Authentication
All endpoints require theFACTION-API-KEY header. Remediation or Assessor permissions are required for most operations.
Get All Verifications
Requires Remediation permission
Request Parameters
API authentication key
Filter by assessor completed date range start (format: YYYY-MM-DD)
Filter by assessor completed date range end (format: YYYY-MM-DD)
Response
Returns all open verifications and completed verifications within the specified date range. Non-completed verifications are returned regardless of date range.Vulnerability ID
Unique verification identifier
Verification start date (milliseconds)
Verification end date (milliseconds)
Application identifier
Assessment name
Vulnerability tracking ID (e.g., VID-1234)
Verification status: “In Progress”, “Passed”, or “Failed”
Internal workflow status code
Assessor completion date (milliseconds, empty if in progress)
Remediation completion date (milliseconds)
Verification notes
Example
cURL
Get Assessor Verification Queue
Requires Assessor or Manager permission
Request Parameters
API authentication key
Response
Returns only verifications assigned to the authenticated user that are not yet completed. Response format matches/all endpoint.
Example
cURL
Get User Verifications
Requires Remediation permission
Request Parameters
API authentication key
Username of the assessor to query
Filter by completed date range start (format: YYYY-MM-DD)
Filter by completed date range end (format: YYYY-MM-DD)
Response
Returns all open verifications for the specified user and completed verifications within the date range. Response format matches/all endpoint.
Example
cURL
Pass or Fail a Verification
Requires Remediation, Assessor, or Manager permission
Request Parameters
API authentication key
Verification ID to complete
true if the retest passed, false if it failedNotes about the verification result
If
true and verification passed, closes the finding in production. Otherwise closes in development only.Date of completion (format: YYYY-MM-DD). If blank, current date is used.
Behavior
- If passed is
true, the vulnerability is marked as closed in development (or production ifinProd=true) - A note is automatically added to the vulnerability with the assessor’s name, result, and provided notes
- The verification is removed from the queue after completion
Example
cURL
Schedule a Retest
Requires Remediation or Manager permission
Request Parameters
API authentication key
Username of the assessor to assign
Username of the remediation contact
Vulnerability ID to retest (use either
vulnId or trackingId)Vulnerability tracking ID to retest (use either
vulnId or trackingId)Verification start date (format: YYYY-MM-DD)
Verification end date (format: YYYY-MM-DD)
Response
Returns the newly created Verification ID.Example
cURL
Workflow States
Verifications progress through workflow states:| State | Value | Description |
|---|---|---|
| In Assessor Queue | 0 | Waiting for assessor to verify fix |
| Completed | N/A | Verification completed (passed or failed) |
/passfail, it is removed from the queue and the result is recorded on the vulnerability.
Integration Example
Complete retest workflow using JavaScript:Best Practices
- Date ranges: When querying verifications, use date ranges to limit results to specific time periods
- Production closures: Only set
inProd=truewhen you’ve verified the fix in production, not just development - Notes: Always include detailed notes when passing/failing verifications for audit trail
- Workflow integration: Integrate with ticketing systems (Jira, ServiceNow) using the API to automatically schedule retests when remediation tickets are closed
Error Responses
| Code | Message | Cause |
|---|---|---|
| 401 | Not Authorized | Invalid API key or insufficient permissions |
| 400 | Verification does not exist | Invalid verification ID |
| 400 | User does not exist | Invalid username in /userQueue |
