All Products
Search
Document Center

Compute Nest:ListArtifactRisks

Last Updated:Oct 23, 2025

Retrieves a list of security risks for an artifact.

Try it now

Try this API in OpenAPI Explorer, no manual signing needed. Successful calls auto-generate SDK code matching your parameters. Download it with built-in credential security for local usage.

Test

RAM authorization

The table below describes the authorization required to call this API. You can define it in a Resource Access Management (RAM) policy. The table's columns are detailed below:

  • Action: The actions can be used in the Action element of RAM permission policy statements to grant permissions to perform the operation.

  • API: The API that you can call to perform the action.

  • Access level: The predefined level of access granted for each API. Valid values: create, list, get, update, and delete.

  • Resource type: The type of the resource that supports authorization to perform the action. It indicates if the action supports resource-level permission. The specified resource must be compatible with the action. Otherwise, the policy will be ineffective.

    • For APIs with resource-level permissions, required resource types are marked with an asterisk (*). Specify the corresponding Alibaba Cloud Resource Name (ARN) in the Resource element of the policy.

    • For APIs without resource-level permissions, it is shown as All Resources. Use an asterisk (*) in the Resource element of the policy.

  • Condition key: The condition keys defined by the service. The key allows for granular control, applying to either actions alone or actions associated with specific resources. In addition to service-specific condition keys, Alibaba Cloud provides a set of common condition keys applicable across all RAM-supported services.

  • Dependent action: The dependent actions required to run the action. To complete the action, the RAM user or the RAM role must have the permissions to perform all dependent actions.

Action

Access level

Resource type

Condition key

Dependent action

computenestsupplier:ListArtifactRisks

list

*Artifact

acs:computenestsupplier:*:{#accountId}:artifact/{#ArtifactId}

None None

Request parameters

Parameter

Type

Required

Description

Example

ArtifactId

string

No

The artifact ID.

artifact-3fd95cdfdf0d4b1fa00c

ArtifactVersion

string

No

The artifact version.

1

Response elements

Element

Type

Description

Example

object

RequestId

string

The request ID.

52919DB1-03A0-55F5-BDD4-DB6DEBB8267A

ArtifactRiskList

array<object>

The list of artifact risks.

object

Level

string

The risk level.

  • high: High

high

RiskType

string

The risk type. Valid values:

  • AcrCve: system vulnerabilities in a container image

  • AcrSca: application vulnerabilities in a container image

  • EcsVulnerability: ECS image vulnerabilities

  • EcsAlarm: ECS image security alerts

  • EcsBaseline: ECS image baseline checks

AcrCve

RiskTypeName

string

The name of the risk type.

Container System Vulner

RiskName

string

The name of the risk.

USN-3686-1: file vulnerabilities

Solution

string

The solution to the risk.

apt-get update && apt-get install ntpdate --only-upgrade

CveNos

string

The CVE ID.

CVE-2023-4911

ExtendInfo

string

The extended information in JSON format. Parse this information based on the risk type.

{ "feature": "ntpdate", "version": "4.2.6", "cveLocation": "/usr/lib" }

Examples

Success response

JSON format

{
  "RequestId": "52919DB1-03A0-55F5-BDD4-DB6DEBB8267A",
  "ArtifactRiskList": [
    {
      "Level": "high",
      "RiskType": "AcrCve",
      "RiskTypeName": "Container System Vulner",
      "RiskName": "USN-3686-1: file vulnerabilities",
      "Solution": "apt-get update && apt-get install ntpdate --only-upgrade",
      "CveNos": "CVE-2023-4911",
      "ExtendInfo": "{\n  \"feature\": \"ntpdate\", \n  \"version\": \"4.2.6\", \n  \"cveLocation\": \"/usr/lib\" \n}"
    }
  ]
}

Error codes

See Error Codes for a complete list.

Release notes

See Release Notes for a complete list.