When to Use This Endpoint
Use this endpoint to:- Inventory cryptographic algorithms and keys.
- Identify weak or non-compliant cryptography (e.g., Post-Quantum Readiness).
Request
Endpoint| Parameter | Required | Description |
|---|---|---|
productId | ✅ | Product ID |
imageId | ✅ | Image ID |
format | ✅ | Report format: cycloneDX |
| Header | Value |
|---|---|
Authorization | Bearer <access_token> |