Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
332 changes: 166 additions & 166 deletions .speakeasy/gen.lock

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion .speakeasy/gen.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ generation:
generateNewTests: false
skipResponseBodyAssertions: false
python:
version: 0.13.1
version: 0.13.2
additionalDependencies:
dev: {}
main: {}
Expand Down
15 changes: 7 additions & 8 deletions .speakeasy/workflow.lock
Original file line number Diff line number Diff line change
@@ -1,21 +1,20 @@
speakeasyVersion: 1.731.2
speakeasyVersion: 1.744.0
sources:
converge-source:
sourceNamespace: converge-source
sourceRevisionDigest: sha256:48cf182ee10951ce591e9d09c41ff31c245676976837dc8efeeb81de92331450
sourceBlobDigest: sha256:7de50b965211e15a8a2e0f0aa4bf2e80879f8e95decc394147e411317e37caa0
sourceRevisionDigest: sha256:313f9cd08b2344c58acbb9205c7c6a2869aeb18a6a6aef75b0004f4dbcd02b51
sourceBlobDigest: sha256:294a929e310068628cf19eef16616cd4f95bd3e0f4aef0439588354e9bd55794
tags:
- latest
- speakeasy-sdk-regen-1771979923
- 1.0.80
- 1.0.82
targets:
censys-sdk-python:
source: converge-source
sourceNamespace: converge-source
sourceRevisionDigest: sha256:48cf182ee10951ce591e9d09c41ff31c245676976837dc8efeeb81de92331450
sourceBlobDigest: sha256:7de50b965211e15a8a2e0f0aa4bf2e80879f8e95decc394147e411317e37caa0
sourceRevisionDigest: sha256:313f9cd08b2344c58acbb9205c7c6a2869aeb18a6a6aef75b0004f4dbcd02b51
sourceBlobDigest: sha256:294a929e310068628cf19eef16616cd4f95bd3e0f4aef0439588354e9bd55794
codeSamplesNamespace: converge-source-python-code-samples
codeSamplesRevisionDigest: sha256:3888134d241e822364240410bd135065d6da335e32aa1173967eeeb211429867
codeSamplesRevisionDigest: sha256:d2c8988ccc3a249c97ccdc8b0d52e62c708a67220d19774c728ed7e3c1800bc8
workflow:
workflowVersion: 1.0.0
speakeasyVersion: latest
Expand Down
12 changes: 11 additions & 1 deletion RELEASES.md
Original file line number Diff line number Diff line change
Expand Up @@ -216,4 +216,14 @@ Based on:
### Generated
- [python v0.13.1] .
### Releases
- [PyPI v0.13.1] https://pypi.org/project/censys-platform/0.13.1 - .
- [PyPI v0.13.1] https://pypi.org/project/censys-platform/0.13.1 - .

## 2026-03-06 00:39:35
### Changes
Based on:
- OpenAPI Doc
- Speakeasy CLI 1.744.0 (2.850.3) https://github.com/speakeasy-api/speakeasy
### Generated
- [python v0.13.2] .
### Releases
- [PyPI v0.13.2] https://pypi.org/project/censys-platform/0.13.2 - .
8 changes: 8 additions & 0 deletions docs/models/assetchangetypes.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,13 @@
# AssetChangeTypes

## Example Usage

```python
from censys_platform.models import AssetChangeTypes

value = AssetChangeTypes.ADDED
```


## Values

Expand Down
10 changes: 10 additions & 0 deletions docs/models/attackcomplexity.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,16 @@

Indicates conditions beyond the attacker’s control that must exist in order to exploit the vulnerability. The Attack Complexity metric is scored as either Low or High. There are two possible values: Low (L) – There are no specific pre-conditions required for exploitation, High (H) – The attacker must complete some number of preparatory steps in order to get access.

## Example Usage

```python
from censys_platform.models import AttackComplexity

value = AttackComplexity.UNKNOWN

# Open enum: unrecognized values are captured as UnrecognizedStr
```


## Values

Expand Down
10 changes: 10 additions & 0 deletions docs/models/attackrequirements.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,15 @@
# AttackRequirements

## Example Usage

```python
from censys_platform.models import AttackRequirements

value = AttackRequirements.UNKNOWN

# Open enum: unrecognized values are captured as UnrecognizedStr
```


## Values

Expand Down
10 changes: 10 additions & 0 deletions docs/models/attackvector.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,16 @@

Indicates the level of access required for an attacker to exploit the vulnerability. The Attack Vector metric is scored in one of four levels: Network (N) – Vulnerabilities with this rating are remotely exploitable, from one or more hops away, up to, and including, remote exploitation over the Internet, Adjacent (A) – A vulnerability with this rating requires network adjacency for exploitation. The attack must be launched from the same physical or logical network, Local (L) – Vulnerabilities with this rating are not exploitable over a network, Physical (P) – An attacker must physically interact with the target system.

## Example Usage

```python
from censys_platform.models import AttackVector

value = AttackVector.UNKNOWN

# Open enum: unrecognized values are captured as UnrecognizedStr
```


## Values

Expand Down
10 changes: 10 additions & 0 deletions docs/models/automatable.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,15 @@
# Automatable

## Example Usage

```python
from censys_platform.models import Automatable

value = Automatable.UNKNOWN

# Open enum: unrecognized values are captured as UnrecognizedStr
```


## Values

Expand Down
10 changes: 10 additions & 0 deletions docs/models/availability.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,16 @@

If an attack renders information unavailable, such as when a system crashes or through a DDoS attack, availability is negatively impacted. Availability has three possible values: None (N) – There is no loss of availability, Low (L) – Availability might be intermittently limited, or performance might be negatively impacted, as a result of a successful attack, High (H) – There is a complete loss of availability of the impacted system or information.

## Example Usage

```python
from censys_platform.models import Availability

value = Availability.UNKNOWN

# Open enum: unrecognized values are captured as UnrecognizedStr
```


## Values

Expand Down
10 changes: 10 additions & 0 deletions docs/models/changetype.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,15 @@
# ChangeType

## Example Usage

```python
from censys_platform.models import ChangeType

value = ChangeType.ADDED

# Open enum: unrecognized values are captured as UnrecognizedStr
```


## Values

Expand Down
8 changes: 8 additions & 0 deletions docs/models/changetypes.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,13 @@
# ChangeTypes

## Example Usage

```python
from censys_platform.models import ChangeTypes

value = ChangeTypes.ASSET
```


## Values

Expand Down
10 changes: 10 additions & 0 deletions docs/models/collectionstatus.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,15 @@
# CollectionStatus

## Example Usage

```python
from censys_platform.models import CollectionStatus

value = CollectionStatus.UNSPECIFIED

# Open enum: unrecognized values are captured as UnrecognizedStr
```


## Values

Expand Down
8 changes: 8 additions & 0 deletions docs/models/collectionstatuses.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,13 @@
# CollectionStatuses

## Example Usage

```python
from censys_platform.models import CollectionStatuses

value = CollectionStatuses.POPULATING
```


## Values

Expand Down
10 changes: 10 additions & 0 deletions docs/models/confidentiality.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,16 @@

Refers to the disclosure of sensitive information to authorized and unauthorized users, with the goal being that only authorized users are able to access the target data. Confidentiality has three potential values: High (H) – The attacker has full access to all resources in the impacted system, including highly sensitive information such as encryption keys, Low (L) – The attacker has partial access to information, with no control over what, specifically, they are able to access, None (N) – No data is accessible to unauthorized users as a result of the exploit.

## Example Usage

```python
from censys_platform.models import Confidentiality

value = Confidentiality.UNKNOWN

# Open enum: unrecognized values are captured as UnrecognizedStr
```


## Values

Expand Down
10 changes: 10 additions & 0 deletions docs/models/cvssv4componentsattackcomplexity.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,16 @@

Indicates conditions beyond the attacker’s control that must exist in order to exploit the vulnerability. The Attack Complexity metric is scored as either Low or High. There are two possible values: Low (L) – There are no specific pre-conditions required for exploitation, High (H) – The attacker must complete some number of preparatory steps in order to get access.

## Example Usage

```python
from censys_platform.models import CVSSv4ComponentsAttackComplexity

value = CVSSv4ComponentsAttackComplexity.UNKNOWN

# Open enum: unrecognized values are captured as UnrecognizedStr
```


## Values

Expand Down
10 changes: 10 additions & 0 deletions docs/models/cvssv4componentsattackvector.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,16 @@

Indicates the level of access required for an attacker to exploit the vulnerability. The Attack Vector metric is scored in one of four levels: Network (N) – Vulnerabilities with this rating are remotely exploitable, from one or more hops away, up to, and including, remote exploitation over the Internet, Adjacent (A) – A vulnerability with this rating requires network adjacency for exploitation. The attack must be launched from the same physical or logical network, Local (L) – Vulnerabilities with this rating are not exploitable over a network, Physical (P) – An attacker must physically interact with the target system.

## Example Usage

```python
from censys_platform.models import CVSSv4ComponentsAttackVector

value = CVSSv4ComponentsAttackVector.UNKNOWN

# Open enum: unrecognized values are captured as UnrecognizedStr
```


## Values

Expand Down
10 changes: 10 additions & 0 deletions docs/models/cvssv4componentsavailability.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,16 @@

If an attack renders information unavailable, such as when a system crashes or through a DDoS attack, availability is negatively impacted. Availability has three possible values: None (N) – There is no loss of availability, Low (L) – Availability might be intermittently limited, or performance might be negatively impacted, as a result of a successful attack, High (H) – There is a complete loss of availability of the impacted system or information.

## Example Usage

```python
from censys_platform.models import CVSSv4ComponentsAvailability

value = CVSSv4ComponentsAvailability.UNKNOWN

# Open enum: unrecognized values are captured as UnrecognizedStr
```


## Values

Expand Down
10 changes: 10 additions & 0 deletions docs/models/cvssv4componentsconfidentiality.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,16 @@

Refers to the disclosure of sensitive information to authorized and unauthorized users, with the goal being that only authorized users are able to access the target data. Confidentiality has three potential values: High (H) – The attacker has full access to all resources in the impacted system, including highly sensitive information such as encryption keys, Low (L) – The attacker has partial access to information, with no control over what, specifically, they are able to access, None (N) – No data is accessible to unauthorized users as a result of the exploit.

## Example Usage

```python
from censys_platform.models import CVSSv4ComponentsConfidentiality

value = CVSSv4ComponentsConfidentiality.UNKNOWN

# Open enum: unrecognized values are captured as UnrecognizedStr
```


## Values

Expand Down
10 changes: 10 additions & 0 deletions docs/models/cvssv4componentsintegrity.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,16 @@

Refers to whether the protected information has been tampered with or changed in any way. If there is no way for an attacker to alter the accuracy or completeness of the information, integrity has been maintained. Integrity has three values: None (N) – There is no loss of the integrity of any information, Low (L) – A limited amount of information might be tampered with or modified, but there is no serious impact on the protected system, High (H) – The attacker can modify any/all information on the target system, resulting in a complete loss of integrity.

## Example Usage

```python
from censys_platform.models import CVSSv4ComponentsIntegrity

value = CVSSv4ComponentsIntegrity.UNKNOWN

# Open enum: unrecognized values are captured as UnrecognizedStr
```


## Values

Expand Down
10 changes: 10 additions & 0 deletions docs/models/cvssv4componentsprivilegesrequired.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,16 @@

Describes the level of privileges or access an attacker must have before successful exploitation. There are three possible values: None (N) – There is no privilege or special access required to conduct the attack, Low (L) – The attacker requires basic, β€œuser” level privileges to leverage the exploit, High (H) – Administrative or similar access privileges are required for successful attack.

## Example Usage

```python
from censys_platform.models import CVSSv4ComponentsPrivilegesRequired

value = CVSSv4ComponentsPrivilegesRequired.UNKNOWN

# Open enum: unrecognized values are captured as UnrecognizedStr
```


## Values

Expand Down
10 changes: 10 additions & 0 deletions docs/models/cvssv4componentsuserinteraction.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,16 @@

Describes whether a user, other than the attacker, is required to do anything or participate in exploitation of the vulnerability. User interaction has two possible values: None (N) – No user interaction is required, Required (R) – A user must complete some steps for the exploit to succeed. For example, a user might be required to install some software.

## Example Usage

```python
from censys_platform.models import CVSSv4ComponentsUserInteraction

value = CVSSv4ComponentsUserInteraction.UNKNOWN

# Open enum: unrecognized values are captured as UnrecognizedStr
```


## Values

Expand Down
10 changes: 10 additions & 0 deletions docs/models/dnsresourcerecordtype.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,16 @@

An enumerated field indicating what type of data is in the "services.dns.additionals.response" field. For example, "A" signifies that the value in "services.dns.additionals.response" is an IPv4 address for the FQDN in "services.dns.additionals.name".

## Example Usage

```python
from censys_platform.models import DNSResourceRecordType

value = DNSResourceRecordType.UNKNOWN

# Open enum: unrecognized values are captured as UnrecognizedStr
```


## Values

Expand Down
10 changes: 10 additions & 0 deletions docs/models/endpointscanstatetransportprotocol.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,15 @@
# EndpointScanStateTransportProtocol

## Example Usage

```python
from censys_platform.models import EndpointScanStateTransportProtocol

value = EndpointScanStateTransportProtocol.UNKNOWN

# Open enum: unrecognized values are captured as UnrecognizedStr
```


## Values

Expand Down
10 changes: 10 additions & 0 deletions docs/models/endpointscantransportprotocol.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,15 @@
# EndpointScanTransportProtocol

## Example Usage

```python
from censys_platform.models import EndpointScanTransportProtocol

value = EndpointScanTransportProtocol.UNKNOWN

# Open enum: unrecognized values are captured as UnrecognizedStr
```


## Values

Expand Down
Loading