# Cybdefend Documentation ## Docs - [Cybe Analysis](https://docs.cybedefend.com/latest/agent-ai-integration/cybe-analysis-detail.md): How to configure and use Cybe Analysis for intelligent vulnerability detection and false positive reduction. - [Cybe AutoFix](https://docs.cybedefend.com/latest/agent-ai-integration/cybe-autofix-detail.md): How to configure and use Cybe AutoFix for intelligent, context-aware vulnerability remediation. - [Cybe MCP, connect every AI agent](https://docs.cybedefend.com/latest/agent-ai-integration/cybe-mcp.md): Step-by-step setup for Claude Code, Claude Desktop, Cursor, VS Code Copilot Chat, Windsurf, Continue, Cline, Zed and any MCP-compatible client. Browser-only OAuth, two regional URLs, 18 typed tools. - [Cybe Security Champion](https://docs.cybedefend.com/latest/agent-ai-integration/cybe-security-champion-detail.md): How to use Cybe Security Champion to chat with your vulnerabilities and codebase for instant security insights. - [Delete ACR credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/acr-container-registry/delete-acr-credentials.md): Permanently deletes stored Azure Container Registry credentials from the organization - [Get ACR credential details](https://docs.cybedefend.com/latest/api-reference/endpoint/acr-container-registry/get-acr-credential-details.md): Returns detailed information about a specific Azure Container Registry credential (sanitized, no secrets exposed) - [List ACR credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/acr-container-registry/list-acr-credentials.md): Returns all Azure Container Registry credentials available for the project (sanitized, no secrets exposed) - [List ACR image tags](https://docs.cybedefend.com/latest/api-reference/endpoint/acr-container-registry/list-acr-image-tags.md): Lists all available tags for a specific Docker image (repository) in Azure Container Registry - [List ACR images](https://docs.cybedefend.com/latest/api-reference/endpoint/acr-container-registry/list-acr-images.md): Lists all Docker images (repositories) available in the Azure Container Registry using the specified credentials - [Start ACR container scan](https://docs.cybedefend.com/latest/api-reference/endpoint/acr-container-registry/start-acr-container-scan.md): Initiates a vulnerability scan for a Docker image stored in Azure Container Registry. The scan runs asynchronously and results can be retrieved via the scan results endpoint. - [Store ACR Container Registry credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/acr-container-registry/store-acr-container-registry-credentials.md): Stores Azure Container Registry Service Principal credentials at organization level. The credentials will be encrypted and stored securely. - [Create Security Champion conversation](https://docs.cybedefend.com/latest/api-reference/endpoint/ai-agent/create-security-champion-conversation.md): Creates a new Security Champion AI conversation for a specific vulnerability. Returns a conversation ID to use with the streaming endpoint - [Delete conversation](https://docs.cybedefend.com/latest/api-reference/endpoint/ai-agent/delete-conversation.md): Permanently deletes a Security Champion conversation and all associated messages - [Get conversation messages](https://docs.cybedefend.com/latest/api-reference/endpoint/ai-agent/get-conversation-messages.md): Retrieves paginated messages from a specific Security Champion conversation - [List user conversations](https://docs.cybedefend.com/latest/api-reference/endpoint/ai-agent/list-user-conversations.md): Retrieves Security Champion conversations for the authenticated user with optional filters and pagination - [Start AutoFix workflow](https://docs.cybedefend.com/latest/api-reference/endpoint/ai-agent/start-autofix-workflow.md): Initiates an AI-powered AutoFix workflow to automatically generate a fix for a vulnerability and create a Pull Request or Merge Request - [Start Batch AutoFix workflow](https://docs.cybedefend.com/latest/api-reference/endpoint/ai-agent/start-batch-autofix-workflow.md): Initiates an AI-powered AutoFix workflow to automatically generate fixes for multiple vulnerabilities and create a single Pull Request or Merge Request - [Stop conversation generation](https://docs.cybedefend.com/latest/api-reference/endpoint/ai-agent/stop-conversation-generation.md): Stops the ongoing AI response generation for a specific conversation - [Stream Security Champion messages](https://docs.cybedefend.com/latest/api-reference/endpoint/ai-agent/stream-security-champion-messages.md): Server-Sent Events (SSE) endpoint for streaming AI responses. Send a message and receive real-time token stream. Use heartbeat mode (no message) to maintain connection - [Get all container registry credentials for an organization](https://docs.cybedefend.com/latest/api-reference/endpoint/container-registry-credentials/get-all-container-registry-credentials-for-an-organization.md): Returns all container registry credentials for an organization, grouped by provider. **Supported providers:** - **GitHub Container Registry (ghcr.io)** - Uses GitHub App installation (no stored credentials, returns availability status) - **GitLab Container Registry** - Personal/group deploy tok… - [Delete DockerHub credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/dockerhub-container-registry/delete-dockerhub-credentials.md): Permanently deletes stored DockerHub credentials from the organization - [Get DockerHub credential details](https://docs.cybedefend.com/latest/api-reference/endpoint/dockerhub-container-registry/get-dockerhub-credential-details.md): Returns detailed information about a specific DockerHub credential (sanitized, no secrets exposed) - [List DockerHub credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/dockerhub-container-registry/list-dockerhub-credentials.md): Returns all DockerHub credentials available for the project (sanitized, no secrets exposed) - [List DockerHub image tags](https://docs.cybedefend.com/latest/api-reference/endpoint/dockerhub-container-registry/list-dockerhub-image-tags.md): Lists all available tags for a specific Docker image (repository) in DockerHub - [List DockerHub images](https://docs.cybedefend.com/latest/api-reference/endpoint/dockerhub-container-registry/list-dockerhub-images.md): Lists all Docker images (repositories) available in the DockerHub namespace using the specified credentials - [Start DockerHub container scan](https://docs.cybedefend.com/latest/api-reference/endpoint/dockerhub-container-registry/start-dockerhub-container-scan.md): Initiates a vulnerability scan for a Docker image stored in DockerHub. The scan runs asynchronously and results can be retrieved via the scan results endpoint. - [Store DockerHub Container Registry credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/dockerhub-container-registry/store-dockerhub-container-registry-credentials.md): Stores DockerHub Personal Access Token credentials at organization level. The credentials will be encrypted and stored securely. - [Delete ECR credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/ecr-container-registry/delete-ecr-credentials.md): Permanently deletes stored AWS Elastic Container Registry credentials from the organization - [Get ECR credential details](https://docs.cybedefend.com/latest/api-reference/endpoint/ecr-container-registry/get-ecr-credential-details.md): Returns detailed information about a specific AWS Elastic Container Registry credential (sanitized, no secrets exposed) - [List ECR credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/ecr-container-registry/list-ecr-credentials.md): Returns all AWS Elastic Container Registry credentials available for the project (sanitized, no secrets exposed) - [List ECR image tags](https://docs.cybedefend.com/latest/api-reference/endpoint/ecr-container-registry/list-ecr-image-tags.md): Lists all available tags for a specific Docker image (repository) in AWS Elastic Container Registry - [List ECR images](https://docs.cybedefend.com/latest/api-reference/endpoint/ecr-container-registry/list-ecr-images.md): Lists all Docker images (repositories) available in the AWS Elastic Container Registry using the specified credentials - [Start ECR container scan](https://docs.cybedefend.com/latest/api-reference/endpoint/ecr-container-registry/start-ecr-container-scan.md): Initiates a vulnerability scan for a Docker image stored in AWS Elastic Container Registry. The scan runs asynchronously and results can be retrieved via the scan results endpoint. - [Store ECR Container Registry credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/ecr-container-registry/store-ecr-container-registry-credentials.md): Stores AWS Elastic Container Registry credentials at organization level. The credentials will be encrypted and stored securely. - [Delete GCR Container Registry credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/gcr-container-registry/delete-gcr-container-registry-credentials.md): Permanently deletes stored Google Container Registry or Artifact Registry credentials from the organization. This action cannot be undone. - [Get GCR Container Registry credential details](https://docs.cybedefend.com/latest/api-reference/endpoint/gcr-container-registry/get-gcr-container-registry-credential-details.md): Returns detailed information about a specific Google Container Registry or Artifact Registry credential. Sensitive data like service account keys are sanitized and not included in the response. - [List container images from GCR/Artifact Registry](https://docs.cybedefend.com/latest/api-reference/endpoint/gcr-container-registry/list-container-images-from-gcrartifact-registry.md): Retrieves a paginated list of all container images stored in Google Container Registry (GCR) or Artifact Registry. Uses the specified credential for authentication. - [List stored GCR Container Registry credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/gcr-container-registry/list-stored-gcr-container-registry-credentials.md): Returns all Google Container Registry and Artifact Registry credentials associated with the project. Credentials are sanitized and do not include sensitive secrets like service account keys. - [List tags for a container image](https://docs.cybedefend.com/latest/api-reference/endpoint/gcr-container-registry/list-tags-for-a-container-image.md): Retrieves all available tags for a specific container image in Google Container Registry (GCR) or Artifact Registry. Includes digest information and image metadata for each tag. - [Start GCR container vulnerability scan](https://docs.cybedefend.com/latest/api-reference/endpoint/gcr-container-registry/start-gcr-container-vulnerability-scan.md): Initiates a vulnerability scan for a container image stored in Google Container Registry (GCR) or Artifact Registry. The scan runs asynchronously and results can be retrieved using the returned scan ID. - [Store GCR Container Registry credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/gcr-container-registry/store-gcr-container-registry-credentials.md): Stores GCP service account key credentials for Google Container Registry (GCR) or Artifact Registry at the organization level. These credentials will be used to authenticate and pull container images for vulnerability scanning. - [Delete stored PAT for ghcr.io](https://docs.cybedefend.com/latest/api-reference/endpoint/github-container-registry/delete-stored-pat-for-ghcrio.md): Removes the stored Personal Access Token. After deletion, scanning private/internal packages will no longer be possible. - [Get GitHub Container Registry token](https://docs.cybedefend.com/latest/api-reference/endpoint/github-container-registry/get-github-container-registry-token.md): Generates a temporary GitHub App installation token for ghcr.io access. Use this token with docker login: `docker login ghcr.io -u x-access-token -p `. Token expires after approximately 1 hour. - [Get PAT status for ghcr.io](https://docs.cybedefend.com/latest/api-reference/endpoint/github-container-registry/get-pat-status-for-ghcrio.md): Checks if a Personal Access Token is stored and validates it. Returns information about the token without exposing the actual token value. - [List Docker images from GitHub Container Registry](https://docs.cybedefend.com/latest/api-reference/endpoint/github-container-registry/list-docker-images-from-github-container-registry.md): Lists all Docker images available in ghcr.io for the GitHub account associated with the organization. - [List image tags from GitHub Container Registry](https://docs.cybedefend.com/latest/api-reference/endpoint/github-container-registry/list-image-tags-from-github-container-registry.md): Lists all available tags/versions for a Docker image hosted on ghcr.io. - [Start GitHub Container Registry scan](https://docs.cybedefend.com/latest/api-reference/endpoint/github-container-registry/start-github-container-registry-scan.md): Initiates a vulnerability scan for a container image hosted on ghcr.io. Uses the GitHub App installation token or configured PAT for authentication. The image is validated to ensure it belongs to the organization before scanning. - [Store a Personal Access Token (PAT) for ghcr.io](https://docs.cybedefend.com/latest/api-reference/endpoint/github-container-registry/store-a-personal-access-token-pat-for-ghcrio.md): Stores a GitHub Personal Access Token with read:packages scope. This is REQUIRED for scanning private or internal container images, as GitHub App tokens cannot pull these packages from ghcr.io. The token is encrypted before storage. - [Get GitHub repositories](https://docs.cybedefend.com/latest/api-reference/endpoint/github-integration/get-github-repositories.md): Retrieves all accessible GitHub repositories for an organization. Returns repositories from all GitHub installations associated with the organization. - [Get GitHub repository branches](https://docs.cybedefend.com/latest/api-reference/endpoint/github-integration/get-github-repository-branches.md): Retrieves all branches for a specific GitHub repository in an organization. Use this to populate branch selection when linking a repository. - [Link GitHub repository to project](https://docs.cybedefend.com/latest/api-reference/endpoint/github-integration/link-github-repository-to-project.md): Creates a link between a GitHub repository and a CybeDefend project for automated scanning. Once linked, the project will receive webhook events from the repository for automated security scans. - [Start GitHub repository scan](https://docs.cybedefend.com/latest/api-reference/endpoint/github-integration/start-github-repository-scan.md): Triggers an asynchronous security scan on the latest commit of a linked GitHub repository. The scan runs in the background and results can be retrieved via the analysis reporting endpoints. - [Unlink GitHub repository from project](https://docs.cybedefend.com/latest/api-reference/endpoint/github-integration/unlink-github-repository-from-project.md): Removes the link between a GitHub repository and a CybeDefend project. This will stop webhook events and automated scans for this repository. - [Delete GitLab Container Registry credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/gitlab-container-registry/delete-gitlab-container-registry-credentials.md): Permanently deletes stored GitLab Container Registry (registry.gitlab.com) credentials from the organization. This action cannot be undone. - [Get GitLab Container Registry credential details](https://docs.cybedefend.com/latest/api-reference/endpoint/gitlab-container-registry/get-gitlab-container-registry-credential-details.md): Returns detailed information about a specific GitLab Container Registry (registry.gitlab.com) credential. Credentials are sanitized and do not include secrets. - [List Docker image tags from GitLab Container Registry](https://docs.cybedefend.com/latest/api-reference/endpoint/gitlab-container-registry/list-docker-image-tags-from-gitlab-container-registry.md): Lists all available tags for a specific Docker image in GitLab Container Registry (registry.gitlab.com). Useful for selecting which image version to scan. - [List Docker images from GitLab Container Registry](https://docs.cybedefend.com/latest/api-reference/endpoint/gitlab-container-registry/list-docker-images-from-gitlab-container-registry.md): Lists all Docker images available in the GitLab Container Registry (registry.gitlab.com) using the specified credentials. Results are paginated. - [List GitLab Container Registry credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/gitlab-container-registry/list-gitlab-container-registry-credentials.md): Returns all GitLab Container Registry (registry.gitlab.com) credentials available for the project. Credentials are sanitized and do not include secrets. - [Start GitLab Container Registry scan](https://docs.cybedefend.com/latest/api-reference/endpoint/gitlab-container-registry/start-gitlab-container-registry-scan.md): Initiates a security scan for a container image from GitLab Container Registry (registry.gitlab.com). The scan runs asynchronously and results can be retrieved via the scan status endpoint. - [Store GitLab Container Registry credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/gitlab-container-registry/store-gitlab-container-registry-credentials.md): Stores deploy token credentials for GitLab Container Registry (registry.gitlab.com) at organization level. These credentials are used to authenticate and pull container images for security scanning. - [Get GitLab repositories](https://docs.cybedefend.com/latest/api-reference/endpoint/gitlab-integration/get-gitlab-repositories.md): Retrieves all synchronized GitLab repositories for an organization. Returns repositories that the authenticated GitLab user has access to. - [Get GitLab repository branches](https://docs.cybedefend.com/latest/api-reference/endpoint/gitlab-integration/get-gitlab-repository-branches.md): Retrieves all branches for a specific GitLab repository. Use this to populate branch selection when linking a repository. - [Link GitLab repository to project](https://docs.cybedefend.com/latest/api-reference/endpoint/gitlab-integration/link-gitlab-repository-to-project.md): Creates a link between a GitLab repository and a CybeDefend project. Once linked, the project will receive webhook events from the repository for automated security scans. - [Start GitLab repository scan](https://docs.cybedefend.com/latest/api-reference/endpoint/gitlab-integration/start-gitlab-repository-scan.md): Triggers an asynchronous security scan on the latest commit of a linked GitLab repository. The scan runs in the background and results can be retrieved via the analysis reporting endpoints. - [Unlink GitLab repository from project](https://docs.cybedefend.com/latest/api-reference/endpoint/gitlab-integration/unlink-gitlab-repository-from-project.md): Removes the link between a GitLab repository and a CybeDefend project. This will stop webhook events and automated scans for this repository. - [Delete Harbor credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/harbor-container-registry/delete-harbor-credentials.md): Deletes stored Harbor self-hosted container registry credentials from the organization - [Get Harbor credential details](https://docs.cybedefend.com/latest/api-reference/endpoint/harbor-container-registry/get-harbor-credential-details.md): Returns Harbor self-hosted registry credential details (sanitized, no secrets exposed) - [List Docker images from Harbor](https://docs.cybedefend.com/latest/api-reference/endpoint/harbor-container-registry/list-docker-images-from-harbor.md): Returns available Docker images/repositories from the Harbor self-hosted container registry - [List Harbor image tags](https://docs.cybedefend.com/latest/api-reference/endpoint/harbor-container-registry/list-harbor-image-tags.md): Returns available tags for a Docker image in Harbor self-hosted registry - [List Harbor projects](https://docs.cybedefend.com/latest/api-reference/endpoint/harbor-container-registry/list-harbor-projects.md): Returns Harbor self-hosted registry projects accessible with the stored credentials. Projects in Harbor are organizational units that contain repositories. - [List stored Harbor credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/harbor-container-registry/list-stored-harbor-credentials.md): Returns all Harbor self-hosted container registry credentials associated with the project (sanitized, no secrets exposed) - [Start Harbor container scan](https://docs.cybedefend.com/latest/api-reference/endpoint/harbor-container-registry/start-harbor-container-scan.md): Initiates a security vulnerability scan for a container image from Harbor self-hosted registry. The scan runs asynchronously and results can be retrieved via the scan status endpoint. - [Store Harbor Container Registry credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/harbor-container-registry/store-harbor-container-registry-credentials.md): Stores robot account or user credentials for Harbor self-hosted registry at organization level. Supports authentication via robot accounts or standard user credentials. - [Get integration overview for organization](https://docs.cybedefend.com/latest/api-reference/endpoint/integrations/get-integration-overview-for-organization.md): Returns combined status of all integrations including GitHub installation, GitLab connection, and container registry credentials count for the organization. This endpoint consolidates multiple API calls into a single request for better performance. - [Delete JFrog Container Registry credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/jfrog-container-registry/delete-jfrog-container-registry-credentials.md): Deletes stored JFrog Artifactory Docker registry credentials from the organization - [Get JFrog credential details](https://docs.cybedefend.com/latest/api-reference/endpoint/jfrog-container-registry/get-jfrog-credential-details.md): Returns JFrog Artifactory Docker registry credential details (sanitized, no secrets exposed) - [List Docker images in JFrog Artifactory repository](https://docs.cybedefend.com/latest/api-reference/endpoint/jfrog-container-registry/list-docker-images-in-jfrog-artifactory-repository.md): Returns Docker container images stored in a JFrog Artifactory repository for vulnerability scanning - [List JFrog Artifactory Docker repositories](https://docs.cybedefend.com/latest/api-reference/endpoint/jfrog-container-registry/list-jfrog-artifactory-docker-repositories.md): Returns JFrog Artifactory Docker repositories accessible with the stored credentials for container scanning - [List JFrog Container Registry credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/jfrog-container-registry/list-jfrog-container-registry-credentials.md): Returns all JFrog Artifactory Docker registry credentials for the project (sanitized, no secrets exposed) - [List tags for a Docker image in JFrog Artifactory](https://docs.cybedefend.com/latest/api-reference/endpoint/jfrog-container-registry/list-tags-for-a-docker-image-in-jfrog-artifactory.md): Returns available tags for a Docker container image stored in JFrog Artifactory for vulnerability scanning - [Start JFrog Artifactory container image scan](https://docs.cybedefend.com/latest/api-reference/endpoint/jfrog-container-registry/start-jfrog-artifactory-container-image-scan.md): Starts a vulnerability scan for a Docker container image stored in JFrog Artifactory. Returns scan ID to track progress. - [Store JFrog Container Registry credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/jfrog-container-registry/store-jfrog-container-registry-credentials.md): Stores JFrog Artifactory Docker registry credentials at organization level for container image scanning - [Accept invitation to organization](https://docs.cybedefend.com/latest/api-reference/endpoint/organization/accept-invitation-to-organization.md) - [Cancel organization invitation](https://docs.cybedefend.com/latest/api-reference/endpoint/organization/cancel-organization-invitation.md) - [Create organization](https://docs.cybedefend.com/latest/api-reference/endpoint/organization/create-organization.md) - [Delete organization](https://docs.cybedefend.com/latest/api-reference/endpoint/organization/delete-organization.md) - [Get organization by ID](https://docs.cybedefend.com/latest/api-reference/endpoint/organization/get-organization-by-id.md) - [Get organization invitations](https://docs.cybedefend.com/latest/api-reference/endpoint/organization/get-organization-invitations.md) - [Get organization members](https://docs.cybedefend.com/latest/api-reference/endpoint/organization/get-organization-members.md) - [Get organizations of user](https://docs.cybedefend.com/latest/api-reference/endpoint/organization/get-organizations-of-user.md) - [Invite user to organization](https://docs.cybedefend.com/latest/api-reference/endpoint/organization/invite-user-to-organization.md) - [Remove member from organization](https://docs.cybedefend.com/latest/api-reference/endpoint/organization/remove-member-from-organization.md) - [Update organization](https://docs.cybedefend.com/latest/api-reference/endpoint/organization/update-organization.md) - [Update organization member role](https://docs.cybedefend.com/latest/api-reference/endpoint/organization/update-organization-member-role.md) - [Create a new security policy](https://docs.cybedefend.com/latest/api-reference/endpoint/policy/create-a-new-security-policy.md) - [Delete a security policy](https://docs.cybedefend.com/latest/api-reference/endpoint/policy/delete-a-security-policy.md) - [Enable or disable a security policy](https://docs.cybedefend.com/latest/api-reference/endpoint/policy/enable-or-disable-a-security-policy.md): Toggle the enabled state of a security policy. For organization-level policies, only one can be active at a time. - [Export a policy as YAML file](https://docs.cybedefend.com/latest/api-reference/endpoint/policy/export-a-policy-as-yaml-file.md) - [Get a security policy by ID](https://docs.cybedefend.com/latest/api-reference/endpoint/policy/get-a-security-policy-by-id.md) - [Get compliance history for a project](https://docs.cybedefend.com/latest/api-reference/endpoint/policy/get-compliance-history-for-a-project.md): Returns a paginated list of past policy evaluations for the project. - [Get compliance result for a scan](https://docs.cybedefend.com/latest/api-reference/endpoint/policy/get-compliance-result-for-a-scan.md): Returns the compliance result from the most recent policy evaluation for this scan. - [Get effective policies for a project](https://docs.cybedefend.com/latest/api-reference/endpoint/policy/get-effective-policies-for-a-project.md): Returns the list of policies that apply to this project (from organization, team, and project scopes). - [Get organization-wide compliance overview for CISO dashboard](https://docs.cybedefend.com/latest/api-reference/endpoint/policy/get-organization-wide-compliance-overview-for-ciso-dashboard.md): Returns a comprehensive overview of all projects within the organization with their compliance status, violation statistics, breakdown by rule type, and trend data for the last 30 days. - [Get policy violations for a project](https://docs.cybedefend.com/latest/api-reference/endpoint/policy/get-policy-violations-for-a-project.md) - [Get policy violations for a scan](https://docs.cybedefend.com/latest/api-reference/endpoint/policy/get-policy-violations-for-a-scan.md) - [Get the evaluation status for a scan](https://docs.cybedefend.com/latest/api-reference/endpoint/policy/get-the-evaluation-status-for-a-scan.md): Check if a policy evaluation has been triggered for this scan, and if so, what its current status is. Used by the CLI to poll for completion before checking compliance results. - [Get violation statistics for a project](https://docs.cybedefend.com/latest/api-reference/endpoint/policy/get-violation-statistics-for-a-project.md) - [List security policies](https://docs.cybedefend.com/latest/api-reference/endpoint/policy/list-security-policies.md) - [Update a security policy](https://docs.cybedefend.com/latest/api-reference/endpoint/policy/update-a-security-policy.md) - [Validate a policy YAML configuration without saving](https://docs.cybedefend.com/latest/api-reference/endpoint/policy/validate-a-policy-yaml-configuration-without-saving.md) - [Create a project](https://docs.cybedefend.com/latest/api-reference/endpoint/project/create-a-project.md) - [Delete a project](https://docs.cybedefend.com/latest/api-reference/endpoint/project/delete-a-project.md) - [Get a project](https://docs.cybedefend.com/latest/api-reference/endpoint/project/get-a-project.md) - [Get all projects of a team with pagination](https://docs.cybedefend.com/latest/api-reference/endpoint/project/get-all-projects-of-a-team-with-pagination.md) - [Get all projects of an organization with pagination](https://docs.cybedefend.com/latest/api-reference/endpoint/project/get-all-projects-of-an-organization-with-pagination.md) - [Update a project](https://docs.cybedefend.com/latest/api-reference/endpoint/project/update-a-project.md) - [Delete Quay Container Registry credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/quay-container-registry/delete-quay-container-registry-credentials.md): Deletes stored Quay.io / Red Hat Quay container registry credentials from the organization - [Get Quay Container Registry credential details](https://docs.cybedefend.com/latest/api-reference/endpoint/quay-container-registry/get-quay-container-registry-credential-details.md): Returns Quay.io / Red Hat Quay credential details (sanitized, secrets are masked) - [List container image tags from Quay registry](https://docs.cybedefend.com/latest/api-reference/endpoint/quay-container-registry/list-container-image-tags-from-quay-registry.md): Lists all tags for a specific container image repository in Quay.io / Red Hat Quay registry - [List container images from Quay registry](https://docs.cybedefend.com/latest/api-reference/endpoint/quay-container-registry/list-container-images-from-quay-registry.md): Lists all container images (repositories) accessible via the stored Quay.io / Red Hat Quay credentials - [List Quay Container Registry credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/quay-container-registry/list-quay-container-registry-credentials.md): Returns all Quay.io / Red Hat Quay container registry credentials available for the project (sanitized, secrets are masked) - [Start Quay Container Registry scan](https://docs.cybedefend.com/latest/api-reference/endpoint/quay-container-registry/start-quay-container-registry-scan.md): Initiates an asynchronous container image vulnerability scan using stored Quay.io / Red Hat Quay credentials. The scan runs in the background and results can be retrieved via the scan status endpoint. - [Store Quay Container Registry credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/quay-container-registry/store-quay-container-registry-credentials.md): Stores Quay.io / Red Hat Quay robot account credentials at organization level for container image scanning - [Analyze SCA vulnerabilities for autofix candidates](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/analyze-sca-vulnerabilities-for-autofix-candidates.md): Analyzes SCA vulnerabilities using DeepFix to find fix candidates. For transitive dependencies, determines which version of the direct dependency will resolve the vulnerable package to a safe version. Returns the dependency path showing the import chain and recommended fixes. - [Batch update multiple vulnerabilities](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/batch-update-multiple-vulnerabilities.md): Update status, priority, and/or comment for multiple vulnerabilities at once. Maximum 100 vulnerabilities per request. - [Delete a scanned container image from a project](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/delete-a-scanned-container-image-from-a-project.md) - [Generate a security report for a project](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/generate-a-security-report-for-a-project.md): Generate either an SBOM (Software Bill of Materials) report or OWASP Top 10 report in JSON, HTML, or PDF format - [Generate aggregated security report for a Team](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/generate-aggregated-security-report-for-a-team.md): Generates a consolidated OWASP Top 10 or CWE Top 25 report for all projects in a team - [Generate aggregated security report for an Organization](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/generate-aggregated-security-report-for-an-organization.md): Generates a consolidated OWASP Top 10 or CWE Top 25 report for all projects in an organization - [Generate CWE Top 25 2024 report for a project](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/generate-cwe-top-25-2024-report-for-a-project.md) - [Generate report for a manual selection of projects](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/generate-report-for-a-manual-selection-of-projects.md): Generates a consolidated OWASP Top 10 or CWE Top 25 report for a custom list of projects - [Get a container vulnerability by ID](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-a-container-vulnerability-by-id.md): Retrieves detailed information about a specific container vulnerability - [Get a vulnerability of a project for CICD](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-a-vulnerability-of-a-project-for-cicd.md) - [Get a vulnerability of a project for IaC](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-a-vulnerability-of-a-project-for-iac.md) - [Get a vulnerability of a project for SAST](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-a-vulnerability-of-a-project-for-sast.md) - [Get a vulnerability of a project for SCA](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-a-vulnerability-of-a-project-for-sca.md) - [Get a vulnerability of a project for Secret](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-a-vulnerability-of-a-project-for-secret.md) - [Get aggregated overview statistics for an organization](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-aggregated-overview-statistics-for-an-organization.md): Returns comprehensive vulnerability statistics aggregated across all projects in the organization. Supports filtering by projects, teams, severity, status, analysis types, date ranges, languages, branches, and more. Includes pagination for summaries and period-over-period comparison. - [Get all CICD vulnerabilities of a project](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-all-cicd-vulnerabilities-of-a-project.md) - [Get all container images of a project](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-all-container-images-of-a-project.md): Retrieves all scanned container images associated with a project - [Get all container packages of a project](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-all-container-packages-of-a-project.md): Retrieves all packages detected in container images for a project - [Get all container vulnerabilities of a project](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-all-container-vulnerabilities-of-a-project.md): Retrieves paginated container vulnerabilities with filtering options - [Get all IaC vulnerabilities of a project](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-all-iac-vulnerabilities-of-a-project.md) - [Get all SCA packages of a project](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-all-sca-packages-of-a-project.md) - [Get all SCA vulnerabilities of a project](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-all-sca-vulnerabilities-of-a-project.md) - [Get all Secret vulnerabilities of a project](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-all-secret-vulnerabilities-of-a-project.md) - [Get all vulnerabilities of a project for SAST](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-all-vulnerabilities-of-a-project-for-sast.md) - [Get branches from vulnerability detections](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-branches-from-vulnerability-detections.md): Retrieves distinct branch names found in SAST, SCA, and IAC vulnerability detections. Use this endpoint for projects that are not linked to GitHub or GitLab integrations. - [Get CICD vulnerabilities grouped by rule ID](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-cicd-vulnerabilities-grouped-by-rule-id.md): Returns CICD vulnerabilities consolidated by rule with occurrence counts and severity breakdown. - [Get container images grouped by repository](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-container-images-grouped-by-repository.md): Retrieves container images grouped by repository name, showing all tags within each image. Useful for viewing images with multiple tags (e.g., v1.0.0, latest) as a single entity. - [Get dockerhubsearchimages](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-dockerhubsearchimages.md) - [Get IAC vulnerabilities grouped by rule ID](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-iac-vulnerabilities-grouped-by-rule-id.md): Returns IAC vulnerabilities consolidated by rule with occurrence counts and severity breakdown. - [Get overview of a project](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-overview-of-a-project.md) - [Get SAST vulnerabilities grouped by rule ID](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-sast-vulnerabilities-grouped-by-rule-id.md): Returns SAST vulnerabilities consolidated by rule with occurrence counts and severity breakdown. Useful for showing unique vulnerability types with their occurrences. - [Get SBOM report for a project](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-sbom-report-for-a-project.md) - [Get SCA AutoFix job results](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-sca-autofix-job-results.md): Get the full results of a completed SCA AutoFix job. Returns all analysis results including fix candidates and PR information. - [Get SCA AutoFix job status](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-sca-autofix-job-status.md): Poll this endpoint to check the status of an SCA AutoFix job. Returns progress information and status (queued, processing, completed, failed). - [Get SCA vulnerabilities grouped by CVE + package name](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-sca-vulnerabilities-grouped-by-cve-+-package-name.md): Returns SCA vulnerabilities consolidated by CVE and package with occurrence counts, severity breakdown, and CVSS scores. - [Get Secret vulnerabilities grouped by rule ID](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-secret-vulnerabilities-grouped-by-rule-id.md): Returns Secret vulnerabilities consolidated by rule with occurrence counts and severity breakdown. - [Get vulnerability by ID with similar occurrences](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/get-vulnerability-by-id-with-similar-occurrences.md): Returns a vulnerability and all similar occurrences (same rule for SAST/IAC/CICD/Secret, same CVE for SCA). - [Update a vulnerability of a project](https://docs.cybedefend.com/latest/api-reference/endpoint/results-&-vulnerabilities/update-a-vulnerability-of-a-project.md) - [Assign License to Package](https://docs.cybedefend.com/latest/api-reference/endpoint/sca-licenses/assign-package-license.md): Manually assign an SPDX license ID to a specific SCA package - [Get License Classifications](https://docs.cybedefend.com/latest/api-reference/endpoint/sca-licenses/get-license-classifications.md): Get all license classifications for an organization, including defaults and overrides - [Get License Summary](https://docs.cybedefend.com/latest/api-reference/endpoint/sca-licenses/get-license-summary.md): Get aggregated license statistics for all SCA packages in a project - [Get Packages by License](https://docs.cybedefend.com/latest/api-reference/endpoint/sca-licenses/get-packages-by-license.md): Get all packages in a project that use a specific SPDX license - [Reset License Classifications](https://docs.cybedefend.com/latest/api-reference/endpoint/sca-licenses/reset-license-classifications.md): Reset all license classification overrides for an organization back to defaults - [Toggle Package License Ignore](https://docs.cybedefend.com/latest/api-reference/endpoint/sca-licenses/toggle-package-license-ignore.md): Toggle the ignore status for a package in license analysis - [Update License Classifications](https://docs.cybedefend.com/latest/api-reference/endpoint/sca-licenses/update-license-classifications.md): Update license classification overrides for an organization - [Delete Scaleway Credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/scaleway-container-registry/delete-scaleway-credentials.md): Delete stored Scaleway Container Registry credentials - [Get Scaleway Credential Details](https://docs.cybedefend.com/latest/api-reference/endpoint/scaleway-container-registry/get-scaleway-credential-details.md): Get details of a specific Scaleway Container Registry credential - [List Scaleway Credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/scaleway-container-registry/list-scaleway-credentials.md): List all Scaleway Container Registry credentials for a project - [List Scaleway Image Tags](https://docs.cybedefend.com/latest/api-reference/endpoint/scaleway-container-registry/list-scaleway-image-tags.md): List tags for a specific Docker image in Scaleway Container Registry - [List Scaleway Images](https://docs.cybedefend.com/latest/api-reference/endpoint/scaleway-container-registry/list-scaleway-images.md): List Docker images from a Scaleway Container Registry namespace - [List Scaleway Namespaces](https://docs.cybedefend.com/latest/api-reference/endpoint/scaleway-container-registry/list-scaleway-namespaces.md): List container registry namespaces accessible with stored credentials - [Start Scaleway Container Scan](https://docs.cybedefend.com/latest/api-reference/endpoint/scaleway-container-registry/start-scaleway-container-scan.md): Start a container vulnerability scan for an image in Scaleway Container Registry - [Store Scaleway Container Registry Credentials](https://docs.cybedefend.com/latest/api-reference/endpoint/scaleway-container-registry/store-scaleway-credentials.md): Store Scaleway API credentials for container registry access - [Get a scan by ID](https://docs.cybedefend.com/latest/api-reference/endpoint/scan/get-a-scan-by-id.md): Retrieves detailed information about a specific scan including status, progress, and configuration. - [Start a public container scan](https://docs.cybedefend.com/latest/api-reference/endpoint/scan/start-a-public-container-scan.md): Initiates a container image vulnerability scan for a public Docker image. - [Start a scan](https://docs.cybedefend.com/latest/api-reference/endpoint/scan/start-a-scan.md): Initiates a security scan for a project. Returns a signed URL to upload the source code. The scan will analyze the code for SAST, IaC, and SCA vulnerabilities based on project configuration. - [Resolve enterprise SSO connectors by email domain](https://docs.cybedefend.com/latest/api-reference/endpoint/sso/resolve-enterprise-sso-connectors-by-email-domain.md): Returns SSO connectors configured for the email domain. Used by the login page to bypass the SSO email screen. - [Add a member to a team](https://docs.cybedefend.com/latest/api-reference/endpoint/team/add-a-member-to-a-team.md) - [Create a new team](https://docs.cybedefend.com/latest/api-reference/endpoint/team/create-a-new-team.md) - [Delete a team](https://docs.cybedefend.com/latest/api-reference/endpoint/team/delete-a-team.md) - [Get a member of a team](https://docs.cybedefend.com/latest/api-reference/endpoint/team/get-a-member-of-a-team.md) - [Get all members of a team](https://docs.cybedefend.com/latest/api-reference/endpoint/team/get-all-members-of-a-team.md) - [Get all teams of an organization](https://docs.cybedefend.com/latest/api-reference/endpoint/team/get-all-teams-of-an-organization.md) - [Get team by ID](https://docs.cybedefend.com/latest/api-reference/endpoint/team/get-team-by-id.md) - [Remove a member from a team](https://docs.cybedefend.com/latest/api-reference/endpoint/team/remove-a-member-from-a-team.md) - [Update a member role in a team](https://docs.cybedefend.com/latest/api-reference/endpoint/team/update-a-member-role-in-a-team.md) - [Update a team](https://docs.cybedefend.com/latest/api-reference/endpoint/team/update-a-team.md) - [Create a personal access token](https://docs.cybedefend.com/latest/api-reference/endpoint/user/create-a-personal-access-token.md) - [Delete a personal access token](https://docs.cybedefend.com/latest/api-reference/endpoint/user/delete-a-personal-access-token.md) - [Get user profile](https://docs.cybedefend.com/latest/api-reference/endpoint/user/get-user-profile.md): Retrieves the profile information of the currently authenticated user including notification settings and onboarding status. - [List personal access tokens](https://docs.cybedefend.com/latest/api-reference/endpoint/user/list-personal-access-tokens.md) - [Rename a personal access token](https://docs.cybedefend.com/latest/api-reference/endpoint/user/rename-a-personal-access-token.md) - [Update user profile](https://docs.cybedefend.com/latest/api-reference/endpoint/user/update-user-profile.md): Updates the profile information of the currently authenticated user. Allows modification of notification preferences and onboarding completion status. - [Get app IDs for native clients](https://docs.cybedefend.com/latest/api-reference/endpoint/version/get-app-ids-for-native-clients.md): Returns the public application IDs for native clients (CLI, VS Code Extension, IntelliJ IDEA Extension). No authentication required. - [Introduction](https://docs.cybedefend.com/latest/api-reference/introduction.md): CybeDefend API Documentation for Application Security Analysis - [Azure DevOps Server Setup for Local Code Scanning](https://docs.cybedefend.com/latest/code-scanning/ci-cd-integrations/azure-devops-server-setup.md): Use the CybeDefend CLI to integrate local scans into an on-prem Azure DevOps Server pipeline. - [Bamboo Setup for Local Code Scanning](https://docs.cybedefend.com/latest/code-scanning/ci-cd-integrations/bamboo-setup.md): Use CybeDefend local scanning in your Atlassian Bamboo pipeline, either via Docker or binary installation. - [Bitbucket Pipeline Setup for Local Code Scanning](https://docs.cybedefend.com/latest/code-scanning/ci-cd-integrations/bitbucket-pipeline-setup.md): Run the CybeDefend CLI in Bitbucket Pipelines to securely upload and scan your repository code. - [CircleCI Setup for Local Code Scanning](https://docs.cybedefend.com/latest/code-scanning/ci-cd-integrations/circleci-setup.md): Implement CybeDefend local scanning in your CircleCI pipeline without granting direct repo access. - [GitHub Action Setup for Local Code Scanning](https://docs.cybedefend.com/latest/code-scanning/ci-cd-integrations/github-action-setup.md): Integrate CybeDefend local scans into your GitHub Actions workflow using the official CybeDefend Action. - [GitLab Self-Managed Setup for Local Code Scanning](https://docs.cybedefend.com/latest/code-scanning/ci-cd-integrations/gitlab-self-managed-setup.md): Integrate the CybeDefend CLI into a GitLab Self-Managed CI/CD pipeline for secure local code scanning. - [Jenkins Setup for Local Code Scanning](https://docs.cybedefend.com/latest/code-scanning/ci-cd-integrations/jenkins-setup.md): Integrate CybeDefend’s local scanning into a Jenkins pipeline without exposing your code externally. - [TeamCity Setup for Local Code Scanning](https://docs.cybedefend.com/latest/code-scanning/ci-cd-integrations/teamcity-setup.md): Quickly integrate local scanning with CybeDefend in a TeamCity pipeline using our Docker image. - [CLI Options for Local Scanner](https://docs.cybedefend.com/latest/code-scanning/local-code-scanning/cli-options.md): Quickly install and use the CybeDefend CLI to scan your code locally, fetch results, and integrate secure checks into CI/CD. - [Personal Access Tokens (PAT)](https://docs.cybedefend.com/latest/code-scanning/local-code-scanning/introduction-api-key.md): Create and use Personal Access Tokens to authenticate the CybeDefend CLI. - [Linux Setup for Local Code Scanning](https://docs.cybedefend.com/latest/code-scanning/local-code-scanning/linux-setup.md): Install the CybeDefend CLI on various Linux distributions for local or CI-based security scans. - [Mac Setup for Local Code Scanning](https://docs.cybedefend.com/latest/code-scanning/local-code-scanning/mac-setup.md): Install and run the CybeDefend CLI on macOS for secure local code scanning. - [Windows Setup for Local Code Scanning](https://docs.cybedefend.com/latest/code-scanning/local-code-scanning/windows-setup.md): Install and run the CybeDefend CLI on Windows for straightforward local code scanning. - [How to Launch a Scan on a C/C++ Project](https://docs.cybedefend.com/latest/code-scanning/scanning-by-project-type/how-to-launch-scan-c-cpp.md): Integrate CybeDefend with your C/C++ toolchain and lock dependencies, typically via conan.lock. - [How to Launch a Scan on a PHP/Composer Project](https://docs.cybedefend.com/latest/code-scanning/scanning-by-project-type/how-to-launch-scan-composer.md): Best practices for configuring Composer projects to be scanned by CybeDefend, with an emphasis on lockfiles. - [How to Launch a Scan on a .NET Project](https://docs.cybedefend.com/latest/code-scanning/scanning-by-project-type/how-to-launch-scan-dotnet.md): Use lockfiles like packages.lock.json in your .NET build for better SCA detection with CybeDefend. - [How to Launch a Scan on Java/Scala/Kotlin](https://docs.cybedefend.com/latest/code-scanning/scanning-by-project-type/how-to-launch-scan-java-scala-kotlin.md): Optimize SCA scanning by using Gradle lockfiles and pinned versions for Java, Scala, or Kotlin builds. - [How to Launch a Scan on a Maven Project](https://docs.cybedefend.com/latest/code-scanning/scanning-by-project-type/how-to-launch-scan-maven.md): Best practices for configuring Maven to be scanned by CybeDefend, with an emphasis on lockfile-like mechanisms. - [How to Launch a Scan on a Node Project](https://docs.cybedefend.com/latest/code-scanning/scanning-by-project-type/how-to-launch-scan-node.md): Use package-lock.json, yarn.lock, or pnpm-lock.yaml to improve security scanning for Node apps in CybeDefend. - [Code Repository Scanning](https://docs.cybedefend.com/latest/code-scanning/scanning-options/code-repository-scanning.md): Discover how the CybeDefend Engine unifies results from multiple scanners. - [.cybedefend Ignore File](https://docs.cybedefend.com/latest/code-scanning/scanning-options/cybedefend-ignore-file.md): Filter vulnerabilities using a .cybedefend file with gitignore syntax - [Scan Project Parameters](https://docs.cybedefend.com/latest/code-scanning/scanning-options/scan-parameters.md): Configure your scan settings: choose scanner types, enable fast scanning, and set vulnerability severity levels. - [Container Image Scanning](https://docs.cybedefend.com/latest/container-scanning/container-image-scanning.md): Scan container images for vulnerabilities from public registries or private repositories to secure your containerized applications. - [Dockerfile Security Scanning](https://docs.cybedefend.com/latest/container-scanning/dockerfile-security-scanning.md): Detect vulnerabilities and security issues in Dockerfile configurations and container image builds during code scanning. - [Amazon ECR](https://docs.cybedefend.com/latest/container-scanning/registry-integrations/amazon-ecr.md): Scan container images stored in Amazon Elastic Container Registry. - [Azure Container Registry](https://docs.cybedefend.com/latest/container-scanning/registry-integrations/azure-container-registry.md): Scan container images stored in Azure Container Registry. - [Docker Hub](https://docs.cybedefend.com/latest/container-scanning/registry-integrations/docker-hub.md): Connect and scan container images from Docker Hub. - [GitHub Container Registry](https://docs.cybedefend.com/latest/container-scanning/registry-integrations/github-container-registry.md): Scan container images stored in GitHub Container Registry (GHCR). - [GitLab Container Registry](https://docs.cybedefend.com/latest/container-scanning/registry-integrations/gitlab-container-registry.md): Scan container images stored in GitLab's integrated container registry. - [Google Container Registry](https://docs.cybedefend.com/latest/container-scanning/registry-integrations/google-container-registry.md): Scan container images stored in Google Container Registry. - [Harbor Container Registry](https://docs.cybedefend.com/latest/container-scanning/registry-integrations/harbor.md): Scan container images stored in Harbor registry. - [JFrog Artifactory](https://docs.cybedefend.com/latest/container-scanning/registry-integrations/jfrog-artifactory.md): Scan container images stored in JFrog Artifactory. - [Red Hat Quay](https://docs.cybedefend.com/latest/container-scanning/registry-integrations/red-hat-quay.md): Scan container images stored in Red Hat Quay registry. - [Scaleway Container Registry](https://docs.cybedefend.com/latest/container-scanning/registry-integrations/scaleway-container-registry.md): Scan container images stored in Scaleway Container Registry. - [Assigning Roles in Organizations and Teams](https://docs.cybedefend.com/latest/get-started/account-setup/assigning-roles.md): Learn about the different roles available in CybeDefend organizations and teams, and how to manage user permissions. - [Create Account](https://docs.cybedefend.com/latest/get-started/account-setup/create-account-organization.md): Learn how to create your CybeDefend account, set up an organization, and integrate your code repositories. - [Managing Access with Organizations and Teams](https://docs.cybedefend.com/latest/get-started/account-setup/managing-access-org-teams.md): Learn how to structure your organization, create teams, and invite members to manage code and projects effectively. - [Connect GitHub Account to CybeDefend](https://docs.cybedefend.com/latest/get-started/connect-your-source-code/connect-github.md): Authorize and install the CybeDefend GitHub App to link your repositories for static code scanning. - [Connect GitLab Account to CybeDefend](https://docs.cybedefend.com/latest/get-started/connect-your-source-code/connect-gitlab.md): Authorize and install the CybeDefend GitLab integration to link your repositories for static code scanning. - [Creating Projects](https://docs.cybedefend.com/latest/get-started/project-management/create-project.md): Learn how to create projects in CybeDefend, whether you're linking GitHub, GitLab, or uploading a ZIP file. - [Global Project Management](https://docs.cybedefend.com/latest/get-started/project-management/global-project-management.md): Get a high-level view of all your organization’s projects, vulnerabilities, and trends. - [Project Overview & Stats](https://docs.cybedefend.com/latest/get-started/project-management/project-overview-stats.md): Dive deeper into per-project analytics, including severity breakdowns, states, and historical trends. - [JetBrains Plugin](https://docs.cybedefend.com/latest/ide-integrations/jetbrains.md): Integrate CybeDefend security scanning and AI-powered remediation into IntelliJ IDEA, PyCharm, WebStorm, and other JetBrains IDEs. - [VS Code Extension](https://docs.cybedefend.com/latest/ide-integrations/vscode.md): Integrate CybeDefend security scanning and AI-powered remediation directly into Visual Studio Code. - [Introduction](https://docs.cybedefend.com/latest/introduction.md): Overview and introduction to the CybeDefend platform and its innovative approach to cybersecurity. - [Project Vulnerability List](https://docs.cybedefend.com/latest/managing-vulnerabilities/project-vulnerability-list.md): Dive into a specific project's vulnerabilities, with filters and sorting for clear organization. - [Updating Vulnerabilities](https://docs.cybedefend.com/latest/managing-vulnerabilities/updating-vulnerabilities.md): Easily change vulnerability status, priority, and add comments to coordinate fixes. - [BLSA: Business Logic Security Analysis](https://docs.cybedefend.com/latest/plateform-overview/key-features/blsa-business-logic-security-analysis.md): Discover our AI-driven, holistic approach to identifying insecure-by-design flaws in your application. - [Cybe Analysis](https://docs.cybedefend.com/latest/plateform-overview/key-features/cybe-analysis.md): AI-powered vulnerability analysis that eliminates false positives and provides expert-level security insights. - [Cybe AutoFix](https://docs.cybedefend.com/latest/plateform-overview/key-features/cybe-autofix.md): AI-powered intelligent remediation that understands context and fixes vulnerabilities across your entire codebase. - [Cybe Security Champion](https://docs.cybedefend.com/latest/plateform-overview/key-features/cybe-security-champion.md): Your AI-powered security expert that provides instant, expert-level guidance directly within your development workflow. - [Exploitable Path](https://docs.cybedefend.com/latest/plateform-overview/key-features/exploitable-path.md): Identify whether vulnerable dependencies are actually used in your code with SCA reachability analysis - [License Compliance](https://docs.cybedefend.com/latest/plateform-overview/key-features/license-compliance.md): Identify, categorize, and manage open-source license risks across your SCA dependencies - [Cybe MCP Server](https://docs.cybedefend.com/latest/plateform-overview/key-features/mcp-server-integration.md): The flagship CybeDefend feature. Connect your AI coding agent (Claude Code, Cursor, Copilot, Windsurf and others) to your CybeDefend tenant in one click. 18 typed tools over the Model Context Protocol, OAuth-discovered, browser-only sign-in. No API key, no local proxy. - [Policy Management](https://docs.cybedefend.com/latest/plateform-overview/key-features/policy-management.md): Define security policies as code and enforce compliance across your organization - [Advanced Access Control with ReBAC](https://docs.cybedefend.com/latest/plateform-overview/key-features/rebac-management.md): Learn how CybeDefend leverages Role-Based and Relationship-Based Access Control to provide granular security within your organization. - [Sovereign Data Storage](https://docs.cybedefend.com/latest/plateform-overview/key-features/sovereign-data-storage.md): Choose where your data is stored with sovereign cloud options in France and Europe for GDPR compliance, or opt for global cloud providers. - [AI Usage & Entitlements](https://docs.cybedefend.com/latest/plateform-overview/plan-&-pricing/ai-usage-tracking.md): Monitor your Cybe AI features usage and track available quotas. - [Pricing Model](https://docs.cybedefend.com/latest/plateform-overview/plan-&-pricing/free-plan.md): Understand CybeDefend's flexible pricing model with organization-wide credits and on-demand add-ons. - [Manage Billing & Subscription](https://docs.cybedefend.com/latest/plateform-overview/plan-&-pricing/manage-billing-subscription.md): Configure your subscription, manage seats, add credits, and update billing information. - [LLM Usage & Privacy](https://docs.cybedefend.com/latest/plateform-overview/security-privacy/llm-usage-privacy.md): How CybeDefend uses sovereign LLMs with strict privacy guarantees. - [Never Stores Your Code](https://docs.cybedefend.com/latest/plateform-overview/security-privacy/never-stores-your-code.md): How CybeDefend secures your code and ensures it is not stored post-analysis. ## OpenAPI Specs - [openapi](https://docs.cybedefend.com/api-reference/openapi.json) ## Optional - [Dashboard](https://us.cybedefend.com/) - [Community](https://www.linkedin.com/company/cybedefend) - [Blog](https://www.cybedefend.com/blog)