All Products
Search
Document Center

Security Center:GetAttackPathEventDetail

Last Updated:Nov 18, 2025
This topic is generated by a machine translation engine without any human intervention. ALIBABA CLOUD DOES NOT GUARANTEE THE ACCURACY OF MACHINE TRANSLATED CONTENT. To request a human-translated version of this topic or provide feedback on this translation, please include it in the feedback form.

Query Attack Path Event Details.

Debugging

You can run this interface directly in OpenAPI Explorer, saving you the trouble of calculating signatures. After running successfully, OpenAPI Explorer can automatically generate SDK code samples.

Authorization information

The following table shows the authorization information corresponding to the API. The authorization information can be used in the Action policy element to grant a RAM user or RAM role the permissions to call this API operation. Description:

  • Operation: the value that you can use in the Action element to specify the operation on a resource.
  • Access level: the access level of each operation. The levels are read, write, and list.
  • Resource type: the type of the resource on which you can authorize the RAM user or the RAM role to perform the operation. Take note of the following items:
    • For mandatory resource types, indicate with a prefix of * .
    • If the permissions cannot be granted at the resource level, All Resources is used in the Resource type column of the operation.
  • Condition Key: the condition key that is defined by the cloud service.
  • Associated operation: other operations that the RAM user or the RAM role must have permissions to perform to complete the operation. To complete the operation, the RAM user or the RAM role must have the permissions to perform the associated operations.
OperationAccess levelResource typeCondition keyAssociated operation
yundun-sas:GetAttackPathEventDetailget
*All Resources
*
    none
none

Request parameters

ParameterTypeRequiredDescriptionExample
EventIdlongNo

Event ID.

Note You can call ListAttackPathEvent to query the event ID.
123
LangstringNo

The language type for request and response, default is zh. Values:

  • zh: Chinese
  • en: English
en
EventSourcestringNo

数据来源。默认值为 default。取值:

  • caasm:攻击面
  • default:攻击路径
default

Response parameters

ParameterTypeDescriptionExample
object
RequestIdstring

The ID of this request, which is a unique identifier generated by Alibaba Cloud for the request, and can be used for troubleshooting and problem localization.

7BC55C8F-226E-5AF5-9A2C-2EC43864****
AttackPathEventobject

Details of the attack path event.

DstAssetobject

Destination asset.

AssetSubTypeinteger

Subtype of the cloud product asset.

2
AssetTypeinteger

Type of the cloud product asset.

3
InstanceIdstring

ID of the cloud product asset instance.

i-bp18ifsr1tu1dx39****
InstanceNamestring

Instance name.

test
RegionIdstring

ID of the region where the cloud product asset instance is located.

cn-shanghai
Vendorinteger

Vendor of the cloud product asset.

0
SensitiveAssetFlaginteger

Sensitive asset flag. Values:

  • 0: Non-sensitive asset.
  • 1: Sensitive asset.
0
FirstTimelong

Timestamp of the first occurrence, in milliseconds.

1735956726000
LastTimelong

Timestamp of the latest discovery, in milliseconds.

1741832168000
PathEventEdgeListarray<object>

List of path event edges.

PathEventEdgeobject

Path event edge.

EdgeIdlong

Edge ID.

123
EdgeTypestring

Edge type.

role_trust_user
ElementTypestring

Edge element type.

branch
EndNodeUuidstring

UUID of the end node of the edge.

52d59cca9d1768bab5fe081317637990
RepairSuggestionDisplaystring

Description of the repair suggestion.

The RAM role is granted the administrator permissions and trusts the user of another Alibaba Cloud account. In this case, the current Alibaba Cloud account may be fully controlled by the trusted Alibaba Cloud account. We recommend that you delete the trust relationship. If you need to trust another Alibaba Cloud account, we recommend that you split your business requirements and follow the principle of least privilege to grant permissions across accounts in a fine-grained manner. You can also use RAM.\n\nIf you confirm that the role does not need to trust an Alibaba Cloud account, perform the following operations: In the RAM console, click the required RAM role. On the page that appears, view the trust policy of the role. Then, edit the Service field to delete the trust relationship. If you confirm that permissions can be reduced, perform the following operations: In the RAM console, click the required RAM role. On the page that appears, view the permissions of the role. Then, find the policy that defines the administrator permissions and revoke the policy. Attach another policy to the role based on your business requirements.
StartNodeUuidstring

UUID of the start node of the edge.

b7e1bd42c4ca47f69020f4a27b47d2b4
PathEventNodeListarray<object>

List of path nodes.

PathEventNodeobject

Path node.

ElementTypestring

Node element type.

branch
NodeDetailstring

Details of the node.

{"assetId":0}
NodeNamestring

Name of the node.

hypermatch_uploader
NodeTypestring

Type of the node.

user
NodeUuidstring

UUID of the node.

52d59cca9d1768bab5fe081317637990
SensitiveAssetFlaginteger

Sensitive asset flag. Values:

  • 0: Non-sensitive asset.
  • 1: Sensitive asset.
0
AiAssetFlaginteger

AI 资产标识。取值:

  • 0:非 AI 资产。
  • 1:AI 资产。
1
PathNamestring

Name of the path.

ecs_get_credential_by_create_login_profile
PathNameDescstring

Description of the path name.

ECS Instance Can Obtain Long-term Access Credential by Enabling Console Logon for RAM User
PathTypestring

Type of the path.

role_escalation
RiskLevelstring

Risk level.

suspicious
SrcAssetobject

Source asset.

AssetSubTypeinteger

Subtype of the cloud product asset

4
AssetTypeinteger

The type of the cloud product asset.

14
InstanceIdstring

The ID of the cloud product asset instance.

i-25b24****
InstanceNamestring

The name of the instance.

test
RegionIdstring

The ID of the region where the cloud product asset instance is located.

cn-hangzhou
Vendorinteger

The vendor of the cloud product asset.

0
SensitiveAssetFlaginteger

Sensitive asset flag. Values:

  • 0: Non-sensitive asset.
  • 1: Sensitive asset.
0
PathTypeDescstring

Description of the path type.

Privilege Escalation by Role
PathDetailDescstring

Detailed description of the path.

The system detects that the role that trusts another Alibaba Cloud account has administrator permissions. This can cause the system to be fully controlled. We recommend that you delete the trust relationship and review the permissions of the role.

Examples

Sample success responses

JSONformat

{
  "RequestId": "7BC55C8F-226E-5AF5-9A2C-2EC43864****",
  "AttackPathEvent": {
    "DstAsset": {
      "AssetSubType": 2,
      "AssetType": 3,
      "InstanceId": "i-bp18ifsr1tu1dx39****\n",
      "InstanceName": "test",
      "RegionId": "cn-shanghai",
      "Vendor": 0,
      "SensitiveAssetFlag": 0
    },
    "FirstTime": 1735956726000,
    "LastTime": 1741832168000,
    "PathEventEdgeList": [
      {
        "EdgeId": 123,
        "EdgeType": "role_trust_user",
        "ElementType": "branch",
        "EndNodeUuid": "52d59cca9d1768bab5fe081317637990",
        "RepairSuggestionDisplay": "The RAM role is granted the administrator permissions and trusts the user of another Alibaba Cloud account. In this case, the current Alibaba Cloud account may be fully controlled by the trusted Alibaba Cloud account. We recommend that you delete the trust relationship. If you need to trust another Alibaba Cloud account, we recommend that you split your business requirements and follow the principle of least privilege to grant permissions across accounts in a fine-grained manner. You can also use RAM.\\n\\nIf you confirm that the role does not need to trust an Alibaba Cloud account, perform the following operations: In the RAM console, click the required RAM role. On the page that appears, view the trust policy of the role. Then, edit the Service field to delete the trust relationship. If you confirm that permissions can be reduced, perform the following operations: In the RAM console, click the required RAM role. On the page that appears, view the permissions of the role. Then, find the policy that defines the administrator permissions and revoke the policy. Attach another policy to the role based on your business requirements.",
        "StartNodeUuid": "b7e1bd42c4ca47f69020f4a27b47d2b4"
      }
    ],
    "PathEventNodeList": [
      {
        "ElementType": "branch",
        "NodeDetail": {
          "assetId": 0
        },
        "NodeName": "hypermatch_uploader",
        "NodeType": "user",
        "NodeUuid": "52d59cca9d1768bab5fe081317637990",
        "SensitiveAssetFlag": 0,
        "AiAssetFlag": 1
      }
    ],
    "PathName": "ecs_get_credential_by_create_login_profile",
    "PathNameDesc": "ECS Instance Can Obtain Long-term Access Credential by Enabling Console Logon for RAM User",
    "PathType": "role_escalation",
    "RiskLevel": "suspicious",
    "SrcAsset": {
      "AssetSubType": 4,
      "AssetType": 14,
      "InstanceId": "i-25b24****",
      "InstanceName": "test",
      "RegionId": "cn-hangzhou",
      "Vendor": 0,
      "SensitiveAssetFlag": 0
    },
    "PathTypeDesc": "Privilege Escalation by Role",
    "PathDetailDesc": "The system detects that the role that trusts another Alibaba Cloud account has administrator permissions. This can cause the system to be fully controlled. We recommend that you delete the trust relationship and review the permissions of the role.\n"
  }
}

Error codes

HTTP status codeError codeError messageDescription
403NoPermissioncaller has no permissionYou are not authorized to do this operation.
500ServerErrorServerError-

For a list of error codes, visit the Service error codes.

Change history

Change timeSummary of changesOperation
2025-11-06The Error code has changed. The request parameters of the API has changed. The response structure of the API has changedView Change Details