curl --request PATCH \
--url https://api.example.com/api/findings/{id}/status \
--header 'Content-Type: application/json' \
--data '
{
"status": "<string>",
"comment": "<string>"
}
'{
"success": true,
"data": {}
}Change the status of a finding (open, confirmed, dismissed, false_positive, fixed)
curl --request PATCH \
--url https://api.example.com/api/findings/{id}/status \
--header 'Content-Type: application/json' \
--data '
{
"status": "<string>",
"comment": "<string>"
}
'{
"success": true,
"data": {}
}Documentation Index
Fetch the complete documentation index at: https://mintlify.com/iamngoni/heimdall/llms.txt
Use this file to discover all available pages before exploring further.
Authorization: Bearer <token> header, orheimdall_session cookieopen - Finding is active and unresolvedconfirmed - Finding has been confirmed as a real vulnerabilitydismissed - Finding is being tracked but not prioritizedfalse_positive - Finding is not a real vulnerabilityfixed - Finding has been remediatedcurl -X PATCH https://heimdall.example.com/api/findings/01932e4a-7b2c-7890-abcd-1234567890ab/status \
-H "Authorization: Bearer <token>" \
-H "Content-Type: application/json" \
-d '{
"status": "confirmed",
"comment": "Verified the SQL injection vulnerability in production logs"
}'
true for successful updates{
"success": true,
"data": {
"id": "01932e4a-7b2c-7890-abcd-1234567890ab",
"scan_id": "01932e49-1234-7890-abcd-1234567890ab",
"title": "SQL Injection in login endpoint",
"status": "confirmed",
"severity": "critical",
"confidence": "high",
"source": "ai",
"file_path": "src/routes/auth.rs",
"line_start": 145,
"line_end": 152,
"description": "Unsanitized user input in SQL query...",
"updated_at": "2026-03-12T15:30:00Z"
}
}
400 Bad Request - Invalid status
{
"success": false,
"error": {
"code": 400,
"message": "Unsupported finding status: invalid_status"
}
}
404 Not Found
{
"success": false,
"error": {
"code": 404,
"message": "Finding '01932e4a-7b2c-7890-abcd-1234567890ab' not found"
}
}
500 Internal Server Error
{
"success": false,
"error": {
"code": 500,
"message": "Failed to update finding status"
}
}
status_change event in the finding’s audit trail, accessible via the Get Finding Events endpoint.