CycloneDX v1.7 Protobuf Reference

Table of Contents

Package: cyclonedx.v1_7

Top

Advisory

Title and location where advisory information can be obtained. An advisory is a notification of a threat to a component, service, or system.

FieldTypeLabelDescription
titlestringoptional

A name of the advisory.

urlstring

Location where the advisory can be obtained.

Annotation

FieldTypeLabelDescription
bom_refstringoptional

A identifier which can be used to reference the annotation elsewhere in the BOM. Every `bom_ref` must be unique within the BOM.

subjectsstringrepeated

The object in the BOM identified by its bom_ref. This is often a component or service but may be any object type supporting bom_refs.

annotatorAnnotatorChoice

The organization, person, component, or service which created the textual content of the annotation.

timestampgoogle.protobuf.Timestamp

The date and time (timestamp) when the annotation was created.

textstring

The textual content of the annotation.

AnnotatorChoice

FieldTypeLabelDescription
organizationOrganizationalEntity

The organization that created the annotation

individualOrganizationalContact

The person that created the annotation

componentComponent

The tool or component that created the annotation

serviceService

The service that created the annotation

Asserter

FieldTypeLabelDescription
organizationOrganizationalEntity

An organization

individualOrganizationalContact

An individual

refstring

A reference to a previously defined `organizationalContact` or `organizationalEntity` object in the BOM. The value must be a valid `bom_ref` pointing to one of these objects.

AttachedText

Specifies attributes of the text

FieldTypeLabelDescription
content_typestringoptional

Specifies the format and nature of the data being attached, helping systems correctly interpret and process the content. Common content type examples include `application/json` for JSON data and `text/plain` for plan text documents. [RFC 2045 section 5.1](https://www.ietf.org/rfc/rfc2045.html#section-5.1) outlines the structure and use of content types. For a comprehensive list of registered content types, refer to the [IANA media types registry](https://www.iana.org/assignments/media-types/media-types.xhtml).

encodingstringoptional

Specifies the encoding the text is represented in

valuestring

SimpleContent value of element. Proactive controls such as input validation and sanitization should be employed to prevent misuse of attachment text.

Bom

FieldTypeLabelDescription
spec_versionstring

The version of the CycloneDX specification a BOM is written to (starting at version 1.3)

versionint32optional

The version allows component publishers/authors to make changes to existing BOMs to update various aspects of the document such as description or licenses. When a system is presented with multiple BOMs for the same component, the system should use the most recent version of the BOM. The default version is '1' and should be incremented for each version of the BOM that is published. Each version of a component should have a unique BOM and if no changes are made to the BOMs, then each BOM will have a version of '1'.

serial_numberstringoptional

Every BOM generated should have a unique serial number, even if the contents of the BOM being generated have not changed over time. The process or tool responsible for creating the BOM should create random UUID's for every BOM generated.

metadataMetadataoptional

Provides additional information about a BOM.

componentsComponentrepeated

Provides the ability to document a list of components.

servicesServicerepeated

Provides the ability to document a list of external services.

external_referencesExternalReferencerepeated

Provides the ability to document external references related to the BOM or to the project the BOM describes.

dependenciesDependencyrepeated

Provides the ability to document dependency relationships.

compositionsCompositionrepeated

Compositions describe constituent parts (including components, services, and dependency relationships) and their completeness. The completeness of vulnerabilities expressed in a BOM may also be described.

vulnerabilitiesVulnerabilityrepeated

Vulnerabilities identified in components or services.

annotationsAnnotationrepeated

Comments made by people, organizations, or tools about any object with a bom_ref, such as components, services, vulnerabilities, or the BOM itself. Unlike inventory information, annotations may contain opinion or commentary from various stakeholders.

propertiesPropertyrepeated

Specifies custom properties.

formulationFormularepeated

Describes the formulation of any referencable object within the BOM, including components, services, metadata, declarations, or the BOM itself. This may encompass how the object was created, assembled, deployed, tested, certified, or otherwise brought into its present form. Common examples include software build pipelines, deployment processes, AI/ML model training, cryptographic key generation or certification, and third-party audits. Processes are modeled using declared and observed formulas, composed of workflows, tasks, and individual steps.

declarationsDeclarationsrepeated

The list of declarations which describe the conformance to standards. Each declaration may include attestations, claims, and evidence.

definitionsDefinitionrepeated

A collection of reusable objects that are defined and may be used elsewhere in the BOM.

citationsCitationrepeated

A collection of attributions indicating which entity supplied information for specific fields within the BOM.

CO2MeasureType

A measure of carbon dioxide (CO2).

FieldTypeLabelDescription
valuefloat

Quantity of carbon dioxide (CO2).

unitCO2MeasureType.CO2MeasureUnitType

Unit of carbon dioxide (CO2).

Callstack

FieldTypeLabelDescription
framesCallstack.Framesrepeated

Within a call stack, a frame is a discrete unit that encapsulates an execution context, including local variables, parameters, and the return address. As function calls are made, frames are pushed onto the stack, forming an array-like structure that orchestrates the flow of program execution and manages the sequence of function invocations.

Callstack.Frames

FieldTypeLabelDescription
packagestringoptional

A package organizes modules into namespaces, providing a unique namespace for each type it contains.

modulestring

A module or class that encloses functions/methods and other code.

functionstringoptional

A block of code designed to perform a particular task.

parametersstringrepeated

Arguments that are passed to the module or function.

lineint32optional

The line number the code that is called resides on.

columnint32optional

The column the code that is called resides.

fullFilenamestringoptional

The full path and filename of the module.

Citation

Details a specific attribution of data within the BOM to a contributing entity or process.

FieldTypeLabelDescription
bom_refstringoptional

Unique identifier for the citation.

pointersCitation.Pointers

One or more JSON Pointers(https://datatracker.ietf.org/doc/html/rfc6901) identifying the BOM fields to which the attribution applies.

expressionsCitation.Expressions

One or more path expressions used to locate values within a BOM.

timestampgoogle.protobuf.Timestamp

Timestamp when the attribution was made or the information was supplied.

attributed_tostringoptional

The `bom_ref` of an object, such as a component, service, tool, organisational entity, or person that supplied the cited information. At least one of the "attributed_to" or "process" elements must be present.

processstringoptional

The `bom_ref` to a process (such as a formula, workflow, task, or step) defined in the `formulation` section that executed or generated the attributed data. At least one of the "attributed_to" or "process" elements must be present.

notestringoptional

A description or comment about the context or quality of the data attribution.

Citation.Expressions

FieldTypeLabelDescription
expressionstringrepeated

Specifies a path expression used to locate a value within a BOM. The expression syntax shall conform to the format of the BOM's serialisation. Use [JSONPath](https://datatracker.ietf.org/doc/html/rfc9535) for JSON, [XPath](https://www.w3.org/TR/xpath/) for XML, and default to JSONPath for Protocol Buffers unless otherwise specified. Implementers shall ensure the expression is valid within the context of the applicable serialisation format. Use either "pointer" or "expression" but not both in this object. Must contain at least 1 item.

Citation.Pointers

FieldTypeLabelDescription
pointerstringrepeated

Users of other serialisation formats (e.g. XML) shall use the JSON Pointer format to ensure consistent field referencing across representations. Must contain at least 1 item.

Command

FieldTypeLabelDescription
executedstringoptional

A text representation of the executed command.

propertiesPropertyrepeated

Domain-specific command properties.

Commit

FieldTypeLabelDescription
uidstringoptional

A unique identifier of the commit. This may be version control specific. For example, Subversion uses revision numbers whereas git uses commit hashes.

urlstringoptional

The URL to the commit. This URL will typically point to a commit in a version control system.

authorIdentifiableActionoptional

The author who created the changes in the commit

committerIdentifiableActionoptional

The person who committed or pushed the commit

messagestringoptional

The text description of the contents of the commit

Component

FieldTypeLabelDescription
typeClassification

Specifies the type of component. For software components, classify as an application if no more specific appropriate classification is available or cannot be determined for the component.

mime_typestringoptional

The mime-type of the component. When used on file components, the mime-type can provide additional context about the kind of file being represented, such as an image, font, or executable. Some library or framework components may also have an associated mime-type.

bom_refstringoptional

A identifier which can be used to reference the component elsewhere in the BOM. Uniqueness is enforced within all elements and children of the root-level bom element.

supplierOrganizationalEntityoptional

The organization that supplied the component. The supplier may often be the manufacturer but may also be a distributor or repackager.

authorstringoptional

Deprecated. DEPRECATED - DO NOT USE - This will be removed in a future version - Use `.authors` or `.manufacturer` instead. The person(s) or organization(s) that authored the component

publisherstringoptional

The person(s) or organization(s) that published the component

groupstringoptional

The grouping name or identifier. This will often be a shortened, single name of the company or project that produced the component or the source package or domain name. Whitespace and special characters should be avoided. Examples include: apache, org.apache.commons, and apache.org.

namestring

The name of the component. This will often be a shortened, single name of the component. Examples: commons-lang3 and jquery

versionstring

The component version. The version should ideally comply with semantic versioning but is not enforced. Version was made optional in v1.4 of the spec. For backward compatibility, it is recommended to use an empty string to represent components without version information. Must be used exclusively, either 'version' or 'versionRange', but not both.

versionRangestringoptional

For an external component, this specifies the accepted version range. The value must adhere to the Package URL Version Range syntax (vers), as defined at https://github.com/package-url/vers-spec. May only be used if `isExternal` is set to `true`. Must be used exclusively, either 'version' or 'versionRange', but not both.

descriptionstringoptional

Specifies a description for the component

scopeScopeoptional

Specifies the scope of the component. If a scope is not specified, SCOPE_REQUIRED scope should be assumed by the consumer of the BOM

hashesHashrepeated

The hashes of the component.

licensesLicenseChoicerepeated

A list of SPDX licenses and/or named licenses and/or SPDX License Expression.

copyrightstringoptional

An copyright notice informing users of the underlying claims to copyright ownership in a published work.

cpestringoptional

DEPRECATED - DO NOT USE. This will be removed in a future version. Specifies a well-formed CPE name. See https://nvd.nist.gov/products/cpe

purlstringoptional

Specifies the package-url (PURL). The purl, if specified, must be valid and conform to the specification defined at: https://github.com/package-url/purl-spec

swidSwidoptional

Specifies metadata and content for ISO-IEC 19770-2 Software Identification (SWID) Tags.

modifiedbooloptional

DEPRECATED - DO NOT USE. This will be removed in a future version. Use the pedigree element instead to supply information on exactly how the component was modified. A boolean value indicating is the component has been modified from the original. A value of true indicates the component is a derivative of the original. A value of false indicates the component has not been modified from the original.

pedigreePedigreeoptional

Component pedigree is a way to document complex supply chain scenarios where components are created, distributed, modified, redistributed, combined with other components, etc.

external_referencesExternalReferencerepeated

Provides the ability to document external references related to the component or to the project the component describes.

componentsComponentrepeated

Specifies sub-components. This is not a dependency tree. It provides a way to specify a hierarchical representation of component assemblies, similar to system -> subsystem -> parts assembly in physical supply chains.

propertiesPropertyrepeated

Specifies custom properties.

evidenceEvidenceoptional

Specifies license and copyright evidence.

releaseNotesReleaseNotesoptional

Specifies release notes.

modelCardModelCardoptional

A model card describes the intended uses of a machine learning model, potential limitations, biases, ethical considerations, training parameters, datasets used to train the model, performance metrics, and other relevant data useful for ML transparency.

dataComponentDatarepeated

This object SHOULD be specified for any component of type `data` and must not be specified for other component types.

cryptoPropertiesCryptoPropertiesoptional

Cryptographic assets have properties that uniquely define them and that make them actionable for further reasoning. As an example, it makes a difference if one knows the algorithm family (e.g. AES) or the specific variant or instantiation (e.g. AES-128-GCM). This is because the security level and the algorithm primitive (authenticated encryption) is only defined by the definition of the algorithm variant. The presence of a weak cryptographic algorithm like SHA1 vs. HMAC-SHA1 also makes a difference.

manufacturerOrganizationalEntityoptional

The organization that created the component. Manufacturer is common in components created through automated processes. Components created through manual means may have `.authors` instead.

authorsOrganizationalContactrepeated

The person(s) who created the component. Authors are common in components created through manual processes. Components created through automated means may have `.manufacturer` instead.

tagsstringrepeated

Textual strings that aid in discovery, search, and retrieval of the associated object. Tags often serve as a way to group or categorize similar or related objects by various attributes. Examples include "json-parser", "object-persistence", "text-to-image", "translation", and "object-detection".

omniborIdstringrepeated

Specifies the OmniBOR Artifact ID. The OmniBOR, if specified, must be valid and conform to the specification defined at: https://www.iana.org/assignments/uri-schemes/prov/gitoid

swhidstringrepeated

Specifies the Software Heritage persistent identifier (SWHID). The SWHID, if specified, must be valid and conform to the specification defined at: https://docs.softwareheritage.org/devel/swh-model/persistent-identifiers.html

isExternalbooloptional

Determine whether this component is external. An external component is one that is not part of an assembly, but is expected to be provided by the environment, regardless of the component's `scope`. This setting can be useful for distinguishing which components are bundled with the product and which can be relied upon to be present in the deployment environment. This may be set to `true` for runtime components only. For `Bom.metadata.component`, it must be set to `false`. implicit defaults to `false`

patent_assertionsPatentAssertionrepeated

A list of assertions made regarding patents associated with this component or service. Assertions distinguish between ownership, licensing, and other relevant interactions with patents.

Fields with deprecated option

NameOption
author

true

ComponentData

FieldTypeLabelDescription
bom_refstringoptional

A identifier which can be used to reference the dataset elsewhere in the BOM. Every `bom_ref` must be unique within the BOM.

typeComponentDataType

The general theme or subject matter of the data being specified.

namestringoptional

The name of the dataset.

contentsComponentData.ComponentDataContentsoptional

The contents or references to the contents of the data being described.

classificationstringoptional

Data classification tags data according to its type, sensitivity, and value if altered, stolen, or destroyed.

sensitiveDatastringrepeated

A description of any sensitive data in a dataset.

graphicsGraphicsCollectionoptional

A collection of graphics that represent various measurements.

descriptionstringoptional

A description of the dataset. Can describe size of dataset, whether it's used for source code, training, testing, or validation, etc.

governanceDataGovernanceoptional

Data Governance

ComponentData.ComponentDataContents

FieldTypeLabelDescription
attachmentAttachedTextoptional

A way to include textual or encoded data.

urlstringoptional

The URL to where the data can be retrieved.

propertiesPropertyrepeated

Provides the ability to document name-value parameters used for configuration.

Composition

FieldTypeLabelDescription
aggregateAggregate

Indicates the aggregate completeness

assembliesstringrepeated

The assemblies the aggregate completeness applies to

dependenciesstringrepeated

The dependencies the aggregate completeness applies to

vulnerabilitiesstringrepeated

The bom_ref identifiers of the vulnerabilities being described.

bom_refstringoptional

A identifier which can be used to reference the composition elsewhere in the BOM. Every `bom_ref` must be unique within the BOM.

Condition

A condition that was used to determine a trigger should be activated.

FieldTypeLabelDescription
descriptionstringoptional

Describes the set of conditions which cause the trigger to activate.

expressionstringoptional

The logical expression that was evaluated that determined the trigger should be fired.

propertiesPropertyrepeated

Domain-specific condition instance properties.

CryptoProperties

"Cryptographic Properties

FieldTypeLabelDescription
assetTypeCryptoProperties.CryptoAssetType

Cryptographic assets occur in several forms. Algorithms and protocols are most commonly implemented in specialized cryptographic libraries. They may, however, also be 'hardcoded' in software components. Certificates and related cryptographic material like keys, tokens, secrets or passwords are other cryptographic assets to be modelled.

algorithmPropertiesCryptoProperties.AlgorithmPropertiesoptional

Additional properties specific to a cryptographic algorithm.

certificatePropertiesCryptoProperties.CertificatePropertiesoptional

Properties for cryptographic assets of asset type 'certificate'

relatedCryptoMaterialPropertiesCryptoProperties.RelatedCryptoMaterialPropertiesoptional

Properties for cryptographic assets of asset type: `related-crypto-material`

protocolPropertiesCryptoProperties.ProtocolPropertiesoptional

Properties specific to cryptographic assets of type: `protocol`.

oidstringoptional

The object identifier (OID) of the cryptographic asset.

CryptoProperties.AlgorithmProperties

Algorithm Propertie

FieldTypeLabelDescription
primitiveCryptoProperties.AlgorithmProperties.CryptoPrimitiveoptional

Cryptographic building blocks used in higher-level cryptographic systems and protocols. Primitives represent different cryptographic routines: deterministic random bit generators (drbg, e.g. CTR_DRBG from NIST SP800-90A-r1), message authentication codes (mac, e.g. HMAC-SHA-256), blockciphers (e.g. AES), streamciphers (e.g. Salsa20), signatures (e.g. ECDSA), hash functions (e.g. SHA-256), public-key encryption schemes (pke, e.g. RSA), extended output functions (xof, e.g. SHAKE256), key derivation functions (e.g. pbkdf2), key agreement algorithms (e.g. ECDH), key encapsulation mechanisms (e.g. ML-KEM), authenticated encryption (ae, e.g. AES-GCM) and the combination of multiple algorithms (combiner, e.g. SP800-56Cr2).

algorithmFamilystringoptional

A valid algorithm family identifier. If specified, this value must be one of the enumeration of valid algorithm Family identifiers defined in the `cryptography-defs.schema.json` subschema. A corresponding schema for ProtoBuf is not available.

parameterSetIdentifierstringoptional

An identifier for the parameter set of the cryptographic algorithm. Examples: in AES128, '128' identifies the key length in bits, in SHA256, '256' identifies the digest length, '128' in SHAKE128 identifies its maximum security level in bits, and 'SHA2-128s' identifies a parameter set used in SLH-DSA (FIPS205).

curvestringoptional

Deprecated. DEPRECATED - DO NOT USE - This will be removed in a future version - Use `.ellipticCurve` instead. The specific underlying Elliptic Curve (EC) definition employed which is an indicator of the level of security strength, performance and complexity. Absent an authoritative source of curve names, CycloneDX recommends use of curve names as defined at [https://neuromancer.sk/std/](https://neuromancer.sk/std/), the source from which can be found at [https://github.com/J08nY/std-curves](https://github.com/J08nY/std-curves).

ellipticCurvestringoptional

The specific underlying Elliptic Curve (EC) definition employed which is an indicator of the level of security strength, performance and complexity. If specified, this value must be one of the enumeration of valid elliptic curves identifiers defined in the `cryptography-defs.schema.json` subschema. A corresponding schema for ProtoBuf is not available.

executionEnvironmentCryptoProperties.AlgorithmProperties.CryptoExecutionEnvironmentoptional

The target and execution environment in which the algorithm is implemented in.

implementationPlatformCryptoProperties.AlgorithmProperties.CryptoImplementationPlatformoptional

The target platform for which the algorithm is implemented. The implementation can be 'generic', running on any platform or for a specific platform.

certificationLevelstringrepeated

The certification that the implementation of the cryptographic algorithm has received, if any. Certifications include revisions and levels of FIPS 140 or Common Criteria of different Extended Assurance Levels (CC-EAL).

modeCryptoProperties.AlgorithmProperties.CryptoAlgorithmModeoptional

The mode of operation in which the cryptographic algorithm (block cipher) is used.

paddingCryptoProperties.AlgorithmProperties.CryptoAlgorithmPaddingoptional

The padding scheme that is used for the cryptographic algorithm.

cryptoFunctionsCryptoProperties.AlgorithmProperties.CryptoAlgorithmFunctionrepeated

The cryptographic functions implemented by the cryptographic algorithm.

classicalSecurityLevelint32optional

The classical security level that a cryptographic algorithm provides (in bits).

nistQuantumSecurityLevelint32optional

The NIST security strength category as defined in https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization/evaluation-criteria/security-(evaluation-criteria). A value of 0 indicates that none of the categories are met.

Fields with deprecated option

NameOption
curve

true

CryptoProperties.CertificateExtensions

Certificate Extensions

FieldTypeLabelDescription
extensionsCryptoProperties.CertificateExtensions.Extensionrepeated

List of certificate extensions

CryptoProperties.CertificateExtensions.CommonExtension

Common extension with predefined name

FieldTypeLabelDescription
nameCryptoProperties.CertificateExtensions.CommonExtensionName

The name of the extension

valuestring

The value of the certificate extension

CryptoProperties.CertificateExtensions.CustomExtension

Custom extension with user-defined name

FieldTypeLabelDescription
namestring

The name for the custom certificate extension

valuestringoptional

The description of the custom certificate extension

CryptoProperties.CertificateExtensions.Extension

Extension represents either a common extension or a custom extension

FieldTypeLabelDescription
commonExtensionCryptoProperties.CertificateExtensions.CommonExtension

Common extension with predefined name

customExtensionCryptoProperties.CertificateExtensions.CustomExtension

Custom extension with user-defined name

CryptoProperties.CertificateProperties

Certificate Properties

FieldTypeLabelDescription
serialNumberstringoptional

The serial number is a unique identifier for the certificate issued by a CA.

subjectNamestringoptional

The subject name for the certificate

issuerNamestringoptional

The issuer name for the certificate

notValidBeforegoogle.protobuf.Timestampoptional

The date and time according to ISO-8601 standard from which the certificate is valid

notValidAftergoogle.protobuf.Timestampoptional

The date and time according to ISO-8601 standard from which the certificate is not valid anymore

signatureAlgorithmRefstringoptional

Deprecated. DEPRECATED - DO NOT USE - This will be removed in a future version - Use `.relatedCryptographicAssets` instead. The bom-ref to signature algorithm used by the certificate

subjectPublicKeyRefstringoptional

Deprecated. DEPRECATED - DO NOT USE - This will be removed in a future version - Use `.relatedCryptographicAssets` instead. The bom-ref to the public key of the subject

certificateFormatstringoptional

The format of the certificate. Examples include X.509, PEM, DER, and CVC.

certificateExtensionstringoptional

Deprecated. DEPRECATED - DO NOT USE - This will be removed in a future version - Use `.certificateFileExtension` instead. The file extension of the certificate. Examples include crt, pem, cer, der, and p12.

certificateFileExtensionstringoptional

The file extension of the certificate. Examples include crt, pem, cer, der, and p12.

fingerprintHashoptional

The fingerprint is a cryptographic hash of the certificate excluding it's signature.

certificateStateCryptoProperties.CertificateStaterepeated

The certificate lifecycle is a comprehensive process that manages digital certificates from their initial creation to eventual expiration or revocation. It typically involves several stages.

creationDategoogle.protobuf.Timestampoptional

The date and time (timestamp) when the certificate was created or pre-activated.

activationDategoogle.protobuf.Timestampoptional

The date and time (timestamp) when the certificate was activated.

deactivationDategoogle.protobuf.Timestampoptional

The date and time (timestamp) when the related certificate was deactivated.

revocationDategoogle.protobuf.Timestampoptional

The date and time (timestamp) when the certificate was revoked.

destructionDategoogle.protobuf.Timestampoptional

The date and time (timestamp) when the certificate was destroyed.

certificateExtensionsCryptoProperties.CertificateExtensionsoptional

A certificate extension is a field that provides additional information about the certificate or its use. Extensions are used to convey additional information beyond the standard fields.

relatedCryptographicAssetsCryptoProperties.RelatedCryptographicAssetsoptional

A list of cryptographic assets related to this component.

Fields with deprecated option

NameOption
signatureAlgorithmRef

true

subjectPublicKeyRef

true

certificateExtension

true

CryptoProperties.CertificateState

Certificate State

FieldTypeLabelDescription
reasonstringoptional

A reason for the certificate being in this state.

predefined_stateCryptoProperties.CertificateState.PredefinedState

A pre-defined state in the certificate lifecycle.

namestring

The name of the certificate lifecycle state for custom states.

descriptionstringoptional

The description of the certificate lifecycle state (only used with custom states).

CryptoProperties.ProtocolProperties

Protocol Properties

FieldTypeLabelDescription
typeCryptoProperties.ProtocolProperties.CryptoProtocolTypeoptional

The concrete protocol type.

versionstringoptional

The version of the protocol. Examples include 1.0, 1.2, and 1.99.

cipherSuitesCryptoProperties.ProtocolProperties.CryptoProtocolCipherSuiterepeated

A list of cipher suites related to the protocol.

ikev2TransformTypesCryptoProperties.ProtocolProperties.Ikev2TransformTypesoptional

Deprecated. DEPRECATED - DO NOT USE - This will be removed in a future version - Use `.ikev2TransformTypesDetailed` instead. The IKEv2 transform types supported (types 1-4), defined in RFC7296 section 3.3.2, and additional properties.

ikev2TransformTypesDetailedCryptoProperties.ProtocolProperties.Ikev2TransformTypesDetailedoptional

The IKEv2 transform types supported (types 1-4), defined in RFC7296 section 3.3.2, and additional properties. If this field is present, the deprecated field `.ikev2TransformTypes` MUST be ignored.

cryptoRefstringrepeated

The bom-ref(s) to protocol-related cryptographic assets

relatedCryptographicAssetsCryptoProperties.RelatedCryptographicAssetsoptional

A list of cryptographic assets related to this component.

Fields with deprecated option

NameOption
ikev2TransformTypes

true

CryptoProperties.ProtocolProperties.CryptoProtocolCipherSuite

Object representing a cipher suite

FieldTypeLabelDescription
namestringoptional

A common name for the cipher suite. For example: TLS_DHE_RSA_WITH_AES_128_CCM

algorithmsstringrepeated

A list of algorithms related to the cipher suite. Use the bom_ref to the algorithm cryptographic asset.

identifiersstringrepeated

A list of common identifiers for the cipher suite. For example: 0xC0 and 0x9E

tlsGroupsstringrepeated

A list of TLS named groups (formerly known as curves) for this cipher suite. These groups define the parameters for key exchange algorithms like ECDHE.

tlsSignatureSchemesstringrepeated

A list of signature schemes supported for cipher suite. These schemes specify the algorithms used for digital signatures in TLS handshakes and certificate verification.

CryptoProperties.ProtocolProperties.Ikev2TransformTypes

DEPRECATED - DO NOT USE - This will be removed in a future version.

IKEv2 Transform Types

FieldTypeLabelDescription
encrstringrepeated

Transform Type 1: encryption algorithms

prfstringrepeated

Transform Type 2: pseudorandom functions

integstringrepeated

Transform Type 3: integrity algorithms

kestringrepeated

Transform Type 4: Key Exchange Method (KE) per RFC9370, formerly called Diffie-Hellman Group (D-H)

esnbooloptional

Specifies if an Extended Sequence Number (ESN) is used.

authstringrepeated

IKEv2 Authentication method

CryptoProperties.ProtocolProperties.Ikev2TransformTypesDetailed

IKEv2 Transform Types Detailed

FieldTypeLabelDescription
encrCryptoProperties.ProtocolProperties.Ikev2TransformTypesDetailed.Encrrepeated

Transform Type 1: encryption algorithms

prfCryptoProperties.ProtocolProperties.Ikev2TransformTypesDetailed.Prfrepeated

Transform Type 2: pseudorandom functions

integCryptoProperties.ProtocolProperties.Ikev2TransformTypesDetailed.Integrepeated

Transform Type 3: integrity algorithms

keCryptoProperties.ProtocolProperties.Ikev2TransformTypesDetailed.Kerepeated

Transform Type 4: Key Exchange Method (KE) per RFC9370, formerly called Diffie-Hellman Group (D-H)

esnbooloptional

Specifies if an Extended Sequence Number (ESN) is used.

authCryptoProperties.ProtocolProperties.Ikev2TransformTypesDetailed.Authrepeated

IKEv2 Authentication method

CryptoProperties.ProtocolProperties.Ikev2TransformTypesDetailed.Auth

IKEv2 Authentication method

FieldTypeLabelDescription
namestringoptional

A name for the authentication method

algorithmstringoptional

The bom-ref to algorithm cryptographic asset

CryptoProperties.ProtocolProperties.Ikev2TransformTypesDetailed.Encr

IKEv2 Encryption Algorithm (ENCR)

FieldTypeLabelDescription
namestringoptional

A name for the encryption method

keyLengthint32optional

The key length of the encryption algorithm

algorithmstringoptional

The bom-ref to algorithm cryptographic asset

CryptoProperties.ProtocolProperties.Ikev2TransformTypesDetailed.Integ

IKEv2 Integrity Algorithm (INTEG)

FieldTypeLabelDescription
namestringoptional

A name for the integrity algorithm

algorithmstringoptional

The bom-ref to algorithm cryptographic asset

CryptoProperties.ProtocolProperties.Ikev2TransformTypesDetailed.Ke

IKEv2 Key Exchange Method (KE)

FieldTypeLabelDescription
groupint32optional

A group identifier for the key exchange algorithm

algorithmstringoptional

The bom-ref to algorithm cryptographic asset

CryptoProperties.ProtocolProperties.Ikev2TransformTypesDetailed.Prf

IKEv2 Pseudorandom Function (PRF)

FieldTypeLabelDescription
namestringoptional

A name for the pseudorandom function

algorithmstringoptional

The bom-ref to algorithm cryptographic asset

CryptoProperties.RelatedCryptoMaterialProperties

Related Cryptographic Material Properties

FieldTypeLabelDescription
typeCryptoProperties.RelatedCryptoMaterialProperties.CryptoRelatedTypeoptional

The type for the related cryptographic material

idstringoptional

The unique identifier for the related cryptographic material.

stateCryptoProperties.RelatedCryptoMaterialProperties.CryptoRelatedStateoptional

The key state as defined by NIST SP 800-57.

algorithmRefstringoptional

Deprecated. DEPRECATED - DO NOT USE - This will be removed in a future version - Use `.relatedCryptographicAssets` instead. The bom-ref to the algorithm used to generate the related cryptographic material.

creationDategoogle.protobuf.Timestampoptional

The date and time (timestamp) when the related cryptographic material was created.

activationDategoogle.protobuf.Timestampoptional

The date and time (timestamp) when the related cryptographic material was activated.

updateDategoogle.protobuf.Timestampoptional

The date and time (timestamp) when the related cryptographic material was updated.

expirationDategoogle.protobuf.Timestampoptional

The date and time (timestamp) when the related cryptographic material expires.

valuestringoptional

The associated value of the cryptographic material.

sizeint64optional

The size of the cryptographic asset (in bits).

formatstringoptional

The format of the related cryptographic material (e.g. P8, PEM, DER).

securedByCryptoProperties.RelatedCryptoMaterialProperties.CryptoRelatedSecuredByoptional

The mechanism by which the cryptographic asset is secured.

fingerprintHashoptional

The fingerprint is a cryptographic hash of the asset.

relatedCryptographicAssetsCryptoProperties.RelatedCryptographicAssetsoptional

A list of cryptographic assets related to this component.

Fields with deprecated option

NameOption
algorithmRef

true

CryptoProperties.RelatedCryptoMaterialProperties.CryptoRelatedSecuredBy

Secured By

FieldTypeLabelDescription
mechanismstringoptional

Specifies the mechanism by which the cryptographic asset is secured. Examples include HSM, TPM, SGX, Software, and None

algorithmRefstringoptional

The bom_ref to the algorithm.

CryptoProperties.RelatedCryptographicAssets

Related Cryptographic Assets

FieldTypeLabelDescription
assetsCryptoProperties.RelatedCryptographicAssets.RelatedCryptographicAssetrepeated

List of related cryptographic assets

CryptoProperties.RelatedCryptographicAssets.RelatedCryptographicAsset

Related Cryptographic Asset

FieldTypeLabelDescription
typestring

The type of the related cryptographic asset

refstring

The reference to the related cryptographic asset

DataFlow

Specifies the data flow.

FieldTypeLabelDescription
flowDataFlowDirection

Specifies the flow direction of the data.

valuestring

Data classification tags data according to its type, sensitivity, and value if altered, stolen, or destroyed.

namestringoptional

Name for the defined data

descriptionstringoptional

Short description of the data content and usage

sourcestringrepeated

The URI, URL, or BOM-Link of the components or services the data came in from

destinationstringrepeated

The URI, URL, or BOM-Link of the components or services the data is sent to

governanceDataGovernanceoptional

Data Governance

DataGovernance

Data governance captures information regarding data ownership, stewardship, and custodianship, providing insights into the individuals or entities responsible for managing, overseeing, and safeguarding the data throughout its lifecycle.

FieldTypeLabelDescription
custodiansDataGovernance.DataGovernanceResponsiblePartyrepeated

Data custodians are responsible for the safe custody, transport, and storage of data.

stewardsDataGovernance.DataGovernanceResponsiblePartyrepeated

Data stewards are responsible for data content, context, and associated business rules.

ownersDataGovernance.DataGovernanceResponsiblePartyrepeated

Data owners are concerned with risk and appropriate access to data.

DataGovernance.DataGovernanceResponsibleParty

FieldTypeLabelDescription
organizationOrganizationalEntity

The organization that is responsible for specific data governance role(s).

contactOrganizationalContact

The individual that is responsible for specific data governance role(s).

Declarations

The list of declarations which describe the conformance to standards. Each declaration may include attestations, claims, and evidence.

FieldTypeLabelDescription
assessorsDeclarations.Assessorrepeated

The list of assessors evaluating claims and determining conformance to requirements and confidence in that assessment.

attestationsDeclarations.Attestationrepeated

The list of attestations asserted by an assessor that maps requirements to claims.

claimsDeclarations.Claimrepeated

The list of claims.

evidenceDeclarations.Evidencerepeated

The list of evidence

targetsDeclarations.Targetsoptional

The list of targets which claims are made against.

affirmationDeclarations.Affirmationoptional

A concise statement affirmed by an individual regarding all declarations, often used for third-party auditor acceptance or recipient acknowledgment. It includes a list of authorized signatories who assert the validity of the document on behalf of the organization.

Declarations.Affirmation

FieldTypeLabelDescription
statementstringoptional

The brief statement affirmed by an individual regarding all declarations. Notes: This could be an affirmation of acceptance by a third-party auditor or receiving individual of a file. Example: "I certify, to the best of my knowledge, that all information is correct."

signatoriesDeclarations.Affirmation.Signatoryrepeated

The list of signatories authorized on behalf of an organization to assert validity of this document.

Declarations.Affirmation.Signatory

FieldTypeLabelDescription
namestringoptional

The signatory's name.

rolestringoptional

The signatory's role within an organization.

organizationOrganizationalEntityoptional

The signatory's organization.

externalReferenceExternalReferenceoptional

An External reference provides a way to document systems, sites, and information that may be relevant but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

Declarations.Assessor

FieldTypeLabelDescription
bom_refstringoptional

A identifier which can be used to reference the component elsewhere in the BOM. Uniqueness is enforced within all elements and children of the root-level bom element.

thirdPartybooloptional

The boolean indicating if the assessor is outside the organization generating claims. A value of false indicates a self assessor.

organizationOrganizationalEntityoptional

The entity issuing the assessment.

Declarations.Attestation

Attestation

FieldTypeLabelDescription
summarystringoptional

The short description explaining the main points of the attestation.

assessorstringoptional

The `bom_ref` to the assessor asserting the attestation.

mapDeclarations.Attestation.AttestationMaprepeated

The grouping of requirements to claims and the attestors' declared conformance and confidence thereof.

Declarations.Attestation.AttestationMap

Map

FieldTypeLabelDescription
requirementstringoptional

The `bom_ref` to the requirement being attested to.

claimsstringrepeated

The list of `bom_ref` to the claims being attested to.

counterClaimsstringrepeated

The list of `bom_ref` to the counter claims being attested to.

conformanceDeclarations.Attestation.AttestationMap.AttestationConformanceoptional

The conformance of the claim meeting a requirement.

confidenceDeclarations.Attestation.AttestationMap.AttestationConfidenceoptional

The confidence of the claim meeting the requirement.

Declarations.Attestation.AttestationMap.AttestationConfidence

Confidence

FieldTypeLabelDescription
scoredoubleoptional

The confidence of the claim between and inclusive of 0 and 1, where 1 is 100% confidence.

rationalestringoptional

The rationale for the confidence score.

Declarations.Attestation.AttestationMap.AttestationConformance

Conformance

FieldTypeLabelDescription
scoredoubleoptional

The conformance of the claim between and inclusive of 0 and 1, where 1 is 100% conformance.

rationalestringoptional

The rationale for the conformance score.

mitigationStrategiesstringrepeated

The list of `bom_ref` to the evidence provided describing the mitigation strategies.

Declarations.Claim

FieldTypeLabelDescription
bom_refstringoptional

A identifier which can be used to reference the component elsewhere in the BOM. Uniqueness is enforced within all elements and children of the root-level bom element.

targetstringoptional

The `bom_ref` to a target representing a specific system, application, API, module, team, person, process, business unit, company, etc... that this claim is being applied to.

predicatestringoptional

The specific statement or assertion about the target.

mitigationStrategiesstringrepeated

The list of `bom_ref` to the evidence provided describing the mitigation strategies. Each mitigation strategy should include an explanation of how any weaknesses in the evidence will be mitigated.

reasoningstringoptional

The written explanation of why the evidence provided substantiates the claim.

evidencestringrepeated

The list of `bom_ref` to evidence that supports this claim.

counterEvidencestringrepeated

The list of `bom_ref` to counterEvidence that supports this claim.

externalReferencesExternalReferencerepeated

External references provide a way to document systems, sites, and information that may be relevant but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

Declarations.Evidence

FieldTypeLabelDescription
bom_refstringoptional

A identifier which can be used to reference the component elsewhere in the BOM. Uniqueness is enforced within all elements and children of the root-level bom element.

propertyNamestringoptional

The reference to the property name as defined in the CycloneDX Property Taxonomy: https://github.com/CycloneDX/cyclonedx-property-taxonomy/.

descriptionstringoptional

The written description of what this evidence is and how it was created.

dataDeclarations.Evidence.Datarepeated

The output or analysis that supports claims.

createdgoogle.protobuf.Timestampoptional

The date and time (timestamp) when the evidence was created.

expiresgoogle.protobuf.Timestampoptional

The date and time (timestamp) when the evidence is no longer valid.

authorOrganizationalContactoptional

The author of the evidence.

reviewerOrganizationalContactoptional

The reviewer of the evidence.

Declarations.Evidence.Data

FieldTypeLabelDescription
namestringoptional

The name of the data.

contentsDeclarations.Evidence.Data.Contentsoptional

The contents or references to the contents of the data being described.

classificationstringoptional

Data classification tags data according to its type, sensitivity, and value if altered, stolen, or destroyed.

sensitiveDatastringrepeated

A description of any sensitive data included.

governanceDataGovernanceoptional

Data Governance

Declarations.Evidence.Data.Contents

FieldTypeLabelDescription
attachmentAttachedTextoptional

A way to include textual or encoded data.

urlstringoptional

The URL to where the data can be retrieved.

Declarations.Targets

FieldTypeLabelDescription
organizationsOrganizationalEntityrepeated

The list of organizations which claims are made against.

componentsComponentrepeated

The list of components which claims are made against.

servicesServicerepeated

The list of services which claims are made against.

Definition

FieldTypeLabelDescription
standardsDefinition.Standardrepeated

The list of standards which may consist of regulations, industry or organizational-specific standards, maturity models, best practices, or any other requirements which can be evaluated against or attested to.

patentsPatentOrFamilyrepeated

The list of either individual patents or patent families.

Definition.Standard

A standard may consist of regulations, industry or organizational-specific standards, maturity models, best practices, or any other requirements which can be evaluated against or attested to.

FieldTypeLabelDescription
bom_refstringoptional

A identifier which can be used to reference the component elsewhere in the BOM. Uniqueness is enforced within all elements and children of the root-level bom element.

namestringoptional

The name of the standard. This will often be a shortened, single name of the standard.

versionstringoptional

The version of the standard.

descriptionstringoptional

The description of the standard.

ownerstringoptional

The owner of the standard, often the entity responsible for its release.

requirementsDefinition.Standard.Requirementrepeated

The list of requirements comprising the standard.

levelsDefinition.Standard.Levelrepeated

The list of levels associated with the standard. Some standards have different levels of compliance.

externalReferencesExternalReferencerepeated

External references provide a way to document systems, sites, and information that may be relevant but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

Definition.Standard.Level

FieldTypeLabelDescription
bom_refstringoptional

A identifier which can be used to reference the component elsewhere in the BOM. Uniqueness is enforced within all elements and children of the root-level bom element.

identifierstringoptional

The identifier used in the standard to identify a specific level.

titlestringoptional

The title of the level.

descriptionstringoptional

The description of the level.

requirementsstringrepeated

The list of requirement `bom_ref`s that comprise the level.

Definition.Standard.Requirement

FieldTypeLabelDescription
bom_refstringoptional

A identifier which can be used to reference the component elsewhere in the BOM. Uniqueness is enforced within all elements and children of the root-level bom element.

identifierstringoptional

The unique identifier used in the standard to identify a specific requirement. This should match what is in the standard and should not be the requirements bom_ref.

titlestringoptional

The title of the requirement.

textstringoptional

The textual content of the requirement.

descriptionsstringrepeated

The supplemental text that provides additional guidance or context to the requirement but is not directly part of the requirement.

openCrestringrepeated

The Common Requirements Enumeration (CRE) identifier(s). CRE is a structured and standardized framework for uniting security standards and guidelines. CRE links each section of a resource to a shared topic identifier (a Common Requirement). Through this shared topic link, all resources map to each other. The use of CRE promotes clear and unambiguous communication among stakeholders.

parentstringoptional

The `bom_ref` to a parent requirement. This establishes a hierarchy of requirements. Top-level requirements must not define a parent. Only child requirements should define parents.

propertiesPropertyrepeated

Specifies custom properties.

externalReferencesExternalReferencerepeated

External references provide a way to document systems, sites, and information that may be relevant but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

Dependency

Defines the direct dependencies of a component, service, or the components provided/implemented by a given component. Components or services that do not have their own dependencies must be declared as empty elements within the graph. Components or services that are not represented in the dependency graph may have unknown dependencies. It is recommended that implementations assume this to be opaque and not an indicator of an object being dependency-free. It is recommended to leverage compositions to indicate unknown dependency graphs.

FieldTypeLabelDescription
refstring

References a component or service by its bom_ref attribute

dependenciesDependencyrepeated

The bom_ref identifiers of the components or services that are dependencies of this dependency object.

providesstringrepeated

The bom_ref identifiers of the components or services that define a given specification or standard, which are provided or implemented by this dependency object.

Diff

The patch file (or diff) that shows changes. Refer to https://en.wikipedia.org/wiki/Diff

FieldTypeLabelDescription
textAttachedTextoptional

Specifies the text of the diff

urlstringoptional

Specifies the URL to the diff

EnergyMeasureType

A measure of energy.

FieldTypeLabelDescription
valuefloat

Quantity of energy.

unitEnergyMeasureType.EnergyMeasureUnitType

Unit of energy.

EnergyProviderType

Describes the physical provider of energy used for model development or operations.

FieldTypeLabelDescription
bom_refstringoptional

BOM unique reference to the energy provider.

descriptionstring

A description of the energy provider.

organizationOrganizationalEntity

The organization of the energy provider.

energySourceEnergyProviderType.EnergySourceType

The energy source for the energy provider.

energyProvidedEnergyMeasureType

The energy provided by the energy source for an associated activity.

external_referencesExternalReferencerepeated

Provides the ability to document external references related to the BOM or to the project the BOM describes.

EnvironmentVars

FieldTypeLabelDescription
propertyProperty

Name-value pair

valuestring

Value

Event

Represents something that happened that may trigger a response.

FieldTypeLabelDescription
uidstringoptional

The unique identifier of the event.

descriptionstringoptional

A description of the event.

timeReceivedgoogle.protobuf.Timestampoptional

The date and time (timestamp) when the event was received.

dataAttachedTextoptional

Encoding of the raw event data.

sourceResourceReferenceChoiceoptional

References the component or service that was the source of the event

targetResourceReferenceChoiceoptional

References the component or service that was the target of the event

propertiesPropertyrepeated

Additional properties of the event.

Evidence

Provides the ability to document evidence collected through various forms of extraction or analysis.

FieldTypeLabelDescription
licensesLicenseChoicerepeated

A list of SPDX licenses and/or named licenses and/or SPDX License Expression.

copyrightEvidenceCopyrightrepeated

Copyright evidence captures intellectual property assertions, providing evidence of possible ownership and legal protection.

identityEvidenceIdentityrepeated

Evidence that substantiates the identity of a component. The identity may be an object or an array of identity objects. Support for specifying identity as a single object was introduced in CycloneDX v1.5. Arrays were introduced in v1.6. It is recommended that all implementations use arrays, even if only one identity object is specified.

occurrencesEvidenceOccurrencesrepeated

Evidence of individual instances of a component spread across multiple locations.

callstackCallstackoptional

Evidence of the components use through the callstack.

EvidenceCopyright

FieldTypeLabelDescription
textstring

Copyright text

EvidenceIdentity

FieldTypeLabelDescription
fieldEvidenceFieldType

The identity field of the component which the evidence describes.

confidencefloatoptional

The overall confidence of the evidence from 0 - 1, where 1 is 100% confidence.

methodsEvidenceMethodsrepeated

The methods used to extract and/or analyze the evidence.

toolsstringrepeated

The object in the BOM identified by its bom_ref. This is often a component or service, but may be any object type supporting bom_refs. Tools used for analysis should already be defined in the BOM, either in the metadata/tools, components, or formulation.

concludedValuestringoptional

The value of the field (cpe, purl, etc) that has been concluded based on the aggregate of all methods (if available).

EvidenceMethods

FieldTypeLabelDescription
techniqueEvidenceTechnique

The technique used in this method of analysis.

confidencefloat

The confidence of the evidence from 0 - 1, where 1 is 100% confidence. Confidence is specific to the technique used. Each technique of analysis can have independent confidence.

valuestringoptional

The value or contents of the evidence.

EvidenceOccurrences

FieldTypeLabelDescription
bom_refstringoptional

A identifier which can be used to reference the occurrence elsewhere in the BOM. Every `bom_ref` must be unique within the BOM.

locationstring

The location or path to where the component was found.

lineint32optional

The line number where the component was found.

offsetint32optional

The offset where the component was found.

symbolstringoptional

The symbol name that was found associated with the component.

additionalContextstringoptional

Any additional context of the detected component (e.g. a code snippet).

ExternalReference

External references provide a way to document systems, sites, and information that may be relevant but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

FieldTypeLabelDescription
typeExternalReferenceType

Specifies the type of external reference. There are built-in types to describe common references. If a type does not exist for the reference being referred to, use the "other" type.

urlstring

The URL to the external reference

commentstringoptional

A comment describing the external reference

hashesHashrepeated

Integrity hashes for the external resource content

propertiesPropertyrepeated

Specifies custom properties.

Formula

Describes workflows and resources that captures rules and other aspects of how the associated BOM component or service was formed.

FieldTypeLabelDescription
bom_refstringoptional

BOM unique reference to the resource.

componentsComponentrepeated

Transient components that are used in tasks that constitute one or more of this formula's workflows

servicesServicerepeated

Transient services that are used in tasks that constitute one or more of this formula's workflows

workflowsWorkflowrepeated

List of workflows that can be declared to accomplish specific orchestrated goals and independently triggered.

propertiesPropertyrepeated

Domain-specific formula properties.

GraphicsCollection

A collection of graphics that represent various measurements.

FieldTypeLabelDescription
descriptionstringoptional

A description of this collection of graphics.

graphicGraphicsCollection.Graphicrepeated

A collection of graphics.

GraphicsCollection.Graphic

FieldTypeLabelDescription
namestringoptional

The name of the graphic.

imageAttachedTextoptional

The graphic (vector or raster). Base64 encoding must be specified for binary images.

Hash

Specifies the file hash of the component

FieldTypeLabelDescription
algHashAlg

Specifies the algorithm used to create the hash

valuestring

SimpleContent value of element

IdentifiableAction

FieldTypeLabelDescription
timestampgoogle.protobuf.Timestampoptional

The timestamp in which the action occurred

namestringoptional

The name of the individual who performed the action

emailstringoptional

The email address of the individual who performed the action

InputType

Type that represents various input data types and formats.

FieldTypeLabelDescription
sourceResourceReferenceChoiceoptional

A references to the component or service that provided the input to the task (e.g., reference to a service with a data flow value of `inbound`)

targetResourceReferenceChoiceoptional

A reference to the component or service that received or stored the input if not the task itself (e.g., a local, named storage workspace)

resourceResourceReferenceChoiceoptional

A reference to an independent resource provided as an input to a task by the workflow runtime.

parametersParameterrepeated

Inputs that have the form of parameters with names and values.

environmentVarsEnvironmentVarsrepeated

Inputs that have the form of parameters with names and values.

dataAttachedTextoptional

Inputs that have the form of data.

propertiesPropertyrepeated

Additional properties of the input data.

Issue

An individual issue that has been resolved.

FieldTypeLabelDescription
typeIssueClassification

Specifies the type of issue

idstringoptional

The identifier of the issue assigned by the source of the issue

namestringoptional

The name of the issue

descriptionstringoptional

A description of the issue

sourceSourceoptional

The source of the issue where it is documented

referencesstringrepeated

A collection of URL's for reference. Multiple URLs are allowed. Example: "https://example.com"

License

Specifies the details and attributes related to a software license. It can either include a valid SPDX license identifier or a named license, along with additional properties such as license acknowledgment, comprehensive commercial licensing information, and the full text of the license.

FieldTypeLabelDescription
idstring

A valid SPDX license identifier. If specified, this value must be one of the enumeration of valid SPDX license identifiers defined in the spdx.schema.json (or spdx.xml) subschema which is synchronized with the official SPDX license list.

namestring

The name of the license. This may include the name of a commercial or proprietary license or an open source license that may not be defined by SPDX.

textAttachedTextoptional

Specifies the full text of the attachment

urlstringoptional

The URL to the attachment file. If the attachment is a license or BOM, an externalReference should also be specified for completeness.

bom_refstringoptional

A identifier which can be used to reference the license elsewhere in the BOM. Uniqueness is enforced within all elements and children of the root-level bom element.

licensingLicensingoptional

Licensing details describing the licensor/licensee, license type, renewal and expiration dates, and other important metadata

propertiesPropertyrepeated

Specifies custom properties.

acknowledgementLicenseAcknowledgementEnumerationoptional

Declared licenses and concluded licenses represent two different stages in the licensing process within software development. Declared licenses refer to the initial intention of the software authors regarding the licensing terms under which their code is released. On the other hand, concluded licenses are the result of a comprehensive analysis of the project's codebase to identify and confirm the actual licenses of the components used, which may differ from the initially declared licenses. While declared licenses provide an upfront indication of the licensing intentions, concluded licenses offer a more thorough understanding of the actual licensing within a project, facilitating proper compliance and risk management. Observed licenses are defined in `@.evidence.licenses`. Observed licenses form the evidence necessary to substantiate a concluded license.

LicenseChoice

FieldTypeLabelDescription
licenseLicense

A license

expressionstring

A valid SPDX license expression. Refer to https://spdx.org/specifications for syntax requirements.

expression_detailedLicenseExpressionDetailed

A SPDX license expression and its details

acknowledgementLicenseAcknowledgementEnumerationoptional

This field must only be used when `expression` is chosen as the other options have their own acknowledgement.

bom_refstringoptional

This field must only be used when `expression` is chosen as the other options have their own bom_ref.

LicenseExpressionDetailed

Specifies the details and attributes related to a software license.

It must be a valid SPDX license expression, along with additional properties such as license acknowledgment.

FieldTypeLabelDescription
expressionstring

A valid SPDX license expression. Refer to https://spdx.org/specifications for syntax requirements. Example values: - "Apache-2.0 AND (MIT OR GPL-2.0-only)", - "GPL-3.0-only WITH Classpath-exception-2.0"

detailsLicenseExpressionDetailed.ExpressionDetailsrepeated

Licensing details describing the licensor/licensee, license type, renewal and expiration dates, and other important metadata Details for parts of the `expression`.

bom_refstringoptional

A identifier which can be used to reference the license elsewhere in the BOM. Uniqueness is enforced within all elements and children of the root-level bom element.

acknowledgementLicenseAcknowledgementEnumerationoptional

Declared licenses and concluded licenses represent two different stages in the licensing process within software development. Declared licenses refer to the initial intention of the software authors regarding the licensing terms under which their code is released. On the other hand, concluded licenses are the result of a comprehensive analysis of the project's codebase to identify and confirm the actual licenses of the components used, which may differ from the initially declared licenses. While declared licenses provide an upfront indication of the licensing intentions, concluded licenses offer a more thorough understanding of the actual licensing within a project, facilitating proper compliance and risk management. Observed licenses are defined in `@.evidence.licenses`. Observed licenses form the evidence necessary to substantiate a concluded license.

licensingLicensingoptional

Licensing details describing the licensor/licensee, license type, renewal and expiration dates, and other important metadata

propertiesPropertyrepeated

Specifies custom properties.

LicenseExpressionDetailed.ExpressionDetails

This document specifies the details and attributes related to a software license identifier. An SPDX expression may be a compound of license identifiers.

The `license_identifier` field serves as the key that identifies each record. Note that this key is not required to be unique, as the same license identifier could apply to multiple, different but similar license details, texts, etc.

FieldTypeLabelDescription
license_identifierstring

A valid SPDX license identifier. Refer to https://spdx.org/specifications for syntax requirements. This field serves as the primary key, which uniquely identifies each record. Example values: - "Apache-2.0", - "GPL-3.0-only WITH Classpath-exception-2.0" - "LicenseRef-my-custom-license"

bom_refstringoptional

A identifier which can be used to reference the license elsewhere in the BOM. Uniqueness is enforced within all elements and children of the root-level bom element.

textAttachedTextoptional

A way to include the textual content of the license.

urlstringoptional

The URL to the license file. If specified, a 'license' externalReference should also be specified for completeness

Licensing

FieldTypeLabelDescription
altIdsstringrepeated

License identifiers that may be used to manage licenses and their lifecycle

licensorOrganizationalEntityOrContactoptional

The individual or organization that grants a license to another individual or organization

licenseeOrganizationalEntityOrContactoptional

The individual or organization for which a license was granted to

purchaserOrganizationalEntityOrContactoptional

The individual or organization that purchased the license

purchaseOrderstringoptional

The purchase order identifier the purchaser sent to a supplier or vendor to authorize a purchase

licenseTypesLicensingTypeEnumrepeated

The type of license(s) that was granted to the licensee

lastRenewalgoogle.protobuf.Timestampoptional

The timestamp indicating when the license was last renewed. For new purchases, this is often the purchase or acquisition date. For non-perpetual licenses or subscriptions, this is the timestamp of when the license was last renewed.

expirationgoogle.protobuf.Timestampoptional

The timestamp indicating when the current license expires (if applicable).

Lifecycles

FieldTypeLabelDescription
phaseLifecyclePhase

A pre-defined phase in the product lifecycle.

namestring

The name of the lifecycle phase

descriptionstringoptional

The description of the lifecycle phase

Metadata

FieldTypeLabelDescription
timestampgoogle.protobuf.Timestampoptional

The date and time (timestamp) when the document was created.

toolsTooloptional

The tool(s) used in the creation of the BOM.

authorsOrganizationalContactrepeated

The person(s) who created the BOM. Authors are common in BOMs created through manual processes. BOMs created through automated means may have '.manufacturer' instead.

componentComponentoptional

The component that the BOM describes.

manufactureOrganizationalEntityoptional

Deprecated. DEPRECATED - DO NOT USE - This will be removed in a future version - Use the `.component.manufacturer` instead. The organization that manufactured the component that the BOM describes.

supplierOrganizationalEntityoptional

The organization that supplied the component that the BOM describes. The supplier may often be the manufacture, but may also be a distributor or repackager.

licensesLicenseChoicerepeated

The license information for the BOM document. This may be different from the license(s) of the component(s) that the BOM describes. A list of SPDX licenses and/or named licenses and/or SPDX License Expression.

propertiesPropertyrepeated

Specifies custom properties.

lifecyclesLifecyclesrepeated

Lifecycles communicate the stage(s) in which data in the BOM was captured. Different types of data may be available at various phases of a lifecycle, such as the Software Development Lifecycle (SDLC), IT Asset Management (ITAM), and Software Asset Management (SAM). Thus, a BOM may include data specific to or only obtainable in a given lifecycle.

manufacturerOrganizationalEntityoptional

The organization that created the BOM. Manufacturer is common in BOMs created through automated processes. BOMs created through manual means may have '.authors' instead.

distributionConstraintsMetadata.DistributionConstraintsoptional

Conditions and constraints governing the sharing and distribution of the data or components described by this BOM.

Fields with deprecated option

NameOption
manufacture

true

Metadata.DistributionConstraints

FieldTypeLabelDescription
tlpTlpClassificationoptional

The Traffic Light Protocol (TLP) classification that controls the sharing and distribution of the data that the BOM describes.

ModelCard

A model card describes the intended uses of a machine learning model and potential limitations, including biases and ethical considerations. Model cards typically contain the training parameters, which datasets were used to train the model, performance metrics, and other relevant data useful for ML transparency. This object SHOULD be specified for any component of type `machine-learning-model` and must not be specified for other component types.

Comment:

Model card support in CycloneDX is derived from TensorFlow Model Card Toolkit released under the Apache 2.0 license and available from https://github.com/tensorflow/model-card-toolkit/blob/main/model_card_toolkit/schema/v0.0.2/model_card.schema.json. In addition, CycloneDX model card support includes portions of VerifyML, also released under the Apache 2.0 license and available from https://github.com/cylynx/verifyml/blob/main/verifyml/model_card_toolkit/schema/v0.0.4/model_card.schema.json.

FieldTypeLabelDescription
bom_refstringoptional

A identifier which can be used to reference the model card elsewhere in the BOM. Every `bom_ref` must be unique within the BOM.

modelParametersModelCard.ModelParametersoptional

Hyper-parameters for construction of the model.

quantitativeAnalysisModelCard.QuantitativeAnalysisoptional

A quantitative analysis of the model

considerationsModelCard.ModelCardConsiderationsoptional

What considerations should be taken into account regarding the model's construction, training, and application?

ModelCard.ModelCardConsiderations

FieldTypeLabelDescription
usersstringrepeated

Who are the intended users of the model?

useCasesstringrepeated

What are the intended use cases of the model?

technicalLimitationsstringrepeated

What are the known technical limitations of the model? E.g. What kind(s) of data should the model be expected not to perform well on? What are the factors that might degrade model performance?

performanceTradeoffsstringrepeated

What are the known tradeoffs in accuracy/performance of the model?

ethicalConsiderationsModelCard.ModelCardConsiderations.EthicalConsiderationsrepeated

What are the ethical risks involved in the application of this model?

fairnessAssessmentsModelCard.ModelCardConsiderations.FairnessAssessmentsrepeated

How does the model affect groups at risk of being systematically disadvantaged? What are the harms and benefits to the various affected groups?

environmentalConsiderationsModelCard.ModelCardConsiderations.EnvironmentalConsiderationsoptional

What are the various environmental impacts the corresponding machine learning model has exhibited across its lifecycle?

ModelCard.ModelCardConsiderations.EnergyConsumption

Describes energy consumption information incurred for the specified lifecycle activity.

FieldTypeLabelDescription
activityModelCard.ModelCardConsiderations.EnergyConsumption.ActivityType

The type of activity that is part of a machine learning model development or operational lifecycle.

energyProvidersEnergyProviderTyperepeated

The providers of the energy consumed by the associated model development lifecycle activity.

activityEnergyCostEnergyMeasureType

The total energy cost associated with the model lifecycle activity.

co2CostEquivalentCO2MeasureTypeoptional

The CO2 cost or debit equivalent to the total energy cost.

co2CostOffsetCO2MeasureTypeoptional

The CO2 offset or credit for the CO2 equivalent cost.

propertiesPropertyrepeated

Specifies custom properties for environment considerations.

ModelCard.ModelCardConsiderations.EnvironmentalConsiderations

FieldTypeLabelDescription
energyConsumptionsModelCard.ModelCardConsiderations.EnergyConsumptionrepeated

Describes energy consumption information incurred for one or more component lifecycle activities.

propertiesPropertyrepeated

Specifies custom properties for environment considerations.

ModelCard.ModelCardConsiderations.EthicalConsiderations

FieldTypeLabelDescription
namestringoptional

The name of the risk.

mitigationStrategystringoptional

Strategy used to address this risk.

ModelCard.ModelCardConsiderations.FairnessAssessments

FieldTypeLabelDescription
groupAtRiskstringoptional

The groups or individuals at risk of being systematically disadvantaged by the model.

benefitsstringoptional

Expected benefits to the identified groups.

harmsstringoptional

Expected harms to the identified groups.

mitigationStrategystringoptional

With respect to the benefits and harms outlined, please describe any mitigation strategy implemented.

ModelCard.ModelParameters

FieldTypeLabelDescription
approachModelCard.ModelParameters.Approachoptional

The overall approach to learning used by the model for problem-solving.

taskstringoptional

Directly influences the input and/or output. Examples include classification, regression, clustering, etc.

architectureFamilystringoptional

The model architecture family such as transformer network, convolutional neural network, residual neural network, LSTM neural network, etc.

modelArchitecturestringoptional

The specific architecture of the model, such as GPT-1, ResNet-50, YOLOv3, etc.

datasetsModelCard.ModelParameters.Datasetsrepeated

The datasets used to train and evaluate the model.

inputsModelCard.ModelParameters.MachineLearningInputOutputParametersrepeated

The input format(s) of the model

outputsModelCard.ModelParameters.MachineLearningInputOutputParametersrepeated

The output format(s) from the model

ModelCard.ModelParameters.Approach

FieldTypeLabelDescription
typeModelParameterApproachTypeoptional

Learning types describing the learning problem or hybrid learning problem.

ModelCard.ModelParameters.Datasets

FieldTypeLabelDescription
datasetComponentData

Inline Data Information

refstring

References a data component by the components bom_ref attribute

ModelCard.ModelParameters.MachineLearningInputOutputParameters

FieldTypeLabelDescription
formatstringoptional

The data format for input/output to the model. Example formats include string, image, time-series

ModelCard.QuantitativeAnalysis

FieldTypeLabelDescription
performanceMetricsModelCard.QuantitativeAnalysis.PerformanceMetricsrepeated

The model performance metrics being reported. Examples may include accuracy, F1 score, precision, top-3 error rates, MSC, etc.

graphicsGraphicsCollectionoptional

A collection of graphics that represent various measurements.

ModelCard.QuantitativeAnalysis.PerformanceMetrics

FieldTypeLabelDescription
typestringoptional

The type of performance metric.

valuestringoptional

The value of the performance metric.

slicestringoptional

The name of the slice this metric was computed on. By default, assume this metric is not sliced.

confidenceIntervalModelCard.QuantitativeAnalysis.PerformanceMetrics.ConfidenceIntervaloptional

The confidence interval of the metric.

ModelCard.QuantitativeAnalysis.PerformanceMetrics.ConfidenceInterval

FieldTypeLabelDescription
lowerBoundstringoptional

The lower bound of the confidence interval.

upperBoundstringoptional

The upper bound of the confidence interval.

Note

A note containing the locale and content.

FieldTypeLabelDescription
localestringoptional

The ISO-639 (or higher) language code and optional ISO-3166 (or higher) country code. Examples include: "en", "en-US", "fr" and "fr-CA".

textAttachedTextoptional

Specifies the full content of the release note.

OrganizationalContact

FieldTypeLabelDescription
namestringoptional

The name of the contact

emailstringoptional

The email address of the contact.

phonestringoptional

The phone number of the contact.

bom_refstringoptional

A identifier which can be used to reference the object elsewhere in the BOM. Uniqueness is enforced within all elements and children of the root-level bom element.

OrganizationalEntity

FieldTypeLabelDescription
namestringoptional

The name of the organization

urlstringrepeated

The URL of the organization. Multiple URLs are allowed.

contactOrganizationalContactrepeated

A contact person at the organization. Multiple contacts are allowed.

bom_refstringoptional

A identifier which can be used to reference the object elsewhere in the BOM. Uniqueness is enforced within all elements and children of the root-level bom element.

addressPostalAddressTypeoptional

The physical address (location) of the organization

OrganizationalEntityOrContact

EITHER an organization OR an individual

FieldTypeLabelDescription
organizationOrganizationalEntity

Organization

individualOrganizationalContact

Individual

OutputType

Type that represents various output data types and formats.

FieldTypeLabelDescription
typeOutputType.OutputTypeTypeoptional

Describes the type of data output.

sourceResourceReferenceChoiceoptional

Component or service that generated or provided the output from the task (e.g., a build tool)

targetResourceReferenceChoiceoptional

Component or service that received the output from the task (e.g., reference to an artifactory service with data flow value of `outbound`)

resourceResourceReferenceChoiceoptional

A reference to an independent resource generated as output by the task.

dataAttachedTextoptional

Outputs that have the form of data.

environmentVarsEnvironmentVarsrepeated

Outputs that have the form of environment variables.

propertiesPropertyrepeated

Additional properties of the output data.

Parameter

A representation of a functional parameter.

FieldTypeLabelDescription
namestringoptional

The name of the parameter.

valuestringoptional

The value of the parameter.

dataTypestringoptional

The data type of the parameter.

Patch

Specifies an individual patch

FieldTypeLabelDescription
typePatchClassification

Specifies the purpose for the patch, including the resolution of defects, security issues, or new behavior or functionality

diffDiffoptional

The patch file (or diff) that show changes. Refer to https://en.wikipedia.org/wiki/Diff

resolvesIssuerepeated

A collection of issues the patch resolves

Patent

A patent is a legal instrument, granted by an authority, that confers certain rights over an invention for a specified period, contingent on public disclosure and adherence to relevant legal requirements. The summary information in this object is aligned with [WIPO ST.96](https://www.wipo.int/standards/en/st96/) principles where applicable.

FieldTypeLabelDescription
bom_refstringoptional

A identifier which can be used to reference the component elsewhere in the BOM. Uniqueness is enforced within all elements and children of the root-level bom element.

patent_numberstring

The unique number assigned to the granted patent by the issuing authority. Aligned with `PatentNumber` in WIPO ST.96. Refer to [PatentNumber in ST.96](https://www.wipo.int/standards/XMLSchema/ST96/V8_0/Patent/PatentNumber.xsd).

application_numberstringoptional

The unique number assigned to a patent application when it is filed with a patent office. It is used to identify the specific application and track its progress through the examination process. Aligned with `ApplicationNumber` in ST.96. Refer to [ApplicationIdentificationType in ST.96](https://www.wipo.int/standards/XMLSchema/ST96/V8_0/Patent/ApplicationIdentificationType.xsd).

jurisdictionstring

The jurisdiction or patent office where the priority application was filed, specified using WIPO ST.3 codes. Aligned with `IPOfficeCode` in ST.96. Refer to [IPOfficeCode in ST.96](https://www.wipo.int/standards/XMLSchema/ST96/V8_0/Common/IPOfficeCode.xsd).

priority_applicationPriorityApplicationoptional

The priorityApplication contains the essential data necessary to identify and reference an earlier patent filing for priority rights. In line with WIPO ST.96 guidelines, it includes the jurisdiction (office code), application number, and filing date-the three key elements that uniquely specify the priority application in a global patent context.

publication_numberstringoptional

This is the number assigned to a patent application once it is published. Patent applications are generally published 18 months after filing (unless an applicant requests non-publication). This number is distinct from the application number.

titlestringoptional

The title of the patent, summarising the invention it protects. Aligned with `InventionTitle` in WIPO ST.96. Refer to [InventionTitle in ST.96](https://www.wipo.int/standards/XMLSchema/ST96/V8_0/Patent/InventionTitle.xsd).

abstractstringoptional

A brief summary of the invention described in the patent. Aligned with `Abstract` and `P` in WIPO ST.96. Refer to [Abstract in ST.96](https://www.wipo.int/standards/XMLSchema/ST96/V8_0/Patent/Abstract.xsd).

filing_dategoogle.protobuf.Timestampoptional

The date the patent application was filed with the jurisdiction. Aligned with `FilingDate` in WIPO ST.96. Refer to [FilingDate in ST.96](https://www.wipo.int/standards/XMLSchema/ST96/V8_0/Patent/FilingDate.xsd).

grant_dategoogle.protobuf.Timestampoptional

The date the patent was granted by the jurisdiction. Aligned with `GrantDate` in WIPO ST.96. Refer to [GrantDate in ST.96](https://www.wipo.int/standards/XMLSchema/ST96/V8_0/Patent/GrantDate.xsd).

patent_expiration_dategoogle.protobuf.Timestampoptional

The date the patent expires. Derived from grant or filing date according to jurisdiction-specific rules.

patent_legal_statusPatentLegalStatus

Indicates the current legal status of the patent or patent application, based on the WIPO ST.27 standard. This status reflects administrative, procedural, or legal events. Values include both active and inactive states and are useful for determining enforceability, procedural history, and maintenance status.

patent_assigneeOrganizationalEntityOrContactrepeated

A collection of organisations or individuals to whom the patent rights are assigned. This supports joint ownership and allows for flexible representation of both corporate entities and individual inventors.

external_referencesExternalReferencerepeated

External references provide a way to document systems, sites, and information that may be relevant but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

PatentAssertion

An assertion linking a patent or patent family to this component or service.

FieldTypeLabelDescription
bom_refstringoptional

A identifier which can be used to reference the component elsewhere in the BOM. Uniqueness is enforced within all elements and children of the root-level bom element.

assertion_typePatentAssertionType

The type of assertion being made about the patent or patent family. Examples include ownership, licensing, and standards inclusion.

patent_refsstringrepeated

A list of BOM references (`bom_ref`) linking to patents or patent families associated with this assertion.

asserterAsserter

A reference to a previously defined `organizationalContact` or `organizationalEntity` object in the BOM. The value must be a valid `bom_ref` pointing to one of these objects.

notesstring

Additional notes or clarifications regarding the assertion, if necessary. For example, geographical restrictions, duration, or limitations of a license.

PatentFamily

A patent family is a group of related patent applications or granted patents that cover the same or similar invention. These patents are filed in multiple jurisdictions to protect the invention across different regions or countries. A patent family typically includes patents that share a common priority date, originating from the same initial application, and may vary slightly in scope or claims to comply with regional legal frameworks. Fields align with WIPO ST.96 standards where applicable.

FieldTypeLabelDescription
bom_refstringoptional

A identifier which can be used to reference the component elsewhere in the BOM. Uniqueness is enforced within all elements and children of the root-level bom element.

family_idstring

The unique identifier for the patent family, aligned with the `id` attribute in WIPO ST.96 v8.0's `PatentFamilyType`. Refer to [PatentFamilyType in ST.96](https://www.wipo.int/standards/XMLSchema/ST96/V8_0/Patent/PatentFamilyType.xsd).

priority_applicationPriorityApplicationoptional

The priorityApplication contains the essential data necessary to identify and reference an earlier patent filing for priority rights. In line with WIPO ST.96 guidelines, it includes the jurisdiction (office code), application number, and filing date-the three key elements that uniquely specify the priority application in a global patent context.

membersstringrepeated

A collection of patents or applications that belong to this family, each identified by a `bom_ref` pointing to a patent object defined elsewhere in the BOM. bom_ref strings

external_referencesExternalReferencerepeated

External references provide a way to document systems, sites, and information that may be relevant but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

PatentOrFamily

Either an individual patents or patent families.

FieldTypeLabelDescription
patentPatent

An individual patent

patent_familyPatentFamily

A patent family

Pedigree

Component pedigree is a way to document complex supply chain scenarios where components are created, distributed, modified, redistributed, combined with other components, etc. Pedigree supports viewing this complex chain from the beginning, the end, or anywhere in the middle. It also provides a way to document variants where the exact relation may not be known.

FieldTypeLabelDescription
ancestorsComponentrepeated

Describes zero or more components in which a component is derived from. This is commonly used to describe forks from existing projects where the forked version contains an ancestor node containing the original component it was forked from. For example, Component A is the original component. Component B is the component being used and documented in the BOM. However, Component B contains a pedigree node with a single ancestor documenting Component A - the original component from which Component B is derived from.

descendantsComponentrepeated

Descendants are the exact opposite of ancestors. This provides a way to document all forks (and their forks) of an original or root component.

variantsComponentrepeated

Variants describe relations where the relationship between the components is not known. For example, if Component A contains nearly identical code to Component B. They are both related, but it is unclear if one is derived from the other or if they share a common ancestor.

commitsCommitrepeated

A list of zero or more commits which provide a trail describing how the component deviates from an ancestor, descendant, or variant.

patchesPatchrepeated

A list of zero or more patches describing how the component deviates from an ancestor, descendant, or variant. Patches may be complementary to commits or may be used in place of commits.

notesstringoptional

Notes, observations, and other non-structured commentary describing the component's pedigree.

PostalAddressType

An address used to identify a contactable location.

FieldTypeLabelDescription
bom_refstringoptional

A identifier which can be used to reference the address elsewhere in the BOM. Every `bom_ref` must be unique within the BOM.

countrystringoptional

The country name or the two-letter ISO 3166-1 country code.

regionstringoptional

The region or state in the country. For example, Texas.

localitystringoptional

The locality or city within the country. For example, Austin.

postOfficeBoxNumberstringoptional

The post office box number. For example, 901.

postalCodeuestringoptional

The postal code. For example, 78758.

streetAddressstringoptional

The street address. For example, 100 Main Street.

PriorityApplication

The priorityApplication contains the essential data necessary to identify and reference an earlier patent filing for priority rights. In line with WIPO ST.96 guidelines, it includes the jurisdiction (office code), application number, and filing date-the three key elements that uniquely specify the priority application in a global patent context.

FieldTypeLabelDescription
application_numberstring

The unique number assigned to a patent application when it is filed with a patent office. It is used to identify the specific application and track its progress through the examination process. Aligned with `ApplicationNumber` in ST.96. Refer to [ApplicationIdentificationType in ST.96](https://www.wipo.int/standards/XMLSchema/ST96/V8_0/Patent/ApplicationIdentificationType.xsd).

jurisdictionstring

The jurisdiction or patent office where the priority application was filed, specified using WIPO ST.3 codes. Aligned with `IPOfficeCode` in ST.96. Refer to [IPOfficeCode in ST.96](https://www.wipo.int/standards/XMLSchema/ST96/V8_0/Common/IPOfficeCode.xsd).

filing_dategoogle.protobuf.Timestamp

The date the priority application was filed, aligned with `FilingDate` in ST.96. Refer to [FilingDate in ST.96](https://www.wipo.int/standards/XMLSchema/ST96/V8_0/Patent/FilingDate.xsd).

ProofOfConcept

FieldTypeLabelDescription
reproductionStepsstringoptional

Precise steps to reproduce the vulnerability.

environmentstringoptional

A description of the environment in which reproduction was possible.

supportingMaterialAttachedTextrepeated

Supporting material that helps in reproducing or understanding how reproduction is possible. This may include screenshots, payloads, and PoC exploit code.

Property

Specifies a property

FieldTypeLabelDescription
namestring

Name (or key)

valuestringoptional

Value

ReleaseNotes

FieldTypeLabelDescription
typestring

The software versioning type. It is recommended that the release type use one of 'major', 'minor', 'patch', 'pre-release', or 'internal'. Representing all possible software release types is not practical, so standardizing on the recommended values, whenever possible, is strongly encouraged.

titlestringoptional

The title of the release.

featuredImagestringoptional

The URL to an image that may be prominently displayed with the release note.

socialImagestringoptional

The URL to an image that may be used in messaging on social media platforms.

descriptionstringoptional

A short description of the release.

timestampgoogle.protobuf.Timestampoptional

The date and time (timestamp) when the release note was created.

aliasesstringrepeated

Alternate names the release may be referred to. This may include unofficial terms used by development and marketing teams (e.g. code names).

tagsstringrepeated

Textual strings that aid in the discovery, search, and retrieval of the associated object. Tags often serve as a way to group or categorize similar or related objects by various attributes. Examples include "json-parser", "object-persistence", "text-to-image", "translation", and "object-detection".

resolvesIssuerepeated

A collection of issues that have been resolved.

notesNoterepeated

Zero or more release notes containing the locale and content. Multiple note messages may be specified to support release notes in a wide variety of languages.

propertiesPropertyrepeated

Specifies custom properties.

ResourceReferenceChoice

Type that permits a choice to reference a resource using an iternal bom_ref identifier or an external reference.

FieldTypeLabelDescription
refstring

References an object by its bom_ref attribute

externalReferenceExternalReference

Reference to an externally accessible resource

Service

FieldTypeLabelDescription
bom_refstringoptional

A identifier which can be used to reference the service elsewhere in the BOM. Uniqueness is enforced within all elements and children of the root-level bom element.

providerOrganizationalEntityoptional

The organization that provides the service.

groupstringoptional

The grouping name, namespace, or identifier. This will often be a shortened, single name of the company or project that produced the service or domain name. Whitespace and special characters should be avoided.

namestring

The name of the service. This will often be a shortened, single name of the service.

versionstringoptional

The service version.

descriptionstringoptional

Specifies a description for the service.

endpointsstringrepeated

The endpoint URIs of the service. Multiple endpoints are allowed. Example: "https://example.com/api/v1/ticker"

authenticatedbooloptional

A boolean value indicating if the service requires authentication. A value of true indicates the service requires authentication prior to use. A value of false indicates the service does not require authentication.

x_trust_boundarybooloptional

A boolean value indicating if the use of the service crosses a trust zone or boundary. A value of true indicates that by using the service, a trust boundary is crossed. A value of false indicates that by using the service, a trust boundary is not crossed.

dataDataFlowrepeated

Specifies information about the data including the directional flow of data and the data classification.

licensesLicenseChoicerepeated

A list of SPDX licenses and/or named licenses and/or SPDX License Expression.

external_referencesExternalReferencerepeated

Provides the ability to document external references related to the service.

servicesServicerepeated

Specifies sub-service. This is not a dependency tree. It provides a way to specify a hierarchical representation of service assemblies, similar to system -> subsystem -> parts assembly in physical supply chains.

propertiesPropertyrepeated

Specifies custom properties.

releaseNotesReleaseNotesoptional

Specifies release notes.

trustZonestringoptional

The name of the trust zone the service resides in.

tagsstringrepeated

Textual strings that aid in the discovery, search, and retrieval of the associated object. Tags often serve as a way to group or categorize similar or related objects by various attributes. Examples include "json-parser", "object-persistence", "text-to-image", "translation", and "object-detection".

patent_assertionsPatentAssertionrepeated

A list of assertions made regarding patents associated with this component or service. Assertions distinguish between ownership, licensing, and other relevant interactions with patents.

Source

The source of the issue where it is documented.

FieldTypeLabelDescription
namestringoptional

The name of the source. For example, "National Vulnerability Database", "NVD", and "Apache"

urlstringoptional

The url of the issue documentation as provided by the source

Step

Executes specific commands or tools in order to accomplish its owning task as part of a sequence.

FieldTypeLabelDescription
namestringoptional

A name for the step.

descriptionstringoptional

A description of the step.

commandsCommandrepeated

Ordered list of commands or directives for the step

propertiesPropertyrepeated

Domain-specific step properties.

Swid

Specifies metadata and content for ISO-IEC 19770-2 Software Identification (SWID) Tags.

FieldTypeLabelDescription
tag_idstring

Maps to the tagId of a SoftwareIdentity.

namestring

Maps to the name of a SoftwareIdentity.

versionstringoptional

Maps to the version of a SoftwareIdentity. Defaults to '0.0' if not specified.

tag_versionint32optional

Maps to the tagVersion of a SoftwareIdentity. Defaults to '0' if not specified.

patchbooloptional

Maps to the patch of a SoftwareIdentity. Defaults to 'false' if not specified.

textAttachedTextoptional

Specifies the full content of the SWID tag.

urlstringoptional

The URL to the SWID file.

Task

Describes the inputs, sequence of steps and resources used to accomplish a task and its output.

FieldTypeLabelDescription
bom_refstring

BOM unique reference to the resource.

uidstring

The unique identifier for the resource instance within its deployment context.

namestringoptional

The name of the resource instance.

descriptionstringoptional

A description of the resource instance.

propertiesPropertyrepeated

Domain-specific task instance properties.

resourceReferencesResourceReferenceChoicerepeated

References to component or service resources that are used to realize the resource instance.

taskTypesTaskTyperepeated

Indicates the types of activities performed by the set of workflow tasks.

triggerTriggeroptional

The trigger that initiated the task.

stepsSteprepeated

"The sequence of steps for the task.

inputsInputTyperepeated

Represents resources and data brought into a task at runtime by an executor or task commands

outputsOutputTyperepeated

Represents resources and data output from a task at runtime by an executor or task commands

timeStartgoogle.protobuf.Timestampoptional

The date and time (timestamp) when the task started.

timeEndgoogle.protobuf.Timestampoptional

The date and time (timestamp) when the task ended.

workspacesWorkspacerepeated

A set of named filesystem or data resource shareable by workflow tasks.

runtimeTopologyDependencyrepeated

A graph of the component runtime topology for task's instance.

Tool

Specifies a tool (manual or automated).

FieldTypeLabelDescription
vendorstringoptional

Deprecated. DEPRECATED - DO NOT USE - This will be removed in a future version. The vendor of the tool used to create the BOM.

namestringoptional

Deprecated. DEPRECATED - DO NOT USE - This will be removed in a future version. The name of the tool used to create the BOM.

versionstringoptional

Deprecated. DEPRECATED - DO NOT USE - This will be removed in a future version. The version of the tool used to create the BOM.

hashesHashrepeated

Deprecated. DEPRECATED - DO NOT USE - This will be removed in a future version.

external_referencesExternalReferencerepeated

Deprecated. DEPRECATED - DO NOT USE - This will be removed in a future version. Provides the ability to document external references related to the tool.

componentsComponentrepeated

A list of software and hardware components used as tools

servicesServicerepeated

A list of services used as tools. This may include microservices, function-as-a-service, and other types of network or intra-process services.

Fields with deprecated option

NameOption
vendor

true

name

true

version

true

hashes

true

external_references

true

Trigger

Represents a resource that can conditionally activate (or fire) tasks based upon associated events and their data.

FieldTypeLabelDescription
bom_refstring

BOM unique reference to the resource.

uidstring

The unique identifier for the resource instance within its deployment context.

namestringoptional

The name of the resource instance.

descriptionstringoptional

A description of the resource instance.

propertiesPropertyrepeated

Additional properties of the trigger.

resourceReferencesResourceReferenceChoicerepeated

References to component or service resources that are used to realize the resource instance.

typeTrigger.TriggerType

The source type of event which caused the trigger to fire.

eventEventoptional

The event data that caused the associated trigger to activate.

conditionsConditionrepeated

A list of conditions used to determine if a trigger should be activated.

timeActivatedgoogle.protobuf.Timestampoptional

The date and time (timestamp) when the trigger was activated.

inputsInputTyperepeated

Represents resources and data brought into a task at runtime by an executor or task commands

outputsOutputTyperepeated

Represents resources and data output from a task at runtime by an executor or task commands

Volume

An identifiable, logical unit of data storage tied to a physical device.

FieldTypeLabelDescription
uidstringoptional

The unique identifier for the volume instance within its deployment context.

namestringoptional

The name of the volume instance

modeVolume.VolumeModeoptional

The volume mode for the volume instance.

pathstringoptional

The underlying path created from the actual volume.

sizeAllocatedstringoptional

The allocated size of the volume accessible to the associated workspace. This should include the scalar size as well as the IEC standard unit in either decimal or binary form.

persistentbooloptional

Indicates if the volume persists beyond the life of the resource it is associated with.

remotebooloptional

Indicates if the volume is remotely (i.e., network) attached.

propertiesPropertyrepeated

Domain-specific volume instance properties.

Vulnerability

Defines a weakness in a component or service that could be exploited or triggered by a threat source.

FieldTypeLabelDescription
bom_refstringoptional

A identifier which can be used to reference the vulnerability elsewhere in the BOM. Uniqueness is enforced within all elements and children of the root-level bom element.

idstringoptional

The identifier that uniquely identifies the vulnerability.

sourceSourceoptional

The source that published the vulnerability.

referencesVulnerabilityReferencerepeated

Zero or more pointers to vulnerabilities that are the equivalent of the vulnerability specified. Oftentimes, the same vulnerability may exist in multiple sources of vulnerability intelligence but have different identifiers. References provide a way to correlate vulnerabilities across multiple sources of vulnerability intelligence.

ratingsVulnerabilityRatingrepeated

List of vulnerability ratings

cwesint32repeated

List of Common Weaknesses Enumerations (CWEs) codes that describe this vulnerability. For example, 399 (of https://cwe.mitre.org/data/definitions/399.html)

descriptionstringoptional

A description of the vulnerability as provided by the source.

detailstringoptional

If available, an in-depth description of the vulnerability as provided by the source organization. Details often include information useful in understanding the root cause.

recommendationstringoptional

Recommendations of how the vulnerability can be remediated or mitigated.

advisoriesAdvisoryrepeated

Published advisories of the vulnerability if provided.

createdgoogle.protobuf.Timestampoptional

The date and time (timestamp) when the vulnerability record was created in the vulnerability database.

publishedgoogle.protobuf.Timestampoptional

The date and time (timestamp) when the vulnerability record was first published.

updatedgoogle.protobuf.Timestampoptional

The date and time (timestamp) when the vulnerability record was last updated.

creditsVulnerabilityCreditsoptional

Individuals or organizations credited with the discovery of the vulnerability.

toolsTooloptional

The tool(s) used to identify, confirm, or score the vulnerability.

analysisVulnerabilityAnalysisoptional

An assessment of the impact and exploitability of the vulnerability.

affectsVulnerabilityAffectsrepeated

affects

propertiesPropertyrepeated

Specifies custom properties.

rejectedgoogle.protobuf.Timestampoptional

The date and time (timestamp) when the vulnerability record was rejected (if applicable).

proofOfConceptProofOfConceptoptional

Evidence used to reproduce the vulnerability.

workaroundstringoptional

A bypass, usually temporary, of the vulnerability that reduces its likelihood and/or impact. Workarounds often involve changes to configuration or deployments.

VulnerabilityAffectedVersions

FieldTypeLabelDescription
versionstring

A single version of a component or service.

rangestring

A version range specified in Package URL Version Range syntax (vers), which is defined at https://github.com/package-url/vers-spec

statusVulnerabilityAffectedStatusoptional

The vulnerability status for the version or range of versions. Defaults to VULNERABILITY_AFFECTED_STATUS_AFFECTED if not specified.

VulnerabilityAffects

FieldTypeLabelDescription
refstring

References a component or service by the objects bom_ref

versionsVulnerabilityAffectedVersionsrepeated

Zero or more individual versions or range of versions.

VulnerabilityAnalysis

FieldTypeLabelDescription
stateImpactAnalysisStateoptional

Declares the current state of an occurrence of a vulnerability after automated or manual analysis.

justificationImpactAnalysisJustificationoptional

The rationale of why the impact analysis state was asserted.

responseVulnerabilityResponserepeated

A response to the vulnerability by the manufacturer, supplier, or project responsible for the affected component or service. More than one response is allowed. Responses are strongly encouraged for vulnerabilities where the analysis state is exploitable.

detailstringoptional

Detailed description of the impact, including methods used during the assessment. If a vulnerability is not exploitable, this field should include specific details on why the component or service is not impacted by this vulnerability.

firstIssuedgoogle.protobuf.Timestampoptional

The date and time (timestamp) when the analysis was first issued.

lastUpdatedgoogle.protobuf.Timestampoptional

The date and time (timestamp) when the analysis was last updated.

VulnerabilityCredits

FieldTypeLabelDescription
organizationsOrganizationalEntityrepeated

The organizations credited with vulnerability discovery.

individualsOrganizationalContactrepeated

The individuals not associated with organizations that are credited with vulnerability discovery.

VulnerabilityRating

FieldTypeLabelDescription
sourceSourceoptional

The source that calculated the severity or risk rating of the vulnerability.

scoredoubleoptional

The numerical score of the rating.

severitySeverityoptional

Textual representation of the severity that corresponds to the numerical score of the rating.

methodScoreMethodoptional

Specifies the severity or risk scoring methodology or standard used.

vectorstringoptional

Textual representation of the metric values used to score the vulnerability.

justificationstringoptional

A reason for rating the vulnerability as it was.

VulnerabilityReference

FieldTypeLabelDescription
idstring

An identifier that uniquely identifies the vulnerability.

sourceSource

The source that published the vulnerability.

Workflow

A specialized orchestration task.

FieldTypeLabelDescription
bom_refstring

BOM unique reference to the resource.

uidstring

The unique identifier for the resource instance within its deployment context.

namestringoptional

The name of the resource instance.

descriptionstringoptional

A description of the resource instance.

propertiesPropertyrepeated

Domain-specific resource instance properties.

resourceReferencesResourceReferenceChoicerepeated

References to component or service resources that are used to realize the resource instance.

tasksTaskrepeated

The tasks that comprise the workflow.

taskDependenciesDependencyrepeated

The graph of dependencies between tasks within the workflow.

taskTypesTaskTyperepeated

Indicates the types of activities performed by the set of workflow tasks.

triggerTriggeroptional

The trigger that initiated the task.

stepsSteprepeated

The sequence of steps for the task.

inputsInputTyperepeated

Represents resources and data brought into a task at runtime by executor or task commands

outputsOutputTyperepeated

Represents resources and data output from a task at runtime by executor or task commands

timeStartgoogle.protobuf.Timestampoptional

The date and time (timestamp) when the task started.

timeEndgoogle.protobuf.Timestampoptional

The date and time (timestamp) when the task ended.

workspacesWorkspacerepeated

A set of named filesystem or data resource shareable by workflow tasks.

runtimeTopologyDependencyrepeated

A graph of the component runtime topology for workflow's instance.

Workspace

A named filesystem or data resource shareable by workflow tasks.

FieldTypeLabelDescription
bom_refstring

BOM unique reference to the resource.

uidstring

The unique identifier for the resource instance within its deployment context.

namestringoptional

The name of the resource instance.

aliasesstringrepeated

The names for the workspace as referenced by other workflow tasks. Effectively, a name mapping so other tasks can use their own local name in their steps.

descriptionstringoptional

A description of the resource instance.

propertiesPropertyrepeated

Domain-specific workspace instance properties.

resourceReferencesResourceReferenceChoicerepeated

References to component or service resources that are used to realize the resource instance.

accessModeWorkspace.AccessModeoptional

Describes the read-write access control for the workspace relative to the owning resource instance.

mountPathstringoptional

A path to a location on disk where the workspace will be available for the associated task's steps.

managedDataTypestringoptional

The name of a domain-specific data type the workspace represents.

volumeRequeststringoptional

Identifies the reference to the request for a specific volume type and parameters.

volumeVolumeoptional

Information about the actual volume instance allocated to the workspace.

Aggregate

NameNumberDescription
AGGREGATE_NOT_SPECIFIED0

The relationship completeness is not specified. buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- `not specified` is our fallback, doubling `unspecified`

AGGREGATE_COMPLETE1

The relationship is complete. No further relationships including constituent components, services, or dependencies are known to exist.

AGGREGATE_INCOMPLETE2

The relationship is incomplete. Additional relationships exist and may include constituent components, services, or dependencies.

AGGREGATE_INCOMPLETE_FIRST_PARTY_ONLY3

The relationship is incomplete. Only relationships for first-party components, services, or their dependencies are represented.

AGGREGATE_INCOMPLETE_THIRD_PARTY_ONLY4

The relationship is incomplete. Only relationships for third-party components, services, or their dependencies are represented.

AGGREGATE_UNKNOWN5

The relationship may be complete or incomplete. This usually signifies a 'best-effort' to obtain constituent components, services, or dependencies but the completeness is inconclusive.

AGGREGATE_INCOMPLETE_FIRST_PARTY_PROPRIETARY_ONLY6

The relationship is incomplete. Only relationships for first-party components, services, or their dependencies are represented, limited specifically to those that are proprietary.

AGGREGATE_INCOMPLETE_FIRST_PARTY_OPENSOURCE_ONLY7

The relationship is incomplete. Only relationships for first-party components, services, or their dependencies are represented, limited specifically to those that are opensource.

AGGREGATE_INCOMPLETE_THIRD_PARTY_PROPRIETARY_ONLY8

The relationship is incomplete. Only relationships for third-party components, services, or their dependencies are represented, limited specifically to those that are proprietary.

AGGREGATE_INCOMPLETE_THIRD_PARTY_OPENSOURCE_ONLY9

The relationship is incomplete. Only relationships for third-party components, services, or their dependencies are represented, limited specifically to those that are opensource.

CO2MeasureType.CO2MeasureUnitType

NameNumberDescription
CO2_MEASURE_UNIT_TYPE_UNSPECIFIED0

Default

CO2_MEASURE_UNIT_TYPE_TONNES_CO2_EQUIVALENT1

Tonnes (t) of carbon dioxide (CO2) equivalent (eq) (the default unit).

Classification

NameNumberDescription
CLASSIFICATION_NULL0

buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- `null` is our fallback, doubling `unspecified`

CLASSIFICATION_APPLICATION1

A software application. Refer to https://en.wikipedia.org/wiki/Application_software for information about applications.

CLASSIFICATION_FRAMEWORK2

A software framework. Refer to https://en.wikipedia.org/wiki/Software_framework for information on how frameworks vary slightly from libraries.

CLASSIFICATION_LIBRARY3

A software library. Refer to https://en.wikipedia.org/wiki/Library_(computing) for information about libraries. All third-party and open source reusable components will likely be a library. If the library also has key features of a framework, then it should be classified as a framework. If not, or is unknown, then specifying library is recommended.

CLASSIFICATION_OPERATING_SYSTEM4

A software operating system without regard to deployment model (i.e. installed on physical hardware, virtual machine, image, etc) Refer to https://en.wikipedia.org/wiki/Operating_system

CLASSIFICATION_DEVICE5

A hardware device such as a processor, or chip-set. A hardware device containing firmware should include a component for the physical hardware itself, and another component of type 'firmware' or 'operating-system' (whichever is relevant), describing information about the software running on the device. See also the list of known device properties: https://github.com/CycloneDX/cyclonedx-property-taxonomy/blob/main/cdx/device.md

CLASSIFICATION_FILE6

A computer file. Refer to https://en.wikipedia.org/wiki/Computer_file for information about files.

CLASSIFICATION_CONTAINER7

A packaging and/or runtime format, not specific to any particular technology, which isolates software inside the container from software outside of a container through virtualization technology. Refer to https://en.wikipedia.org/wiki/OS-level_virtualization

CLASSIFICATION_FIRMWARE8

A special type of software that provides low-level control over a devices hardware. Refer to https://en.wikipedia.org/wiki/Firmware

CLASSIFICATION_DEVICE_DRIVER9

A special type of software that operates or controls a particular type of device. Refer to https://en.wikipedia.org/wiki/Device_driver

CLASSIFICATION_PLATFORM10

A runtime environment that interprets or executes software. This may include runtimes such as those that execute bytecode, just-in-time compilers, interpreters, or low-code/no-code application platforms.

CLASSIFICATION_MACHINE_LEARNING_MODEL11

A model based on training data that can make predictions or decisions without being explicitly programmed to do so.

CLASSIFICATION_DATA12

A collection of discrete values that convey information.

CLASSIFICATION_CRYPTOGRAPHIC_ASSET13

A cryptographic asset including algorithms, protocols, certificates, keys, tokens, and secrets.

ComponentDataType

NameNumberDescription
COMPONENT_DATA_TYPE_SOURCE_CODE0

Any type of code, code snippet, or data-as-code buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- value `0` is a fallback(meaning "unspecified") in protobuf3. this usage here is an error, it shall be fixed with v2.0 of this very schema

COMPONENT_DATA_TYPE_CONFIGURATION1

Parameters or settings that may be used by other components.

COMPONENT_DATA_TYPE_DATASET2

A collection of data.

COMPONENT_DATA_TYPE_DEFINITION3

Data that can be used to create new instances of what the definition defines.

COMPONENT_DATA_TYPE_OTHER4

Any other type of data that does not fit into existing definitions.

CryptoProperties.AlgorithmProperties.CryptoAlgorithmFunction

Cryptographic functions

NameNumberDescription
CRYPTO_ALGORITHM_FUNCTION_UNSPECIFIED0

ProtoBuff's default value -- it differs from "unknown"

CRYPTO_ALGORITHM_FUNCTION_UNKNOWN1

meaning "there is some, but it is unclear which one"

CRYPTO_ALGORITHM_FUNCTION_OTHER2

none of the following

CRYPTO_ALGORITHM_FUNCTION_GENERATE3

CRYPTO_ALGORITHM_FUNCTION_KEYGEN4

CRYPTO_ALGORITHM_FUNCTION_ENCRYPT5

CRYPTO_ALGORITHM_FUNCTION_DECRYPT6

CRYPTO_ALGORITHM_FUNCTION_DIGEST7

CRYPTO_ALGORITHM_FUNCTION_TAG8

CRYPTO_ALGORITHM_FUNCTION_KEYDERIVE9

CRYPTO_ALGORITHM_FUNCTION_SIGN10

CRYPTO_ALGORITHM_FUNCTION_VERIFY11

CRYPTO_ALGORITHM_FUNCTION_ENCAPSULATE12

CRYPTO_ALGORITHM_FUNCTION_DECAPSULATE13

CryptoProperties.AlgorithmProperties.CryptoAlgorithmMode

Mode

NameNumberDescription
CRYPTO_ALGORITHM_MODE_UNSPECIFIED0

ProtoBuff's default value -- it differs from "unknown"

CRYPTO_ALGORITHM_MODE_UNKNOWN1

The mode of operation is not known

CRYPTO_ALGORITHM_MODE_OTHER2

Another mode of operation - none of the following

CRYPTO_ALGORITHM_MODE_CBC3

Cipher block chaining

CRYPTO_ALGORITHM_MODE_ECB4

Electronic codebook

CRYPTO_ALGORITHM_MODE_CCM5

Counter with cipher block chaining message authentication code

CRYPTO_ALGORITHM_MODE_GCM6

Galois/counter

CRYPTO_ALGORITHM_MODE_CFB7

Cipher feedback

CRYPTO_ALGORITHM_MODE_OFB8

Output feedback

CRYPTO_ALGORITHM_MODE_CTR9

Counter

CryptoProperties.AlgorithmProperties.CryptoAlgorithmPadding

Padding

NameNumberDescription
CRYPTO_ALGORITHM_PADDING_UNSPECIFIED0

ProtoBuff's default value -- it differs from "unknown"

CRYPTO_ALGORITHM_PADDING_UNKNOWN1

The padding scheme is not known

CRYPTO_ALGORITHM_PADDING_OTHER2

Another padding scheme - none of the following

CRYPTO_ALGORITHM_PADDING_PKCS53

Public Key Cryptography Standard: Password-Based Cryptography

CRYPTO_ALGORITHM_PADDING_PKCS74

Public Key Cryptography Standard: Cryptographic Message Syntax

CRYPTO_ALGORITHM_PADDING_PKCS1V155

Public Key Cryptography Standard: RSA Cryptography v1.5

CRYPTO_ALGORITHM_PADDING_OAEP6

Optimal asymmetric encryption padding

CRYPTO_ALGORITHM_PADDING_RAW7

Raw

CryptoProperties.AlgorithmProperties.CryptoExecutionEnvironment

Execution Environment

NameNumberDescription
CRYPTO_EXECUTION_ENVIRONMENT_UNSPECIFIED0

ProtoBuff's default value -- it differs from "unknown"

CRYPTO_EXECUTION_ENVIRONMENT_UNKNOWN1

The execution environment is not known

CRYPTO_EXECUTION_ENVIRONMENT_OTHER2

Another implementation environment - none of the following

CRYPTO_EXECUTION_ENVIRONMENT_SOFTWARE_PLAIN_RAM3

A software implementation running in plain unencrypted RAM.

CRYPTO_EXECUTION_ENVIRONMENT_SOFTWARE_ENCRYPTED_RAM4

A software implementation running in encrypted RAM.

CRYPTO_EXECUTION_ENVIRONMENT_SOFTWARE_TEE5

A software implementation running in a trusted execution environment.

CRYPTO_EXECUTION_ENVIRONMENT_HARDWARE6

A hardware implementation.

CryptoProperties.AlgorithmProperties.CryptoImplementationPlatform

Implementation platform

NameNumberDescription
CRYPTO_IMPLEMENTATION_PLATFORM_UNSPECIFIED0

ProtoBuff's default value -- it differs from "unknown"

CRYPTO_IMPLEMENTATION_PLATFORM_UNKNOWN1

the platform is not known

CRYPTO_IMPLEMENTATION_PLATFORM_OTHER2

none of the following

CRYPTO_IMPLEMENTATION_PLATFORM_GENERIC3

CRYPTO_IMPLEMENTATION_PLATFORM_X86_324

CRYPTO_IMPLEMENTATION_PLATFORM_X86_645

CRYPTO_IMPLEMENTATION_PLATFORM_ARMV7A6

CRYPTO_IMPLEMENTATION_PLATFORM_ARMV7M7

CRYPTO_IMPLEMENTATION_PLATFORM_ARMV8A8

CRYPTO_IMPLEMENTATION_PLATFORM_ARMV8M9

CRYPTO_IMPLEMENTATION_PLATFORM_ARMV9A10

CRYPTO_IMPLEMENTATION_PLATFORM_ARMV9M11

CRYPTO_IMPLEMENTATION_PLATFORM_X390X12

CRYPTO_IMPLEMENTATION_PLATFORM_PPC6413

CRYPTO_IMPLEMENTATION_PLATFORM_PPC64LE14

CryptoProperties.AlgorithmProperties.CryptoPrimitive

Primitive

NameNumberDescription
CRYPTO_PRIMITIVE_UNSPECIFIED0

ProtoBuff's default value -- it differs from "unknown"

CRYPTO_PRIMITIVE_UNKNOWN1

The primitive is not known

CRYPTO_PRIMITIVE_OTHER2

Another primitive type - none of the following

CRYPTO_PRIMITIVE_DRBG3

Deterministic Random Bit Generator (DRBG) is a type of pseudorandom number generator designed to produce a sequence of bits from an initial seed value. DRBGs are commonly used in cryptographic applications where reproducibility of random values is important.

CRYPTO_PRIMITIVE_MAC4

In cryptography, a Message Authentication Code (MAC) is information used for authenticating and integrity-checking a message.

CRYPTO_PRIMITIVE_BLOCK_CIPHER5

A block cipher is a symmetric key algorithm that operates on fixed-size blocks of data. It encrypts or decrypts the data in block units, providing confidentiality. Block ciphers are widely used in various cryptographic modes and protocols for secure data transmission.

CRYPTO_PRIMITIVE_STREAM_CIPHER6

A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream).

CRYPTO_PRIMITIVE_SIGNATURE7

In cryptography, a signature is a digital representation of a message or data that proves its origin, identity, and integrity. Digital signatures are generated using cryptographic algorithms and are widely used for authentication and verification in secure communication.

CRYPTO_PRIMITIVE_HASH8

A hash function is a mathematical algorithm that takes an input (or 'message') and produces a fixed-size string of characters, which is typically a hash value. Hash functions are commonly used in various cryptographic applications, including data integrity verification and password hashing.

CRYPTO_PRIMITIVE_PKE9

Public Key Encryption (PKE) is a type of encryption that uses a pair of public and private keys for secure communication. The public key is used for encryption, while the private key is used for decryption. PKE is a fundamental component of public-key cryptography.

CRYPTO_PRIMITIVE_XOF10

An XOF is an extendable output function that can take arbitrary input and creates a stream of output, up to a limit determined by the size of the internal state of the hash function that underlies the XOF.

CRYPTO_PRIMITIVE_KDF11

A Key Derivation Function (KDF) derives key material from another source of entropy while preserving the entropy of the input.

CRYPTO_PRIMITIVE_KEY_AGREE12

In cryptography, a key-agreement is a protocol whereby two or more parties agree on a cryptographic key in such a way that both influence the outcome.

CRYPTO_PRIMITIVE_KEM13

A Key Encapsulation Mechanism (KEM) algorithm is a mechanism for transporting random keying material to a recipient using the recipient's public key.

CRYPTO_PRIMITIVE_AE14

Authenticated Encryption (AE) is a cryptographic process that provides both confidentiality and data integrity. It ensures that the encrypted data has not been tampered with and comes from a legitimate source. AE is commonly used in secure communication protocols.

CRYPTO_PRIMITIVE_COMBINER15

A combiner aggregates many candidates for a cryptographic primitive and generates a new candidate for the same primitive.

CRYPTO_PRIMITIVE_KEY_WRAP16

Key-wrap is a cryptographic technique used to securely encrypt and protect cryptographic keys using algorithms like AES.

CryptoProperties.CertificateExtensions.CommonExtensionName

Common extension names

NameNumberDescription
COMMON_EXTENSION_NAME_UNSPECIFIED0

ProtoBuff's default value

COMMON_EXTENSION_NAME_BASIC_CONSTRAINTS1

COMMON_EXTENSION_NAME_KEY_USAGE2

COMMON_EXTENSION_NAME_EXTENDED_KEY_USAGE3

COMMON_EXTENSION_NAME_SUBJECT_ALTERNATIVE_NAME4

COMMON_EXTENSION_NAME_AUTHORITY_KEY_IDENTIFIER5

COMMON_EXTENSION_NAME_SUBJECT_KEY_IDENTIFIER6

COMMON_EXTENSION_NAME_AUTHORITY_INFORMATION_ACCESS7

COMMON_EXTENSION_NAME_CERTIFICATE_POLICIES8

COMMON_EXTENSION_NAME_CRL_DISTRIBUTION_POINTS9

COMMON_EXTENSION_NAME_SIGNED_CERTIFICATE_TIMESTAMP10

CryptoProperties.CertificateState.PredefinedState

Pre-defined certificate states

NameNumberDescription
PREDEFINED_STATE_UNSPECIFIED0

ProtoBuff's default value

PREDEFINED_STATE_PRE_ACTIVATION1

The certificate has been issued by the issuing certificate authority (CA) but has not been authorized for use.

PREDEFINED_STATE_ACTIVE2

The certificate may be used to cryptographically protect information, cryptographically process previously protected information, or both.

PREDEFINED_STATE_SUSPENDED3

The use of a certificate may be suspended for several possible reasons.

PREDEFINED_STATE_DEACTIVATED4

Certificates in the deactivated state shall not be used to apply cryptographic protection but, in some cases, may be used to process cryptographically protected information.

PREDEFINED_STATE_REVOKED5

A revoked certificate is a digital certificate that has been invalidated by the issuing certificate authority (CA) before its scheduled expiration date.

PREDEFINED_STATE_DESTROYED6

The certificate has been destroyed.

CryptoProperties.CryptoAssetType

Asset Type

NameNumberDescription
CRYPTO_ASSET_TYPE_UNSPECIFIED0

ProtoBuff's default value

CRYPTO_ASSET_TYPE_ALGORITHM1

Mathematical function commonly used for data encryption, authentication, and digital signatures.

CRYPTO_ASSET_TYPE_CERTIFICATE2

An electronic document that is used to provide the identity or validate a public key.

CRYPTO_ASSET_TYPE_PROTOCOL3

A set of rules and guidelines that govern the behavior and communication with each other.

CRYPTO_ASSET_TYPE_RELATED_CRYPTO_MATERIAL4

Other cryptographic assets related to algorithms, certificates, and protocols such as keys and tokens.

CryptoProperties.ProtocolProperties.CryptoProtocolType

NameNumberDescription
CRYPTO_PROTOCOL_TYPE_UNSPECIFIED0

ProtoBuff's default value -- it differs from "unknown"

CRYPTO_PROTOCOL_TYPE_UNKNOWN1

The protocol type is not known

CRYPTO_PROTOCOL_TYPE_OTHER2

Another protocol type - none of the following

CRYPTO_PROTOCOL_TYPE_TLS3

Transport Layer Security

CRYPTO_PROTOCOL_TYPE_SSH4

Secure Shell

CRYPTO_PROTOCOL_TYPE_IPSEC5

Internet Protocol Security

CRYPTO_PROTOCOL_TYPE_IKE6

Internet Key Exchange

CRYPTO_PROTOCOL_TYPE_SSTP7

Secure Socket Tunneling Protocol

CRYPTO_PROTOCOL_TYPE_WPA8

Wi-Fi Protected Access

CRYPTO_PROTOCOL_TYPE_DTLS9

Datagram Transport Layer Security

CRYPTO_PROTOCOL_TYPE_QUIC10

Quick UDP Internet Connections

CRYPTO_PROTOCOL_TYPE_EAP_AKA11

Extensible Authentication Protocol variant

CRYPTO_PROTOCOL_TYPE_EAP_AKA_PRIME12

Enhanced version of EAP-AKA

CRYPTO_PROTOCOL_TYPE_PRINS13

Protection of Inter-Network Signaling

CRYPTO_PROTOCOL_TYPE_5G_AKA14

Authentication and Key Agreement for 5G

CryptoProperties.RelatedCryptoMaterialProperties.CryptoRelatedState

State

NameNumberDescription
CRYPTO_RELATED_STATE_UNSPECIFIED0

Default

CRYPTO_RELATED_STATE_PRE_ACTIVATION1

CRYPTO_RELATED_STATE_ACTIVE2

CRYPTO_RELATED_STATE_SUSPENDED3

CRYPTO_RELATED_STATE_DEACTIVATED4

CRYPTO_RELATED_STATE_COMPROMISED5

CRYPTO_RELATED_STATE_DESTROYED6

CryptoProperties.RelatedCryptoMaterialProperties.CryptoRelatedType

relatedCryptoMaterialType

NameNumberDescription
CRYPTO_RELATED_TYPE_UNSPECIFIED0

ProtoBuff's default value -- it differs from "unknown"

CRYPTO_RELATED_TYPE_UNKNOWN1

The type of cryptographic asset is not known.

CRYPTO_RELATED_TYPE_OTHER2

Another type of cryptographic asset - none of the following

CRYPTO_RELATED_TYPE_PRIVATE_KEY3

CRYPTO_RELATED_TYPE_PUBLIC_KEY4

CRYPTO_RELATED_TYPE_SECRET_KEY5

CRYPTO_RELATED_TYPE_KEY6

CRYPTO_RELATED_TYPE_CIPHERTEXT7

CRYPTO_RELATED_TYPE_SIGNATURE8

CRYPTO_RELATED_TYPE_DIGEST9

CRYPTO_RELATED_TYPE_INITIALIZATION_VECTOR10

CRYPTO_RELATED_TYPE_NONCE11

CRYPTO_RELATED_TYPE_SEED12

CRYPTO_RELATED_TYPE_SALT13

CRYPTO_RELATED_TYPE_SHARED_SECRET14

CRYPTO_RELATED_TYPE_TAG15

CRYPTO_RELATED_TYPE_ADDITIONAL_DATA16

CRYPTO_RELATED_TYPE_PASSWORD17

CRYPTO_RELATED_TYPE_CREDENTIAL18

CRYPTO_RELATED_TYPE_TOKEN19

DataFlowDirection

Specifies the flow direction of the data. Valid values are: inbound, outbound, bi-directional, and unknown. Direction is relative to the service. Inbound flow states that data enters the service. Outbound flow states that data leaves the service. Bi-directional states that data flows both ways, and unknown states that the direction is not known.

buf:lint:ignore ENUM_VALUE_PREFIX -- Enum value names should be prefixed with "DATA_FLOW_DIRECTION_"

NameNumberDescription
DATA_FLOW_NULL0

Default. buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- `null` is our fallback, doubling `unspecified`

DATA_FLOW_INBOUND1

Data that enters a service.

DATA_FLOW_OUTBOUND2

Data that exits a service.

DATA_FLOW_BI_DIRECTIONAL3

Data flows in and out of the service.

DATA_FLOW_UNKNOWN4

The directional flow of data is not known.

EnergyMeasureType.EnergyMeasureUnitType

NameNumberDescription
ENERGY_MEASURE_UNIT_TYPE_UNSPECIFIED0

Default

ENERGY_MEASURE_UNIT_TYPE_KILOWATT_HOURS1

kilowatt-hour (kWh) is the energy delivered by one kilowatt (kW) of power for one hour (h) (the default unit).

EnergyProviderType.EnergySourceType

NameNumberDescription
ENERGY_SOURCE_TYPE_UNSPECIFIED0

Default

ENERGY_SOURCE_TYPE_UNKNOWN1

energy source: unknown. The energy source is unknown.

ENERGY_SOURCE_TYPE_OTHER2

energy source: other. An energy source that is not listed.

ENERGY_SOURCE_TYPE_COAL3

energy source: coal. Energy produced by types of coal.

ENERGY_SOURCE_TYPE_OIL4

energy source: oil. Petroleum products (primarily crude oil and its derivative fuel oils).

ENERGY_SOURCE_TYPE_NATURAL_GAS5

energy source: natural-gas. Hydrocarbon gas liquids (HGL) that occur as gases at atmospheric pressure and as liquids under higher pressures including Natural gas (C5H12 and heavier), Ethane (C2H6), Propane (C3H8), etc.

ENERGY_SOURCE_TYPE_NUCLEAR6

energy source: nuclear. Energy produced from the cores of atoms (i.e., through nuclear fission or fusion).

ENERGY_SOURCE_TYPE_WIND7

energy source: wind. Energy produced from moving air.

ENERGY_SOURCE_TYPE_SOLAR8

energy source: solar. Energy produced from the sun (i.e., solar radiation).

ENERGY_SOURCE_TYPE_GEOTHERMAL9

energy source: geothermal. Energy produced from heat within the earth.

ENERGY_SOURCE_TYPE_HYDROPOWER10

energy source: hydropower. Energy produced from flowing water.

ENERGY_SOURCE_TYPE_BIOFUEL11

energy source: biofuel. Liquid fuels produced from biomass feedstocks (i.e., organic materials such as plants or animals).

EvidenceFieldType

buf:lint:ignore ENUM_VALUE_PREFIX -- Enum value names should be prefixed with "EVIDENCE_FIELD_TYPE_"

NameNumberDescription
EVIDENCE_FIELD_NULL0

buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- `null` is our fallback, doubling `unspecified`

EVIDENCE_FIELD_GROUP1

EVIDENCE_FIELD_NAME2

EVIDENCE_FIELD_VERSION3

EVIDENCE_FIELD_PURL4

EVIDENCE_FIELD_CPE5

EVIDENCE_FIELD_SWID6

EVIDENCE_FIELD_HASH7

EVIDENCE_FIELD_OMNIBOR_ID8

EVIDENCE_FIELD_SWHID9

EvidenceTechnique

NameNumberDescription
EVIDENCE_TECHNIQUE_SOURCE_CODE_ANALYSIS0

buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- value `0` is a fallback(meaning "unspecified") in protobuf3. this usage here is an error, it shall be fixed with v2.0 of this very schema

EVIDENCE_TECHNIQUE_BINARY_ANALYSIS1

EVIDENCE_TECHNIQUE_MANIFEST_ANALYSIS2

EVIDENCE_TECHNIQUE_AST_FINGERPRINT3

EVIDENCE_TECHNIQUE_HASH_COMPARISON4

EVIDENCE_TECHNIQUE_INSTRUMENTATION5

EVIDENCE_TECHNIQUE_DYNAMIC_ANALYSIS6

EVIDENCE_TECHNIQUE_FILENAME7

EVIDENCE_TECHNIQUE_ATTESTATION8

EVIDENCE_TECHNIQUE_OTHER9

ExternalReferenceType

NameNumberDescription
EXTERNAL_REFERENCE_TYPE_OTHER0

Use this if no other types accurately describe the purpose of the external reference. buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- `other` is our fallback, doubling `unspecified`

EXTERNAL_REFERENCE_TYPE_VCS1

Version Control System

EXTERNAL_REFERENCE_TYPE_ISSUE_TRACKER2

Issue, defect tracking system, or an Application Lifecycle Management (ALM) system

EXTERNAL_REFERENCE_TYPE_WEBSITE3

Website

EXTERNAL_REFERENCE_TYPE_ADVISORIES4

Security advisories

EXTERNAL_REFERENCE_TYPE_BOM5

Bill-of-material document (CycloneDX, SPDX, SWID, etc)

EXTERNAL_REFERENCE_TYPE_MAILING_LIST6

Mailing list or discussion group

EXTERNAL_REFERENCE_TYPE_SOCIAL7

Social media account

EXTERNAL_REFERENCE_TYPE_CHAT8

Real-time chat platform

EXTERNAL_REFERENCE_TYPE_DOCUMENTATION9

Documentation, guides, or how-to instructions

EXTERNAL_REFERENCE_TYPE_SUPPORT10

Community or commercial support

EXTERNAL_REFERENCE_TYPE_DISTRIBUTION11

Direct or repository download location

EXTERNAL_REFERENCE_TYPE_LICENSE12

The URL to the license file. If a license URL has been defined in the license node, it should also be defined as an external reference for completeness

EXTERNAL_REFERENCE_TYPE_BUILD_META13

Build-system specific meta file (i.e. pom.xml, package.json, .nuspec, etc)

EXTERNAL_REFERENCE_TYPE_BUILD_SYSTEM14

URL to an automated build system

EXTERNAL_REFERENCE_TYPE_SECURITY_CONTACT15

Specifies a way to contact the maintainer, supplier, or provider in the event of a security incident. Common URIs include links to a disclosure procedure, a mailto (RFC-2368) that specifies an email address, a tel (RFC-3966) that specifies a phone number, or dns (RFC-4501) that specifies the records containing DNS Security TXT.

EXTERNAL_REFERENCE_TYPE_ATTESTATION16

Human or machine-readable statements containing facts, evidence, or testimony

EXTERNAL_REFERENCE_TYPE_THREAT_MODEL17

An enumeration of identified weaknesses, threats, and countermeasures, dataflow diagram (DFD), attack tree, and other supporting documentation in human-readable or machine-readable format

EXTERNAL_REFERENCE_TYPE_ADVERSARY_MODEL18

The defined assumptions, goals, and capabilities of an adversary.

EXTERNAL_REFERENCE_TYPE_RISK_ASSESSMENT19

Identifies and analyzes the potential of future events that may negatively impact individuals, assets, and/or the environment. Risk assessments may also include judgments on the tolerability of each risk.

EXTERNAL_REFERENCE_TYPE_DISTRIBUTION_INTAKE20

The location where a component was published. This is often the same as "distribution" but may also include specialized publishing processes that act as an intermediary

EXTERNAL_REFERENCE_TYPE_VULNERABILITY_ASSERTION21

A Vulnerability Disclosure Report (VDR) which asserts the known and previously unknown vulnerabilities that affect a component, service, or product including the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on a component, service, or product

EXTERNAL_REFERENCE_TYPE_EXPLOITABILITY_STATEMENT22

A Vulnerability Exploitability eXchange (VEX) asserts the known vulnerabilities that do not affect a product, product family, or organization, and optionally, the ones that do. The VEX should include the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on the product, product family, or organization

EXTERNAL_REFERENCE_TYPE_PENTEST_REPORT23

Results from an authorized simulated cyberattack on a component or service, otherwise known as a penetration test

EXTERNAL_REFERENCE_TYPE_STATIC_ANALYSIS_REPORT24

SARIF or proprietary machine or human-readable report for which static analysis has identified code quality, security, and other potential issues with the source code

EXTERNAL_REFERENCE_TYPE_DYNAMIC_ANALYSIS_REPORT25

Dynamic analysis report that has identified issues such as vulnerabilities and misconfigurations

EXTERNAL_REFERENCE_TYPE_RUNTIME_ANALYSIS_REPORT26

Report generated by analyzing the call stack of a running application

EXTERNAL_REFERENCE_TYPE_COMPONENT_ANALYSIS_REPORT27

Report generated by Software Composition Analysis (SCA), container analysis, or other forms of component analysis

EXTERNAL_REFERENCE_TYPE_MATURITY_REPORT28

Report containing a formal assessment of an organization, business unit, or team against a maturity model

EXTERNAL_REFERENCE_TYPE_CERTIFICATION_REPORT29

Industry, regulatory, or other certification from an accredited (if applicable) certification body

EXTERNAL_REFERENCE_TYPE_QUALITY_METRICS30

Report or system in which quality metrics can be obtained

EXTERNAL_REFERENCE_TYPE_CODIFIED_INFRASTRUCTURE31

Code or configuration that defines and provisions virtualized infrastructure, commonly referred to as Infrastructure as Code (IaC)

EXTERNAL_REFERENCE_TYPE_MODEL_CARD32

A model card describes the intended uses of a machine learning model, potential limitations, biases, ethical considerations, training parameters, datasets used to train the model, performance metrics, and other relevant data useful for ML transparency.

EXTERNAL_REFERENCE_TYPE_POAM33

Plans of Action and Milestones (POA&M) complement an "attestation" external reference. POA&M is defined by NIST as a "document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones in meeting the tasks and scheduled completion dates for the milestones".

EXTERNAL_REFERENCE_TYPE_LOG34

A record of events that occurred in a computer system or application, such as problems, errors, or information on current operations.

EXTERNAL_REFERENCE_TYPE_CONFIGURATION35

Parameters or settings that may be used by other components or services.

EXTERNAL_REFERENCE_TYPE_EVIDENCE36

Information used to substantiate a claim.

EXTERNAL_REFERENCE_TYPE_FORMULATION37

Describes the formulation of any referencable object within the BOM, including components, services, metadata, declarations, or the BOM itself.

EXTERNAL_REFERENCE_TYPE_SOURCE_DISTRIBUTION38

The location where the source code distributable can be obtained. This is often an archive format such as zip or tar.gz. The source-distribution type complements the use of the version control (vcs) type.

EXTERNAL_REFERENCE_TYPE_ELECTRONIC_SIGNATURE39

An e-signature is commonly a scanned representation of a written signature or a stylized script of the person's name.

EXTERNAL_REFERENCE_TYPE_DIGITAL_SIGNATURE40

A signature that leverages cryptography, typically public/private key pairs, which provides strong authenticity verification.

EXTERNAL_REFERENCE_TYPE_RFC_911641

Document that complies with RFC-9116 (A File Format to Aid in Security Vulnerability Disclosure)

EXTERNAL_REFERENCE_TYPE_RELEASE_NOTES42

Reference to release notes

EXTERNAL_REFERENCE_TYPE_PATENT43

References information about patents which may be defined in human-readable documents or in machine-readable formats such as CycloneDX or ST.96. For detailed patent information or to reference the information provided directly by patent offices, it is recommended to leverage standards from the World Intellectual Property Organization (WIPO) such as [ST.96](https://www.wipo.int/standards/en/st96).

EXTERNAL_REFERENCE_TYPE_PATENT_FAMILY44

References information about a patent family which may be defined in human-readable documents or in machine-readable formats such as CycloneDX or ST.96. A patent family is a group of related patent applications or granted patents that cover the same or similar invention. For detailed patent family information or to reference the information provided directly by patent offices, it is recommended to leverage standards from the World Intellectual Property Organization (WIPO) such as [ST.96](https://www.wipo.int/standards/en/st96).

EXTERNAL_REFERENCE_TYPE_PATENT_ASSERTION45

References assertions made regarding patents associated with a component or service. Assertions distinguish between ownership, licensing, and other relevant interactions with patents.

EXTERNAL_REFERENCE_TYPE_CITATION46

A reference to external citations applicable to the object identified by this BOM entry or the BOM itself. When used with a BOM-Link, this allows offloading citations into a separate CycloneDX BOM.

HashAlg

NameNumberDescription
HASH_ALG_NULL0

buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- `null` is our fallback, doubling `unspecified`

HASH_ALG_MD_51

HASH_ALG_SHA_12

HASH_ALG_SHA_2563

HASH_ALG_SHA_3844

HASH_ALG_SHA_5125

HASH_ALG_SHA_3_2566

HASH_ALG_SHA_3_3847

HASH_ALG_SHA_3_5128

HASH_ALG_BLAKE_2_B_2569

HASH_ALG_BLAKE_2_B_38410

HASH_ALG_BLAKE_2_B_51211

HASH_ALG_BLAKE_312

HASH_ALG_STREEBOG_25613

HASH_ALG_STREEBOG_51214

ImpactAnalysisJustification

NameNumberDescription
IMPACT_ANALYSIS_JUSTIFICATION_NULL0

An undefined impact analysis justification. buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- `null` is our fallback, doubling `unspecified`

IMPACT_ANALYSIS_JUSTIFICATION_CODE_NOT_PRESENT1

The code has been removed or tree-shaked.

IMPACT_ANALYSIS_JUSTIFICATION_CODE_NOT_REACHABLE2

The vulnerable code is not invoked at runtime.

IMPACT_ANALYSIS_JUSTIFICATION_REQUIRES_CONFIGURATION3

Exploitability requires a configurable option to be set/unset.

IMPACT_ANALYSIS_JUSTIFICATION_REQUIRES_DEPENDENCY4

Exploitability requires a dependency that is not present.

IMPACT_ANALYSIS_JUSTIFICATION_REQUIRES_ENVIRONMENT5

Exploitability requires a certain environment which is not present.

IMPACT_ANALYSIS_JUSTIFICATION_PROTECTED_BY_COMPILER6

Exploitability requires a compiler flag to be set/unset.

IMPACT_ANALYSIS_JUSTIFICATION_PROTECTED_AT_RUNTIME7

Exploits are prevented at runtime.

IMPACT_ANALYSIS_JUSTIFICATION_PROTECTED_AT_PERIMETER8

Attacks are blocked at physical, logical, or network perimeter.

IMPACT_ANALYSIS_JUSTIFICATION_PROTECTED_BY_MITIGATING_CONTROL9

Preventative measures have been implemented that reduce the likelihood and/or impact of the vulnerability.

ImpactAnalysisState

NameNumberDescription
IMPACT_ANALYSIS_STATE_NULL0

An undefined impact analysis state. buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- `null` is our fallback, doubling `unspecified`

IMPACT_ANALYSIS_STATE_RESOLVED1

The vulnerability has been remediated.

IMPACT_ANALYSIS_STATE_RESOLVED_WITH_PEDIGREE2

The vulnerability has been remediated, and evidence of the changes is provided in the affected components pedigree containing verifiable commit history and/or diff(s).

IMPACT_ANALYSIS_STATE_EXPLOITABLE3

The vulnerability may be directly or indirectly exploitable.

IMPACT_ANALYSIS_STATE_IN_TRIAGE4

The vulnerability is being investigated.

IMPACT_ANALYSIS_STATE_FALSE_POSITIVE5

The vulnerability is not specific to the component or service and was falsely identified or associated.

IMPACT_ANALYSIS_STATE_NOT_AFFECTED6

The component or service is not affected by the vulnerability. Justification should be specified for all not_affected cases.

IssueClassification

NameNumberDescription
ISSUE_CLASSIFICATION_NULL0

Default. buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- `null` is our fallback, doubling `unspecified`

ISSUE_CLASSIFICATION_DEFECT1

A fault, flaw, or bug in software

ISSUE_CLASSIFICATION_ENHANCEMENT2

A new feature or behavior in software

ISSUE_CLASSIFICATION_SECURITY3

A special type of defect which impacts security

LicenseAcknowledgementEnumeration

Declared licenses and concluded licenses represent two different stages in the licensing process within software development. Declared licenses refer to the initial intention of the software authors regarding the licensing terms under which their code is released. On the other hand, concluded licenses are the result of a comprehensive analysis of the project's codebase to identify and confirm the actual licenses of the components used, which may differ from the initially declared licenses. While declared licenses provide an upfront indication of the licensing intentions, concluded licenses offer a more thorough understanding of the actual licensing within a project, facilitating proper compliance and risk management. Observed licenses are defined in `@.evidence.licenses`. Observed licenses form the evidence necessary to substantiate a concluded license.

NameNumberDescription
LICENSE_ACKNOWLEDGEMENT_ENUMERATION_UNSPECIFIED0

The license acknowledgement is not specified.

LICENSE_ACKNOWLEDGEMENT_ENUMERATION_DECLARED1

Declared licenses represent the initial intentions of authors regarding the licensing terms of their code.

LICENSE_ACKNOWLEDGEMENT_ENUMERATION_CONCLUDED2

Concluded licenses are verified and confirmed.

LicensingTypeEnum

buf:lint:ignore ENUM_VALUE_PREFIX -- Enum value names should be prefixed with "LICENSING_TYPE_ENUM_"

NameNumberDescription
LICENSING_TYPE_NULL0

buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- `null` is our fallback, doubling `unspecified`

LICENSING_TYPE_ACADEMIC1

A license that grants use of software solely for the purpose of education or research.

LICENSING_TYPE_APPLIANCE2

A license covering use of software embedded in a specific piece of hardware.

LICENSING_TYPE_CLIENT_ACCESS3

A Client Access License (CAL) allows client computers to access services provided by server software.

LICENSING_TYPE_CONCURRENT_USER4

A Concurrent User license (aka floating license) limits the number of licenses for a software application and licenses are shared among a larger number of users.

LICENSING_TYPE_CORE_POINTS5

A license where the core of a computer's processor is assigned a specific number of points.

LICENSING_TYPE_CUSTOM_METRIC6

A license for which consumption is measured by non-standard metrics.

LICENSING_TYPE_DEVICE7

A license that covers a defined number of installations on computers and other types of devices.

LICENSING_TYPE_EVALUATION8

A license that grants permission to install and use software for trial purposes.

LICENSING_TYPE_NAMED_USER9

A license that grants access to the software to one or more pre-defined users.

LICENSING_TYPE_NODE_LOCKED10

A license that grants access to the software on one or more pre-defined computers or devices.

LICENSING_TYPE_OEM11

An Original Equipment Manufacturer license that is delivered with hardware, cannot be transferred to other hardware, and is valid for the life of the hardware.

LICENSING_TYPE_PERPETUAL12

A license where the software is sold on a one-time basis and the licensee can use a copy of the software indefinitely.

LICENSING_TYPE_PROCESSOR_POINTS13

A license where each installation consumes points per processor.

LICENSING_TYPE_SUBSCRIPTION14

A license where the licensee pays a fee to use the software or service.

LICENSING_TYPE_USER15

A license that grants access to the software or service by a specified number of users.

LICENSING_TYPE_OTHER16

Another license type.

LifecyclePhase

NameNumberDescription
LIFECYCLE_PHASE_DESIGN0

BOM produced early in the development lifecycle containing an inventory of components and services that are proposed or planned to be used. The inventory may need to be procured, retrieved, or resourced prior to use. buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- value `0` is a fallback(meaning "unspecified") in protobuf3. this usage here is an error; it shall be fixed with v2.0 of this very schema

LIFECYCLE_PHASE_PRE_BUILD1

BOM consists of information obtained prior to a build process and may contain source files, development artifacts, and manifests. The inventory may need to be resolved and retrieved prior to use.

LIFECYCLE_PHASE_BUILD2

BOM consisting of information obtained during a build process where component inventory is available for use. The precise versions of resolved components are usually available at this time as well as the provenance of where the components were retrieved from.

LIFECYCLE_PHASE_POST_BUILD3

BOM consisting of information obtained after a build process has completed and the resulting components(s) are available for further analysis. Built components may exist as the result of a CI/CD process, may have been installed or deployed to a system or device, and may need to be retrieved or extracted from the system or device.

LIFECYCLE_PHASE_OPERATIONS4

BOM produced that represents inventory that is running and operational. This may include staging or production environments and will generally encompass multiple SBOMs describing the applications and operating system, along with HBOMs describing the hardware that makes up the system. Operations Bill of Materials (OBOM) can provide full-stack inventory of runtime environments, configurations, and additional dependencies.

LIFECYCLE_PHASE_DISCOVERY5

BOM consisting of information observed through network discovery providing point-in-time enumeration of embedded, on-premise, and cloud-native services such as server applications, connected devices, microservices, and serverless functions.

LIFECYCLE_PHASE_DECOMMISSION6

BOM containing inventory that will be, or has been retired from operations.

ModelCard.ModelCardConsiderations.EnergyConsumption.ActivityType

An activity that is part of a machine learning model development or operational lifecycle.

NameNumberDescription
ACTIVITY_TYPE_UNSPECIFIED0

Default

ACTIVITY_TYPE_OTHER1

a lifecycle activity type whose description does not match currently defined values (the default type).

ACTIVITY_TYPE_DESIGN2

model design including problem framing, goal definition and algorithm selection.

ACTIVITY_TYPE_DATA_COLLECTION3

model data acquisition including search, selection and transfer.

ACTIVITY_TYPE_DATA_PREPARATION4

model data preparation including data cleaning, labeling and conversion.

ACTIVITY_TYPE_TRAINING5

model building, training and generalized tuning.

ACTIVITY_TYPE_FINE_TUNING6

refining a trained model to produce desired outputs for a given problem space.

ACTIVITY_TYPE_VALIDATION7

model validation including model output evaluation and testing.

ACTIVITY_TYPE_DEPLOYMENT8

explicit model deployment to a target hosting infrastructure.

ACTIVITY_TYPE_INFERENCE9

generating an output response from a hosted model from a set of inputs.

ModelParameterApproachType

NameNumberDescription
MODEL_PARAMETER_APPROACH_TYPE_SUPERVISED0

Supervised machine learning involves training an algorithm on labeled data to predict or classify new data based on the patterns learned from the labeled examples. buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- value `0` is a fallback(meaning "unspecified") in protobuf3. this usage here is an error, it shall be fixed with v2.0 of this very schema

MODEL_PARAMETER_APPROACH_TYPE_UNSUPERVISED1

Unsupervised machine learning involves training algorithms on unlabeled data to discover patterns, structures, or relationships without explicit guidance, allowing the model to identify inherent structures or clusters within the data.

MODEL_PARAMETER_APPROACH_TYPE_REINFORCED_LEARNING2

Reinforcement learning is a type of machine learning where an agent learns to make decisions by interacting with an environment to maximize cumulative rewards, through trial and error.

MODEL_PARAMETER_APPROACH_TYPE_SEMI_SUPERVISED3

Semi-supervised machine learning utilizes a combination of labeled and unlabeled data during training to improve model performance, leveraging the benefits of both supervised and unsupervised learning techniques.

MODEL_PARAMETER_APPROACH_TYPE_SELF_SUPERVISED4

Self-supervised machine learning involves training models to predict parts of the input data from other parts of the same data, without requiring external labels, enabling learning from large amounts of unlabeled data.

OutputType.OutputTypeType

buf:lint:ignore ENUM_VALUE_PREFIX -- Enum value names should be prefixed with "OUTPUT_TYPE_TYPE_"

NameNumberDescription
OUTPUT_TYPE_ARTIFACT0

buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- value `0` is a fallback(meaning "unspecified") in protobuf3. this usage here is an error; it shall be fixed with v2.0 of this very schema

OUTPUT_TYPE_ATTESTATION1

OUTPUT_TYPE_LOG2

OUTPUT_TYPE_EVIDENCE3

OUTPUT_TYPE_METRICS4

OUTPUT_TYPE_OTHER5

PatchClassification

NameNumberDescription
PATCH_CLASSIFICATION_NULL0

Default. buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- `null` is our fallback, doubling `unspecified`

PATCH_CLASSIFICATION_UNOFFICIAL1

A patch which is not developed by the creators or maintainers of the software being patched. Refer to https://en.wikipedia.org/wiki/Unofficial_patch

PATCH_CLASSIFICATION_MONKEY2

A patch which dynamically modifies runtime behavior. Refer to https://en.wikipedia.org/wiki/Monkey_patch

PATCH_CLASSIFICATION_BACKPORT3

A patch which takes code from a newer version of software and applies it to older versions of the same software. Refer to https://en.wikipedia.org/wiki/Backporting

PATCH_CLASSIFICATION_CHERRY_PICK4

A patch created by selectively applying commits from other versions or branches of the same software.

PatentAssertionType

The type of assertion being made about the patent or patent family. Examples include ownership, licensing, and standards inclusion.

NameNumberDescription
PATENT_ASSERTION_TYPE_UNSPECIFIED0

Default

PATENT_ASSERTION_TYPE_OWNERSHIP1

The manufacturer asserts ownership of the patent or patent family.

PATENT_ASSERTION_TYPE_LICENSE2

The manufacturer asserts they have a license to use the patent or patent family.

PATENT_ASSERTION_TYPE_THIRD_PARTY_CLAIM3

A third party has asserted a claim or potential infringement against the manufacturer’s component or service.

PATENT_ASSERTION_TYPE_STANDARDS_INCLUSION4

The patent is part of a standard essential patent (SEP) portfolio relevant to the component or service.

PATENT_ASSERTION_TYPE_PRIOR_ART5

The manufacturer asserts the patent or patent family as prior art that invalidates another patent or claim.

PATENT_ASSERTION_TYPE_EXCLUSIVE_RIGHTS6

The manufacturer asserts exclusive rights granted through a licensing agreement.

PATENT_ASSERTION_TYPE_NON_ASSERTION7

he manufacturer asserts they will not enforce the patent or patent family against certain uses or users.

PATENT_ASSERTION_TYPE_RESEARCH_OR_EVALUATION8

The patent or patent family is being used under a research or evaluation license.

PatentLegalStatus

Indicates the current legal status of the patent or patent application, based on the WIPO ST.27 standard. This status reflects administrative, procedural, or legal events. Values include both active and inactive states and are useful for determining enforceability, procedural history, and maintenance status.

NameNumberDescription
PATENT_LEGAL_STATUS_UNSPECIFIED0

Default

PATENT_LEGAL_STATUS_PENDING1

The patent application has been filed but not yet examined or granted.

PATENT_LEGAL_STATUS_GRANTED2

The patent application has been examined and a patent has been issued.

PATENT_LEGAL_STATUS_REVOKED3

The patent has been declared invalid through a legal or administrative process.

PATENT_LEGAL_STATUS_EXPIRED4

The patent has reached the end of its enforceable term.

PATENT_LEGAL_STATUS_LAPSED5

The patent is no longer in force due to non-payment of maintenance fees or other requirements.

PATENT_LEGAL_STATUS_WITHDRAWN6

The patent application was voluntarily withdrawn by the applicant.

PATENT_LEGAL_STATUS_ABANDONED7

The patent application was abandoned, often due to lack of action or response.

PATENT_LEGAL_STATUS_SUSPENDED8

Processing of the patent application has been temporarily halted.

PATENT_LEGAL_STATUS_REINSTATED9

A previously abandoned or lapsed patent has been reinstated.

PATENT_LEGAL_STATUS_OPPOSED10

The patent application or granted patent is under formal opposition proceedings.

PATENT_LEGAL_STATUS_TERMINATED11

The patent or application has been officially terminated.

PATENT_LEGAL_STATUS_INVALIDATED12

The patent has been invalidated, either in part or in full.

PATENT_LEGAL_STATUS_IN_FORCE13

The granted patent is active and enforceable.

Scope

NameNumberDescription
SCOPE_UNSPECIFIED0

Default

SCOPE_REQUIRED1

The component is required for runtime

SCOPE_OPTIONAL2

The component is optional at runtime. Optional components are components that are not capable of being called due to them not being installed or otherwise accessible by any means. Components that are installed but, due to configuration or other restrictions, are prohibited from being called must be scoped as 'required'.

SCOPE_EXCLUDED3

Components that are excluded provide the ability to document component usage for test and other non-runtime purposes. Excluded components are not reachable within a call graph at runtime.

ScoreMethod

NameNumberDescription
SCORE_METHOD_NULL0

An undefined score method. buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- `null` is our fallback, doubling `unspecified`

SCORE_METHOD_CVSSV21

Common Vulnerability Scoring System v2 - https://www.first.org/cvss/v2/

SCORE_METHOD_CVSSV32

Common Vulnerability Scoring System v3 - https://www.first.org/cvss/v3-0/

SCORE_METHOD_CVSSV313

Common Vulnerability Scoring System v3.1 - https://www.first.org/cvss/v3-1/

SCORE_METHOD_OWASP4

OWASP Risk Rating Methodology - https://owasp.org/www-community/OWASP_Risk_Rating_Methodology

SCORE_METHOD_OTHER5

Other scoring method

SCORE_METHOD_CVSSV46

Common Vulnerability Scoring System v4.0 - https://www.first.org/cvss/v4-0/

SCORE_METHOD_SSVC7

Stakeholder Specific Vulnerability Categorization (all versions) - https://github.com/CERTCC/SSVC

Severity

Textual representation of the severity of the vulnerability adopted by the analysis method. If the analysis method uses values other than what is provided, the user is expected to translate appropriately.

NameNumberDescription
SEVERITY_UNKNOWN0

The severity is not known. buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- `unknown` is our fallback, doubling `unspecified`

SEVERITY_CRITICAL1

Critical severity

SEVERITY_HIGH2

High severity

SEVERITY_MEDIUM3

Medium severity

SEVERITY_LOW4

Low severity

SEVERITY_INFO5

Informational warning.

SEVERITY_NONE6

None

TaskType

NameNumberDescription
TASK_TYPE_COPY0

A task that copies software or data used to accomplish other tasks in the workflow. buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- value `0` is a fallback(meaning "unspecified") in protobuf3. this usage here is an error; it shall be fixed with v2.0 of this very schema

TASK_TYPE_CLONE1

A task that clones a software repository into the workflow in order to retrieve its source code or data for use in a build step.

TASK_TYPE_LINT2

A task that checks source code for programmatic and stylistic errors.

TASK_TYPE_SCAN3

A task that performs a scan against source code, or built or deployed components and services. Scans are typically run to gather or test for security vulnerabilities or policy compliance.

TASK_TYPE_MERGE4

A task that merges changes or fixes into source code prior to a build step in the workflow.

TASK_TYPE_BUILD5

A task that builds the source code, dependencies and/or data into an artifact that can be deployed to and executed on target systems.

TASK_TYPE_TEST6

A task that verifies the functionality of a component or service.

TASK_TYPE_DELIVER7

A task that delivers a built artifact to one or more target repositories or storage systems.

TASK_TYPE_DEPLOY8

A task that deploys a built artifact for execution on one or more target systems.

TASK_TYPE_RELEASE9

A task that releases a built, versioned artifact to a target repository or distribution system.

TASK_TYPE_CLEAN10

A task that cleans unnecessary tools, build artifacts and/or data from workflow storage.

TASK_TYPE_OTHER11

A workflow task that does not match current task type definitions.

TlpClassification

Traffic Light Protocol (TLP) is a classification system for identifying the potential risk associated with artefact, including whether it is subject to certain types of legal, financial, or technical threats. Refer to https://www.first.org/tlp/ for further information.

The default classification is "CLEAR"

NameNumberDescription
TLP_CLASSIFICATION_CLEAR0

The information is not subject to any restrictions as regards the sharing. buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- "CLEAR" is our fallback, the default.

TLP_CLASSIFICATION_GREEN1

The information is subject to limited disclosure, and recipients can share it within their community but not via publicly accessible channels.

TLP_CLASSIFICATION_AMBER2

The information is subject to limited disclosure, and recipients can only share it on a need-to-know basis within their organization and with clients.

TLP_CLASSIFICATION_AMBER_AND_STRICT3

The information is subject to limited disclosure, and recipients can only share it on a need-to-know basis within their organization.

TLP_CLASSIFICATION_RED4

The information is subject to restricted distribution to individual recipients only and must not be shared.

Trigger.TriggerType

NameNumberDescription
TRIGGER_TYPE_MANUAL0

buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- value `0` is a fallback(meaning "unspecified") in protobuf3. this usage here is an error; it shall be fixed with v2.0 of this very schema

TRIGGER_TYPE_API1

TRIGGER_TYPE_WEBHOOK2

TRIGGER_TYPE_SCHEDULED3

Volume.VolumeMode

NameNumberDescription
VOLUME_MODE_FILESYSTEM0

buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- value `0` is a fallback(meaning "unspecified") in protobuf3. this usage here is an error; it shall be fixed with v2.0 of this very schema

VOLUME_MODE_BLOCK1

VulnerabilityAffectedStatus

The vulnerability status of a given version or range of versions of a product. The statuses 'affected' and 'unaffected' indicate that the version is affected or unaffected by the vulnerability. The status 'unknown' indicates that it is unknown or unspecified whether the given version is affected. There can be many reasons for an 'unknown' status, including that an investigation has not been undertaken or that a vendor has not disclosed the status.

NameNumberDescription
VULNERABILITY_AFFECTED_STATUS_UNKNOWN0

It is unknown (or unspecified) whether the given version is affected. buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- `unknown` is our fallback, doubling `unspecified`

VULNERABILITY_AFFECTED_STATUS_AFFECTED1

The version is affected by the vulnerability.

VULNERABILITY_AFFECTED_STATUS_NOT_AFFECTED2

The version is not affected by the vulnerability.

VulnerabilityResponse

NameNumberDescription
VULNERABILITY_RESPONSE_NULL0

unspecified value. buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- `null` is our fallback, doubling `unspecified`

VULNERABILITY_RESPONSE_CAN_NOT_FIX1

Can not fix

VULNERABILITY_RESPONSE_WILL_NOT_FIX2

Will not fix

VULNERABILITY_RESPONSE_UPDATE3

Update to a different revision or release

VULNERABILITY_RESPONSE_ROLLBACK4

Revert to a previous revision or release

VULNERABILITY_RESPONSE_WORKAROUND_AVAILABLE5

There is a workaround available

Workspace.AccessMode

NameNumberDescription
ACCESS_MODE_READ_ONLY0

buf:lint:ignore ENUM_ZERO_VALUE_SUFFIX -- value `0` is a fallback(meaning "unspecified") in protobuf3. this usage here is an error; it shall be fixed with v2.0 of this very schema

ACCESS_MODE_READ_WRITE1

ACCESS_MODE_READ_WRITE_ONCE2

ACCESS_MODE_WRITE_ONCE3

ACCESS_MODE_WRITE_ONLY4

Scalar Value Types

.proto TypeNotesC++JavaPythonGoC#PHPRuby
doubledoubledoublefloatfloat64doublefloatFloat
floatfloatfloatfloatfloat32floatfloatFloat
int32Uses variable-length encoding. Inefficient for encoding negative numbers – if your field is likely to have negative values, use sint32 instead.int32intintint32intintegerBignum or Fixnum (as required)
int64Uses variable-length encoding. Inefficient for encoding negative numbers – if your field is likely to have negative values, use sint64 instead.int64longint/longint64longinteger/stringBignum
uint32Uses variable-length encoding.uint32intint/longuint32uintintegerBignum or Fixnum (as required)
uint64Uses variable-length encoding.uint64longint/longuint64ulonginteger/stringBignum or Fixnum (as required)
sint32Uses variable-length encoding. Signed int value. These more efficiently encode negative numbers than regular int32s.int32intintint32intintegerBignum or Fixnum (as required)
sint64Uses variable-length encoding. Signed int value. These more efficiently encode negative numbers than regular int64s.int64longint/longint64longinteger/stringBignum
fixed32Always four bytes. More efficient than uint32 if values are often greater than 2^28.uint32intintuint32uintintegerBignum or Fixnum (as required)
fixed64Always eight bytes. More efficient than uint64 if values are often greater than 2^56.uint64longint/longuint64ulonginteger/stringBignum
sfixed32Always four bytes.int32intintint32intintegerBignum or Fixnum (as required)
sfixed64Always eight bytes.int64longint/longint64longinteger/stringBignum
boolboolbooleanbooleanboolboolbooleanTrueClass/FalseClass
stringA string must always contain UTF-8 encoded or 7-bit ASCII text.stringStringstr/unicodestringstringstringString (UTF-8)
bytesMay contain any arbitrary sequence of bytes.stringByteStringstr[]byteByteStringstringString (ASCII-8BIT)