat/attack\\\" page\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"Cross-Site Scripting from \\\"WEAKID\\\" HTTP Cookie on \\\"/WebGoat/attack\\\" page\",\n                \"total_traces_received\": 1,\n                \"uuid\": \"9W6V-VVDN-WGMX-MORA\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"51fc0be5-c3b4-4e7d-9c48-aa99d2574124\",\n            \"title\": \"Cross-Site Scripting from \\\"Resource\\\" Parameter, \\\"User\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:47.971928\",\n            \"issue_source_unique_id\": \"X3E3-ZFPI-BI83-N5FM\",\n            \"severity\": 7.5,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/X3E3-ZFPI-BI83-N5FM\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"XSS\",\n                \"category_label\": \"XSS\",\n                \"closed_time\": null,\n                \"confidence\": \"High\",\n                \"confidence_label\": \"High\",\n                \"default_severity\": \"HIGH\",\n                \"default_severity_label\": \"High\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"Medium\",\n                \"impact_label\": \"Medium\",\n                \"instance_uuid\": \"X3E3-ZFPI-BI83-N5FM\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"High\",\n                \"likelihood_label\": \"High\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"reflected-xss\",\n                \"rule_title\": \"Cross-Site Scripting\",\n                \"severity\": \"High\",\n                \"severity_label\": \"High\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"Cross-Site Scripting from \\\"Resource\\\" Parameter, \\\"User\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"Cross-Site Scripting from \\\"Resource\\\" Parameter, \\\"User\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n                \"total_traces_received\": 1,\n                \"uuid\": \"X3E3-ZFPI-BI83-N5FM\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"a44de603-e75c-484d-9c97-8c1eb4d081e9\",\n            \"title\": \"Cross-Site Scripting from \\\"input\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:47.766528\",\n            \"issue_source_unique_id\": \"HHY0-L4VF-V54S-6DHI\",\n            \"severity\": 7.5,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/HHY0-L4VF-V54S-6DHI\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"XSS\",\n                \"category_label\": \"XSS\",\n                \"closed_time\": null,\n                \"confidence\": \"High\",\n                \"confidence_label\": \"High\",\n                \"default_severity\": \"HIGH\",\n                \"default_severity_label\": \"High\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"Medium\",\n                \"impact_label\": \"Medium\",\n                \"instance_uuid\": \"HHY0-L4VF-V54S-6DHI\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"High\",\n                \"likelihood_label\": \"High\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"reflected-xss\",\n                \"rule_title\": \"Cross-Site Scripting\",\n                \"severity\": \"High\",\n                \"severity_label\": \"High\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"Cross-Site Scripting from \\\"input\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"Cross-Site Scripting from \\\"input\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n                \"total_traces_received\": 3,\n                \"uuid\": \"HHY0-L4VF-V54S-6DHI\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"a628acdf-bde7-41e1-a6cb-12693df33d92\",\n            \"title\": \"Log Injection from \\\"SUBMIT\\\" Parameter, \\\"Screen\\\" Parameter, \\\"menu\\\" Parameter and 3 Other Sources on \\\"/WebGoat/attack\\\" page\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:47.568469\",\n            \"issue_source_unique_id\": \"HUXG-VHHP-ZAHM-JCDC\",\n            \"severity\": 0,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/HUXG-VHHP-ZAHM-JCDC\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"Injection\",\n                \"category_label\": \"Injection\",\n                \"closed_time\": null,\n                \"confidence\": \"High\",\n                \"confidence_label\": \"High\",\n                \"default_severity\": \"NOTE\",\n                \"default_severity_label\": \"Note\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"Low\",\n                \"impact_label\": \"Low\",\n                \"instance_uuid\": \"HUXG-VHHP-ZAHM-JCDC\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"Low\",\n                \"likelihood_label\": \"Low\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"log-injection\",\n                \"rule_title\": \"Log Injection\",\n                \"severity\": \"Note\",\n                \"severity_label\": \"Note\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"Log Injection from \\\"SUBMIT\\\" Parameter, \\\"Screen\\\" Parameter, \\\"menu\\\" Parameter and 3 Other Sources on \\\"/WebGoat/attack\\\" page\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"Log Injection from \\\"SUBMIT\\\" Parameter, \\\"Screen\\\" Parameter, \\\"menu\\\" Parameter and 3 Other Sources on \\\"/WebGoat/attack\\\" page\",\n                \"total_traces_received\": 1,\n                \"uuid\": \"HUXG-VHHP-ZAHM-JCDC\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"6591d8e4-f29d-4e20-8876-67295b5d112f\",\n            \"title\": \"Log Injection from \\\"Screen\\\" Parameter, \\\"action\\\" Parameter, \\\"employee_id\\\" Parameter and 4 Other Sources on \\\"/WebGoat/attack\\\" page\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:47.353529\",\n            \"issue_source_unique_id\": \"T54G-NGG7-SCEJ-FOYJ\",\n            \"severity\": 0,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/T54G-NGG7-SCEJ-FOYJ\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"Injection\",\n                \"category_label\": \"Injection\",\n                \"closed_time\": null,\n                \"confidence\": \"High\",\n                \"confidence_label\": \"High\",\n                \"default_severity\": \"NOTE\",\n                \"default_severity_label\": \"Note\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"Low\",\n                \"impact_label\": \"Low\",\n                \"instance_uuid\": \"T54G-NGG7-SCEJ-FOYJ\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"Low\",\n                \"likelihood_label\": \"Low\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"log-injection\",\n                \"rule_title\": \"Log Injection\",\n                \"severity\": \"Note\",\n                \"severity_label\": \"Note\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"Log Injection from \\\"Screen\\\" Parameter, \\\"action\\\" Parameter, \\\"employee_id\\\" Parameter and 4 Other Sources on \\\"/WebGoat/attack\\\" page\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"Log Injection from \\\"Screen\\\" Parameter, \\\"action\\\" Parameter, \\\"employee_id\\\" Parameter and 4 Other Sources on \\\"/WebGoat/attack\\\" page\",\n                \"total_traces_received\": 1,\n                \"uuid\": \"T54G-NGG7-SCEJ-FOYJ\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"0710412a-7d3e-4246-afd5-f03380813b9b\",\n            \"title\": \"Cross-Site Scripting from \\\"Username\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:47.151235\",\n            \"issue_source_unique_id\": \"CLTK-NAEM-LWD3-2MFU\",\n            \"severity\": 7.5,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/CLTK-NAEM-LWD3-2MFU\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"XSS\",\n                \"category_label\": \"XSS\",\n                \"closed_time\": null,\n                \"confidence\": \"High\",\n                \"confidence_label\": \"High\",\n                \"default_severity\": \"HIGH\",\n                \"default_severity_label\": \"High\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"Medium\",\n                \"impact_label\": \"Medium\",\n                \"instance_uuid\": \"CLTK-NAEM-LWD3-2MFU\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"High\",\n                \"likelihood_label\": \"High\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"reflected-xss\",\n                \"rule_title\": \"Cross-Site Scripting\",\n                \"severity\": \"High\",\n                \"severity_label\": \"High\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"Cross-Site Scripting from \\\"Username\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"Cross-Site Scripting from \\\"Username\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n                \"total_traces_received\": 4,\n                \"uuid\": \"CLTK-NAEM-LWD3-2MFU\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"1870ac50-5d83-4ff5-8ce8-b22c30abd6c1\",\n            \"title\": \"XPath Injection from \\\"Password\\\" Parameter, \\\"Username\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:46.988991\",\n            \"issue_source_unique_id\": \"H9QB-CKD6-IVBZ-AH4M\",\n            \"severity\": 7.5,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/H9QB-CKD6-IVBZ-AH4M\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"Injection\",\n                \"category_label\": \"Injection\",\n                \"closed_time\": null,\n                \"confidence\": \"High\",\n                \"confidence_label\": \"High\",\n                \"default_severity\": \"HIGH\",\n                \"default_severity_label\": \"High\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"Medium\",\n                \"impact_label\": \"Medium\",\n                \"instance_uuid\": \"H9QB-CKD6-IVBZ-AH4M\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"High\",\n                \"likelihood_label\": \"High\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"xpath-injection\",\n                \"rule_title\": \"XPath Injection\",\n                \"severity\": \"High\",\n                \"severity_label\": \"High\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"XPath Injection from \\\"Password\\\" Parameter, \\\"Username\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"XPath Injection from \\\"Password\\\" Parameter, \\\"Username\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n                \"total_traces_received\": 6,\n                \"uuid\": \"H9QB-CKD6-IVBZ-AH4M\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"e8b77bf5-acbb-4384-b58b-78d958d0b1bd\",\n            \"title\": \"SQL Injection from \\\"Password\\\" Parameter, \\\"Username\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:46.804622\",\n            \"issue_source_unique_id\": \"TKER-JZXT-0THW-DMA5\",\n            \"severity\": 10,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/TKER-JZXT-0THW-DMA5\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"Injection\",\n                \"category_label\": \"Injection\",\n                \"closed_time\": null,\n                \"confidence\": \"High\",\n                \"confidence_label\": \"High\",\n                \"default_severity\": \"CRITICAL\",\n                \"default_severity_label\": \"Critical\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"High\",\n                \"impact_label\": \"High\",\n                \"instance_uuid\": \"TKER-JZXT-0THW-DMA5\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"High\",\n                \"likelihood_label\": \"High\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"sql-injection\",\n                \"rule_title\": \"SQL Injection\",\n                \"severity\": \"Critical\",\n                \"severity_label\": \"Critical\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"SQL Injection from \\\"Password\\\" Parameter, \\\"Username\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"SQL Injection from \\\"Password\\\" Parameter, \\\"Username\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n                \"total_traces_received\": 2,\n                \"uuid\": \"TKER-JZXT-0THW-DMA5\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"c20f7d08-6d8e-4cb6-a8db-3bf16f3b5ae2\",\n            \"title\": \"Overly Long Session Timeout in /WEB-INF/web.xml\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:46.621751\",\n            \"issue_source_unique_id\": \"XO4B-KMHD-4BV6-8441\",\n            \"severity\": 2.5,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/XO4B-KMHD-4BV6-8441\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"Session Management\",\n                \"category_label\": \"Session Management\",\n                \"closed_time\": null,\n                \"confidence\": \"Low\",\n                \"confidence_label\": \"Low\",\n                \"default_severity\": \"LOW\",\n                \"default_severity_label\": \"Low\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"Medium\",\n                \"impact_label\": \"Medium\",\n                \"instance_uuid\": \"XO4B-KMHD-4BV6-8441\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"Low\",\n                \"likelihood_label\": \"Low\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"session-timeout\",\n                \"rule_title\": \"Overly Long Session Timeout\",\n                \"severity\": \"Low\",\n                \"severity_label\": \"Low\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"Overly Long Session Timeout in /WEB-INF/web.xml\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"Overly Long Session Timeout in /WEB-INF/web.xml\",\n                \"total_traces_received\": 3,\n                \"uuid\": \"XO4B-KMHD-4BV6-8441\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"791256f8-8c09-4a5c-af0c-ea81d57e401a\",\n            \"title\": \"Cross-Site Scripting from \\\"username\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:46.426195\",\n            \"issue_source_unique_id\": \"STI2-UZHO-QD0Z-C314\",\n            \"severity\": 7.5,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/STI2-UZHO-QD0Z-C314\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"XSS\",\n                \"category_label\": \"XSS\",\n                \"closed_time\": null,\n                \"confidence\": \"High\",\n                \"confidence_label\": \"High\",\n                \"default_severity\": \"HIGH\",\n                \"default_severity_label\": \"High\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"Medium\",\n                \"impact_label\": \"Medium\",\n                \"instance_uuid\": \"STI2-UZHO-QD0Z-C314\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"High\",\n                \"likelihood_label\": \"High\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"reflected-xss\",\n                \"rule_title\": \"Cross-Site Scripting\",\n                \"severity\": \"High\",\n                \"severity_label\": \"High\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"Cross-Site Scripting from \\\"username\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"Cross-Site Scripting from \\\"username\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n                \"total_traces_received\": 5,\n                \"uuid\": \"STI2-UZHO-QD0Z-C314\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"af1d52ec-9a15-42cd-9867-0762651ea6a7\",\n            \"title\": \"Cross-Site Scripting from URI on \\\"/WebGoat/attack\\\" page\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:46.230996\",\n            \"issue_source_unique_id\": \"62OJ-BBQI-LU78-YP9C\",\n            \"severity\": 7.5,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/62OJ-BBQI-LU78-YP9C\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"XSS\",\n                \"category_label\": \"XSS\",\n                \"closed_time\": null,\n                \"confidence\": \"High\",\n                \"confidence_label\": \"High\",\n                \"default_severity\": \"HIGH\",\n                \"default_severity_label\": \"High\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"Medium\",\n                \"impact_label\": \"Medium\",\n                \"instance_uuid\": \"62OJ-BBQI-LU78-YP9C\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"High\",\n                \"likelihood_label\": \"High\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"reflected-xss\",\n                \"rule_title\": \"Cross-Site Scripting\",\n                \"severity\": \"High\",\n                \"severity_label\": \"High\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"Cross-Site Scripting from URI on \\\"/WebGoat/attack\\\" page\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"Cross-Site Scripting from URI on \\\"/WebGoat/attack\\\" page\",\n                \"total_traces_received\": 32,\n                \"uuid\": \"62OJ-BBQI-LU78-YP9C\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"78ee8b42-f3f3-44d8-9b2d-478f848eebb6\",\n            \"title\": \"Cross-Site Scripting from \\\"field1\\\" Parameter, \\\"field2\\\" Parameter, \\\"field3\\\" Parameter and 4 Other Sources on \\\"/WebGoat/attack\\\" page\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:46.009971\",\n            \"issue_source_unique_id\": \"6L36-4Z3S-8ND2-Q9BL\",\n            \"severity\": 7.5,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/6L36-4Z3S-8ND2-Q9BL\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"XSS\",\n                \"category_label\": \"XSS\",\n                \"closed_time\": null,\n                \"confidence\": \"High\",\n                \"confidence_label\": \"High\",\n                \"default_severity\": \"HIGH\",\n                \"default_severity_label\": \"High\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"Medium\",\n                \"impact_label\": \"Medium\",\n                \"instance_uuid\": \"6L36-4Z3S-8ND2-Q9BL\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"High\",\n                \"likelihood_label\": \"High\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"reflected-xss\",\n                \"rule_title\": \"Cross-Site Scripting\",\n                \"severity\": \"High\",\n                \"severity_label\": \"High\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"Cross-Site Scripting from \\\"field1\\\" Parameter, \\\"field2\\\" Parameter, \\\"field3\\\" Parameter and 4 Other Sources on \\\"/WebGoat/attack\\\" page\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"Cross-Site Scripting from \\\"field1\\\" Parameter, \\\"field2\\\" Parameter, \\\"field3\\\" Parameter and 4 Other Sources on \\\"/WebGoat/attack\\\" page\",\n                \"total_traces_received\": 2,\n                \"uuid\": \"6L36-4Z3S-8ND2-Q9BL\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"e2a954d1-7bc0-4b93-b287-56303161345c\",\n            \"title\": \"Cross-Site Scripting from \\\"field1\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:45.825039\",\n            \"issue_source_unique_id\": \"5R9D-D86B-5IIN-65G5\",\n            \"severity\": 7.5,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/5R9D-D86B-5IIN-65G5\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"XSS\",\n                \"category_label\": \"XSS\",\n                \"closed_time\": null,\n                \"confidence\": \"High\",\n                \"confidence_label\": \"High\",\n                \"default_severity\": \"HIGH\",\n                \"default_severity_label\": \"High\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"Medium\",\n                \"impact_label\": \"Medium\",\n                \"instance_uuid\": \"5R9D-D86B-5IIN-65G5\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"High\",\n                \"likelihood_label\": \"High\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"reflected-xss\",\n                \"rule_title\": \"Cross-Site Scripting\",\n                \"severity\": \"High\",\n                \"severity_label\": \"High\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"Cross-Site Scripting from \\\"field1\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"Cross-Site Scripting from \\\"field1\\\" Parameter on \\\"/WebGoat/attack\\\" page\",\n                \"total_traces_received\": 12,\n                \"uuid\": \"5R9D-D86B-5IIN-65G5\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"3aa6c1db-4f3e-457b-8e43-fdfab73d4709\",\n            \"title\": \"Parameter Pollution detected\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:45.670909\",\n            \"issue_source_unique_id\": \"E8V1-7JK6-ZO0B-GI10\",\n            \"severity\": 0,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/E8V1-7JK6-ZO0B-GI10\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"Caching\",\n                \"category_label\": \"Caching\",\n                \"closed_time\": null,\n                \"confidence\": \"Low\",\n                \"confidence_label\": \"Low\",\n                \"default_severity\": \"NOTE\",\n                \"default_severity_label\": \"Note\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"Low\",\n                \"impact_label\": \"Low\",\n                \"instance_uuid\": \"E8V1-7JK6-ZO0B-GI10\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"Low\",\n                \"likelihood_label\": \"Low\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"parameter-pollution\",\n                \"rule_title\": \"Parameter Pollution\",\n                \"severity\": \"Note\",\n                \"severity_label\": \"Note\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"Parameter Pollution detected\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"Parameter Pollution detected\",\n                \"total_traces_received\": 1,\n                \"uuid\": \"E8V1-7JK6-ZO0B-GI10\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"56764ae8-ba19-4933-bf5e-087d76ed24d9\",\n            \"title\": \"Log Injection from \\\"SUBMIT\\\" Parameter, \\\"Screen\\\" Parameter, \\\"UserSelect\\\" Parameter and 4 Other Sources on \\\"/WebGoat/attack\\\" page\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:45.471204\",\n            \"issue_source_unique_id\": \"U3MO-UG7C-315Y-TDUW\",\n            \"severity\": 0,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/U3MO-UG7C-315Y-TDUW\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"Injection\",\n                \"category_label\": \"Injection\",\n                \"closed_time\": null,\n                \"confidence\": \"High\",\n                \"confidence_label\": \"High\",\n                \"default_severity\": \"NOTE\",\n                \"default_severity_label\": \"Note\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"Low\",\n                \"impact_label\": \"Low\",\n                \"instance_uuid\": \"U3MO-UG7C-315Y-TDUW\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"Low\",\n                \"likelihood_label\": \"Low\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"log-injection\",\n                \"rule_title\": \"Log Injection\",\n                \"severity\": \"Note\",\n                \"severity_label\": \"Note\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"Log Injection from \\\"SUBMIT\\\" Parameter, \\\"Screen\\\" Parameter, \\\"UserSelect\\\" Parameter and 4 Other Sources on \\\"/WebGoat/attack\\\" page\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"Log Injection from \\\"SUBMIT\\\" Parameter, \\\"Screen\\\" Parameter, \\\"UserSelect\\\" Parameter and 4 Other Sources on \\\"/WebGoat/attack\\\" page\",\n                \"total_traces_received\": 3,\n                \"uuid\": \"U3MO-UG7C-315Y-TDUW\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"518c36fe-1ee7-4fbd-86ea-2d5a1f76b6f2\",\n            \"title\": \"Log Injection from \\\"Screen\\\" Parameter, \\\"menu\\\" Parameter, Parameter Name on \\\"/WebGoat/attack\\\" page\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:45.308144\",\n            \"issue_source_unique_id\": \"LEPT-QP39-05KP-EXMN\",\n            \"severity\": 0,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/LEPT-QP39-05KP-EXMN\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"Injection\",\n                \"category_label\": \"Injection\",\n                \"closed_time\": null,\n                \"confidence\": \"High\",\n                \"confidence_label\": \"High\",\n                \"default_severity\": \"NOTE\",\n                \"default_severity_label\": \"Note\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"Low\",\n                \"impact_label\": \"Low\",\n                \"instance_uuid\": \"LEPT-QP39-05KP-EXMN\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"Low\",\n                \"likelihood_label\": \"Low\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"log-injection\",\n                \"rule_title\": \"Log Injection\",\n                \"severity\": \"Note\",\n                \"severity_label\": \"Note\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"Log Injection from \\\"Screen\\\" Parameter, \\\"menu\\\" Parameter, Parameter Name on \\\"/WebGoat/attack\\\" page\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"Log Injection from \\\"Screen\\\" Parameter, \\\"menu\\\" Parameter, Parameter Name on \\\"/WebGoat/attack\\\" page\",\n                \"total_traces_received\": 15,\n                \"uuid\": \"LEPT-QP39-05KP-EXMN\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"b1112d9f-9ab0-4ee4-98ec-15b7326dc101\",\n            \"title\": \"Insecure JSP Placement\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:45.15267\",\n            \"issue_source_unique_id\": \"7V2E-II5I-RDWM-4JX2\",\n            \"severity\": 5,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/7V2E-II5I-RDWM-4JX2\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"Access Control\",\n                \"category_label\": \"Access Control\",\n                \"closed_time\": null,\n                \"confidence\": \"Low\",\n                \"confidence_label\": \"Low\",\n                \"default_severity\": \"MEDIUM\",\n                \"default_severity_label\": \"Medium\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"Medium\",\n                \"impact_label\": \"Medium\",\n                \"instance_uuid\": \"7V2E-II5I-RDWM-4JX2\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"Medium\",\n                \"likelihood_label\": \"Medium\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"insecure-jsp-access\",\n                \"rule_title\": \"Insecure JSP Placement\",\n                \"severity\": \"Medium\",\n                \"severity_label\": \"Medium\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"Insecure JSP Placement\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"Insecure JSP Placement\",\n                \"total_traces_received\": 3,\n                \"uuid\": \"7V2E-II5I-RDWM-4JX2\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        },\n        {\n            \"uuid\": \"f69be6d4-015d-4767-a203-590e109b2759\",\n            \"title\": \"Hardcoded Password  in ECSFactory.java\",\n            \"description\": null,\n            \"timestamp\": \"2020-08-26 17:04:00\",\n            \"issue_source_uuid\": \"db515e00-3035-45b6-85e7-6c90326f8e21\",\n            \"team_uuid\": null,\n            \"user_uuid\": null,\n            \"created_at\": \"2020-12-11 02:46:44.96954\",\n            \"issue_source_unique_id\": \"27OI-DUUL-7WX1-LMDI\",\n            \"severity\": 5,\n            \"url\": \"https://ce.contrastsecurity.com/Contrast/api/ng/Contrast/static/ng/index.html#/9c96c0f6-b65b-493f-9f66-8a1a906a46dd/applications/3c938a12-1d43-470b-955d-9d9727cd1db9/vulns/27OI-DUUL-7WX1-LMDI\",\n            \"raw_data\": {\n                \"app_version_tags\": [],\n                \"bugtracker_tickets\": [],\n                \"category\": \"Cryptography\",\n                \"category_label\": \"Cryptography\",\n                \"closed_time\": null,\n                \"confidence\": \"Low\",\n                \"confidence_label\": \"Low\",\n                \"default_severity\": \"MEDIUM\",\n                \"default_severity_label\": \"Medium\",\n                \"discovered\": 1598461440000,\n                \"evidence\": \"[REDACTED]\",\n                \"first_time_seen\": 1598461440000,\n                \"hasParentApp\": false,\n                \"impact\": \"High\",\n                \"impact_label\": \"High\",\n                \"instance_uuid\": \"27OI-DUUL-7WX1-LMDI\",\n                \"language\": \"Java\",\n                \"last_time_seen\": 1598461440000,\n                \"last_vuln_time_seen\": 1598461440000,\n                \"license\": \"Licensed\",\n                \"likelihood\": \"Low\",\n                \"likelihood_label\": \"Low\",\n                \"organization_name\": \"HackEDU\",\n                \"reported_to_bug_tracker\": false,\n                \"reported_to_bug_tracker_time\": null,\n                \"rule_name\": \"hardcoded-password\",\n                \"rule_title\": \"Hardcoded Password\",\n                \"severity\": \"Medium\",\n                \"severity_label\": \"Medium\",\n                \"status\": \"Reported\",\n                \"sub_status\": \"\",\n                \"sub_title\": \"Hardcoded Password  in ECSFactory.java\",\n                \"substatus_keycode\": null,\n                \"tags\": [],\n                \"title\": \"Hardcoded Password  in ECSFactory.java\",\n                \"total_traces_received\": 1,\n                \"uuid\": \"27OI-DUUL-7WX1-LMDI\",\n                \"visible\": true,\n                \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n            },\n            \"app_id\": \"3c938a12-1d43-470b-955d-9d9727cd1db9\"\n        }\n    ]\n}"}],"_postman_id":"d054f1d3-3a8e-45fc-9efb-06d5618aea1d"},{"name":"Create an issue","id":"ad569136-05a9-4c67-96b0-297d15a26cff","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"POST","header":[{"key":"X-Api-Key","value":"{{API_KEY}}","description":"<p>API Key from the HackEDU Dashboard</p>\n","type":"text"}],"body":{"mode":"urlencoded","urlencoded":[{"key":"title","value":"Example Title","description":"<p>A title for the issue</p>\n","type":"text"},{"key":"description","value":"This is an example description","description":"<p>A description for the issue</p>\n","type":"text"},{"key":"issue_source_uuid","value":"41d12e24-b9ae-4b65-a45a-a7c77bf3f0fe","description":"<p>The issue source's uuid which this issue belongs to</p>\n","type":"text"},{"key":"issue_source_unique_id","value":"1001","description":"<p>A unique id for the issue. This must be unique to the attached issue source.</p>\n","type":"text"},{"key":"app_id","value":"Test App","description":"<p>An optional identifier for the application that this belongs to</p>\n","type":"text"},{"key":"severity","value":"9.1","description":"<p>The CVSS severity level for the issue</p>\n","type":"text"},{"key":"vulnerability","value":"1","description":"<p>The associated vulnerability (see our /vulnerabilties endpoint)</p>\n","type":"text"},{"key":"timestamp","value":"2020-12-01","description":"<p>The timestamp of when the issue was found</p>\n","type":"text"},{"key":"url","value":"http://internal/id=1001","description":"<p>An optional url that we can link to on the issue source detail page in the HackEDU Dashboard for users to see more information about the issue</p>\n","type":"text"},{"key":"raw_data","value":"{\"key\": \"value\"}","description":"<p>Key values that you want to store with the issue that you can reference in your syncing scripts</p>\n","type":"text"}]},"url":"https://api.hackedu.com/v1/issues","urlObject":{"path":["issues"],"host":["https://api.hackedu.com/v1"],"query":[],"variable":[]}},"response":[{"id":"bdf781f8-46fa-4e29-a5f1-7238a91cf481","name":"Create an issue","originalRequest":{"method":"POST","header":[{"key":"X-Api-Key","value":"{{API_KEY}}","description":"API Key from the HackEDU Dashboard","type":"text"}],"body":{"mode":"urlencoded","urlencoded":[{"key":"title","value":"Example Title","description":"A title for the issue","type":"text"},{"key":"description","value":"This is an example description","description":"A description for the issue","type":"text"},{"key":"issue_source_uuid","value":"41d12e24-b9ae-4b65-a45a-a7c77bf3f0fe","description":"The issue source's uuid which this issue belongs to","type":"text"},{"key":"issue_source_unique_id","value":"1001","description":"A unique id for the issue. This must be unique to the attached issue source.","type":"text"},{"key":"app_id","value":"Test App","description":"An optional identifier for the application that this belongs to","type":"text"},{"key":"severity","value":"9.1","description":"The CVSS severity level for the issue","type":"text"},{"key":"vulnerability","value":"1","description":"The associated vulnerability (see our /vulnerabilties endpoint)","type":"text"},{"key":"timestamp","value":"2020-12-01","description":"The timestamp of when the issue was found","type":"text"},{"key":"url","value":"http://internal/id=1001","description":"An optional url that we can link to on the issue source detail page in the HackEDU Dashboard for users to see more information about the issue","type":"text"},{"key":"raw_data","value":"{\"key\": \"value\"}","description":"Key values that you want to store with the issue that you can reference in your syncing scripts","type":"text"}]},"url":"https://api.hackedu.com/v1/issues"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Fri, 11 Dec 2020 03:34:54 GMT"},{"key":"Content-Type","value":"application/json"},{"key":"Content-Length","value":"513"},{"key":"Connection","value":"keep-alive"},{"key":"X-Request-Id","value":"736a6cda-bb41-41ea-b106-d4597d059ff7"},{"key":"Access-Control-Allow-Origin","value":"*"},{"key":"Server","value":"Werkzeug/1.0.1 Python/3.8.6"}],"cookie":[],"responseTime":null,"body":"{\n    \"uuid\": \"2f7a073c-3614-4fc5-9328-ee3b1172f03c\",\n    \"title\": \"Example Title\",\n    \"description\": \"This is an example description\",\n    \"timestamp\": \"2020-12-01 00:00:00\",\n    \"issue_source_uuid\": \"41d12e24-b9ae-4b65-a45a-a7c77bf3f0fe\",\n    \"team_uuid\": null,\n    \"user_uuid\": null,\n    \"created_at\": \"2020-12-11 03:34:54.507363\",\n    \"issue_source_unique_id\": \"1001\",\n    \"severity\": 9.1,\n    \"url\": \"http://internal/id=1001\",\n    \"raw_data\": {\n        \"key\": \"value\"\n    },\n    \"app_id\": \"Test App\",\n    \"vulnerabilities\": [\n        {\n            \"title\": \"SQL Injection\",\n            \"key\": \"sql_injection\"\n        }\n    ]\n}"}],"_postman_id":"ad569136-05a9-4c67-96b0-297d15a26cff"},{"name":"Get issue details","id":"d0ef9c3a-f5a7-4e30-9c2a-b044432d4528","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"X-Api-Key","value":"{{API_KEY}}","description":"<p>API Key from the HackEDU Dashboard</p>\n","type":"text"}],"url":"https://api.hackedu.com/v1/issues/:issue_uuid","urlObject":{"path":["issues",":issue_uuid"],"host":["https://api.hackedu.com/v1"],"query":[],"variable":[{"id":"53b585d9-6a3d-4de6-ab1b-25013999c851","description":{"content":"<p>uuid of the issue to retreive</p>\n","type":"text/plain"},"type":"any","value":"2f7a073c-3614-4fc5-9328-ee3b1172f03c","key":"issue_uuid"}]}},"response":[{"id":"e721adff-1a26-47e8-b1d9-7ae3a21791dd","name":"Get issue details","originalRequest":{"method":"GET","header":[{"key":"X-Api-Key","value":"{{API_KEY}}","description":"API Key from the HackEDU Dashboard","type":"text"}],"url":{"raw":"https://api.hackedu.com/v1/issues/:issue_uuid","host":["https://api.hackedu.com/v1"],"path":["issues",":issue_uuid"],"variable":[{"key":"issue_uuid","value":"2f7a073c-3614-4fc5-9328-ee3b1172f03c","description":"uuid of the issue to retreive"}]}},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Fri, 11 Dec 2020 03:35:04 GMT"},{"key":"Content-Type","value":"application/json"},{"key":"Content-Length","value":"513"},{"key":"Connection","value":"keep-alive"},{"key":"X-Request-Id","value":"e665daf0-210c-4a6f-81a1-e3290d3f0c43"},{"key":"Access-Control-Allow-Origin","value":"*"},{"key":"Server","value":"Werkzeug/1.0.1 Python/3.8.6"}],"cookie":[],"responseTime":null,"body":"{\n    \"uuid\": \"2f7a073c-3614-4fc5-9328-ee3b1172f03c\",\n    \"title\": \"Example Title\",\n    \"description\": \"This is an example description\",\n    \"timestamp\": \"2020-12-01 00:00:00\",\n    \"issue_source_uuid\": \"41d12e24-b9ae-4b65-a45a-a7c77bf3f0fe\",\n    \"team_uuid\": null,\n    \"user_uuid\": null,\n    \"created_at\": \"2020-12-11 03:34:54.507363\",\n    \"issue_source_unique_id\": \"1001\",\n    \"severity\": 9.1,\n    \"url\": \"http://internal/id=1001\",\n    \"raw_data\": {\n        \"key\": \"value\"\n    },\n    \"app_id\": \"Test App\",\n    \"vulnerabilities\": [\n        {\n            \"title\": \"SQL Injection\",\n            \"key\": \"sql_injection\"\n        }\n    ]\n}"}],"_postman_id":"d0ef9c3a-f5a7-4e30-9c2a-b044432d4528"},{"name":"Update an issue","id":"4e491fbf-7228-4689-8be5-10cfba553784","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"PATCH","header":[{"key":"X-Api-Key","value":"{{API_KEY}}","description":"<p>API Key from the HackEDU Dashboard</p>\n","type":"text"}],"body":{"mode":"urlencoded","urlencoded":[{"key":"title","value":"","type":"text"},{"key":"description","value":"","type":"text"},{"key":"issue_source_uuid","value":"","type":"text"},{"key":"timestamp","value":"","type":"text"},{"key":"user_uuid","value":"","type":"text"},{"key":"team_uuid","value":"","type":"text"},{"key":"raw_data","value":"","type":"text"},{"key":"vulnerability","value":"","type":"text"}]},"url":"https://api.hackedu.com/v1/issues/:issue_uuid","urlObject":{"path":["issues",":issue_uuid"],"host":["https://api.hackedu.com/v1"],"query":[],"variable":[{"id":"b9fe7613-d5e4-423f-be01-0f0f498ac91f","description":{"content":"<p>uuid of the issue to update</p>\n","type":"text/plain"},"type":"any","value":"","key":"issue_uuid"}]}},"response":[{"id":"da53f7cc-c1d2-410f-80d9-517a81b5f639","name":"Update an issue","originalRequest":{"method":"PATCH","header":[{"key":"X-Api-Key","value":"{{API_KEY}}","description":"API Key from the HackEDU Dashboard","type":"text"}],"body":{"mode":"urlencoded","urlencoded":[{"key":"title","value":"Example","type":"text"},{"key":"description","value":"","type":"text"},{"key":"issue_source_uuid","value":"","type":"text"},{"key":"timestamp","value":"","type":"text"},{"key":"user_uuid","value":"","type":"text"},{"key":"team_uuid","value":"","type":"text"},{"key":"raw_data","value":"","type":"text"},{"key":"vulnerability","value":"","type":"text"}]},"url":{"raw":"https://api.hackedu.com/v1/issues/:issue_uuid","host":["https://api.hackedu.com/v1"],"path":["issues",":issue_uuid"],"variable":[{"key":"issue_uuid","value":"f9529815-f3eb-40a6-90fb-198106a3795f","description":"uuid of the issue to update"}]}},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Sun, 03 Jan 2021 07:14:13 GMT"},{"key":"Content-Type","value":"application/json"},{"key":"Content-Length","value":"457"},{"key":"Connection","value":"keep-alive"},{"key":"X-Request-Id","value":"62031fa8-d7da-45c3-83dd-4fd6916eed40"},{"key":"Access-Control-Allow-Origin","value":"*"},{"key":"Server","value":"Werkzeug/1.0.1 Python/3.8.6"}],"cookie":[],"responseTime":null,"body":"{\n    \"uuid\": \"f9529815-f3eb-40a6-90fb-198106a3795f\",\n    \"title\": \"Example\",\n    \"description\": \"This is an example description\",\n    \"timestamp\": \"2020-12-01 00:00:00\",\n    \"issue_source_uuid\": \"41d12e24-b9ae-4b65-a45a-a7c77bf3f0fe\",\n    \"team_uuid\": null,\n    \"user_uuid\": null,\n    \"created_at\": \"2020-12-15 00:54:15.960195\",\n    \"issue_source_unique_id\": \"1002\",\n    \"severity\": 9.1,\n    \"url\": \"http://internal/id=1001\",\n    \"raw_data\": {\n        \"key\": \"value\"\n    },\n    \"app_id\": \"Test App\",\n    \"vulnerabilities\": []\n}"}],"_postman_id":"4e491fbf-7228-4689-8be5-10cfba553784"},{"name":"Remove an issue","id":"5665d038-53a8-4f8f-855f-612c81864181","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"DELETE","header":[{"key":"X-Api-Key","value":"{{API_KEY}}","description":"<p>API Key from the HackEDU Dashboard</p>\n","type":"text"}],"body":{"mode":"urlencoded","urlencoded":[{"key":"title","value":"","type":"text"},{"key":"description","value":"","type":"text"},{"key":"issue_source_uuid","value":"","type":"text"},{"key":"timestamp","value":"","type":"text"},{"key":"user_uuid","value":"","type":"text"},{"key":"team_uuid","value":"","type":"text"},{"key":"raw_data","value":"","type":"text"},{"key":"vulnerability","value":"","type":"text"}]},"url":"https://api.hackedu.com/v1/issues/:issue_uuid","urlObject":{"path":["issues",":issue_uuid"],"host":["https://api.hackedu.com/v1"],"query":[],"variable":[{"id":"9c1dead4-870a-47a0-9a56-06acf44be885","description":{"content":"<p>uuid of the issue to remove</p>\n","type":"text/plain"},"type":"any","value":"2f7a073c-3614-4fc5-9328-ee3b1172f03c","key":"issue_uuid"}]}},"response":[{"id":"e8f5a4b2-f0fd-4fdf-b0e3-a8a68c49c36a","name":"Remove an issue","originalRequest":{"method":"DELETE","header":[{"key":"X-Api-Key","value":"{{API_KEY}}","description":"API Key from the HackEDU Dashboard","type":"text"}],"body":{"mode":"urlencoded","urlencoded":[{"key":"title","value":"","type":"text"},{"key":"description","value":"","type":"text"},{"key":"issue_source_uuid","value":"","type":"text"},{"key":"timestamp","value":"","type":"text"},{"key":"user_uuid","value":"","type":"text"},{"key":"team_uuid","value":"","type":"text"},{"key":"raw_data","value":"","type":"text"},{"key":"vulnerability","value":"","type":"text"}]},"url":{"raw":"https://api.hackedu.com/v1/issues/:issue_uuid","host":["https://api.hackedu.com/v1"],"path":["issues",":issue_uuid"],"variable":[{"key":"issue_uuid","value":"2f7a073c-3614-4fc5-9328-ee3b1172f03c","description":"uuid of the issue to remove"}]}},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Fri, 11 Dec 2020 03:36:26 GMT"},{"key":"Content-Type","value":"application/json"},{"key":"Content-Length","value":"18"},{"key":"Connection","value":"keep-alive"},{"key":"X-Request-Id","value":"c9a522d7-b030-419b-b701-b975b020ac0b"},{"key":"Access-Control-Allow-Origin","value":"*"},{"key":"Server","value":"Werkzeug/1.0.1 Python/3.8.6"}],"cookie":[],"responseTime":null,"body":"{\n    \"success\": true\n}"}],"_postman_id":"5665d038-53a8-4f8f-855f-612c81864181"}],"id":"42ab276d-21bb-47f2-91c4-16ed04b9db6e","description":"<p>Issues are things like findings from vulnerability scans or bug bounty programs. They have vulnerabilities associated with them, which are used as a data source to inform your HackEDU adaptive training plans. Issues belong to an Issue Source.</p>\n","event":[{"listen":"prerequest","script":{"id":"f6f02b2f-1a16-4fe7-94e2-41c1cf4123e2","type":"text/javascript","exec":[""]}},{"listen":"test","script":{"id":"77966d7c-f104-4243-97f8-a24c3e343203","type":"text/javascript","exec":[""]}}],"_postman_id":"42ab276d-21bb-47f2-91c4-16ed04b9db6e"}],"event":[{"listen":"prerequest","script":{"id":"c686cd61-ae49-40e8-aa2a-e7728a910669","type":"text/javascript","exec":[""]}},{"listen":"test","script":{"id":"45b181a5-68e4-4344-9d2a-c42bcdc9c073","type":"text/javascript","exec":[""]}}],"variable":[{"id":"03748ef1-d354-484c-b1c4-3ad0f3f78cd0","key":"BASE_URL","value":"https://api.hackedu.com/v1"}]}