Reference documentation and code samples for the Grafeas V1 API module Grafeas::V1::VulnerabilityAssessmentNote::Assessment::Justification::JustificationType.
Provides the type of justification.
Constants
JUSTIFICATION_TYPE_UNSPECIFIED
value: 0 JUSTIFICATION_TYPE_UNSPECIFIED.
COMPONENT_NOT_PRESENT
value: 1 The vulnerable component is not present in the product.
VULNERABLE_CODE_NOT_PRESENT
value: 2 The vulnerable code is not present. Typically this case
occurs when source code is configured or built in a way that excludes
the vulnerable code.
VULNERABLE_CODE_NOT_IN_EXECUTE_PATH
value: 3 The vulnerable code can not be executed.
Typically this case occurs when the product includes the vulnerable
code but does not call or use the vulnerable code.
VULNERABLE_CODE_CANNOT_BE_CONTROLLED_BY_ADVERSARY
value: 4 The vulnerable code cannot be controlled by an attacker to exploit
the vulnerability.
INLINE_MITIGATIONS_ALREADY_EXIST
value: 5 The product includes built-in protections or features that prevent
exploitation of the vulnerability. These built-in protections cannot
be subverted by the attacker and cannot be configured or disabled by
the user. These mitigations completely prevent exploitation based on
known attack vectors.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-04 UTC."],[],[],null,["# Grafeas V1 API - Module Grafeas::V1::VulnerabilityAssessmentNote::Assessment::Justification::JustificationType (v1.4.0)\n\nVersion latestkeyboard_arrow_down\n\n- [1.4.0 (latest)](/ruby/docs/reference/grafeas-v1/latest/Grafeas-V1-VulnerabilityAssessmentNote-Assessment-Justification-JustificationType)\n- [1.3.1](/ruby/docs/reference/grafeas-v1/1.3.1/Grafeas-V1-VulnerabilityAssessmentNote-Assessment-Justification-JustificationType)\n- [1.2.0](/ruby/docs/reference/grafeas-v1/1.2.0/Grafeas-V1-VulnerabilityAssessmentNote-Assessment-Justification-JustificationType)\n- [1.1.1](/ruby/docs/reference/grafeas-v1/1.1.1/Grafeas-V1-VulnerabilityAssessmentNote-Assessment-Justification-JustificationType)\n- [1.0.0](/ruby/docs/reference/grafeas-v1/1.0.0/Grafeas-V1-VulnerabilityAssessmentNote-Assessment-Justification-JustificationType)\n- [0.16.1](/ruby/docs/reference/grafeas-v1/0.16.1/Grafeas-V1-VulnerabilityAssessmentNote-Assessment-Justification-JustificationType)\n- [0.15.0](/ruby/docs/reference/grafeas-v1/0.15.0/Grafeas-V1-VulnerabilityAssessmentNote-Assessment-Justification-JustificationType)\n- [0.14.2](/ruby/docs/reference/grafeas-v1/0.14.2/Grafeas-V1-VulnerabilityAssessmentNote-Assessment-Justification-JustificationType)\n- [0.13.0](/ruby/docs/reference/grafeas-v1/0.13.0/Grafeas-V1-VulnerabilityAssessmentNote-Assessment-Justification-JustificationType)\n- [0.12.1](/ruby/docs/reference/grafeas-v1/0.12.1/Grafeas-V1-VulnerabilityAssessmentNote-Assessment-Justification-JustificationType)\n- [0.11.0](/ruby/docs/reference/grafeas-v1/0.11.0/Grafeas-V1-VulnerabilityAssessmentNote-Assessment-Justification-JustificationType)\n- [0.10.0](/ruby/docs/reference/grafeas-v1/0.10.0/Grafeas-V1-VulnerabilityAssessmentNote-Assessment-Justification-JustificationType)\n- [0.9.0](/ruby/docs/reference/grafeas-v1/0.9.0/Grafeas-V1-VulnerabilityAssessmentNote-Assessment-Justification-JustificationType)\n- [0.8.0](/ruby/docs/reference/grafeas-v1/0.8.0/Grafeas-V1-VulnerabilityAssessmentNote-Assessment-Justification-JustificationType)\n- [0.7.0](/ruby/docs/reference/grafeas-v1/0.7.0/Grafeas-V1-VulnerabilityAssessmentNote-Assessment-Justification-JustificationType)\n- [0.6.1](/ruby/docs/reference/grafeas-v1/0.6.1/Grafeas-V1-VulnerabilityAssessmentNote-Assessment-Justification-JustificationType)\n- [0.5.0](/ruby/docs/reference/grafeas-v1/0.5.0/Grafeas-V1-VulnerabilityAssessmentNote-Assessment-Justification-JustificationType)\n- [0.4.0](/ruby/docs/reference/grafeas-v1/0.4.0/Grafeas-V1-VulnerabilityAssessmentNote-Assessment-Justification-JustificationType)\n- [0.3.1](/ruby/docs/reference/grafeas-v1/0.3.1/Grafeas-V1-VulnerabilityAssessmentNote-Assessment-Justification-JustificationType) \nReference documentation and code samples for the Grafeas V1 API module Grafeas::V1::VulnerabilityAssessmentNote::Assessment::Justification::JustificationType.\n\nProvides the type of justification.\n\nConstants\n---------\n\n### JUSTIFICATION_TYPE_UNSPECIFIED\n\n**value:** 0 \nJUSTIFICATION_TYPE_UNSPECIFIED.\n\n### COMPONENT_NOT_PRESENT\n\n**value:** 1 \nThe vulnerable component is not present in the product.\n\n### VULNERABLE_CODE_NOT_PRESENT\n\n**value:** 2 \nThe vulnerable code is not present. Typically this case\noccurs when source code is configured or built in a way that excludes\nthe vulnerable code.\n\n### VULNERABLE_CODE_NOT_IN_EXECUTE_PATH\n\n**value:** 3 \nThe vulnerable code can not be executed.\nTypically this case occurs when the product includes the vulnerable\ncode but does not call or use the vulnerable code.\n\n### VULNERABLE_CODE_CANNOT_BE_CONTROLLED_BY_ADVERSARY\n\n**value:** 4 \nThe vulnerable code cannot be controlled by an attacker to exploit\nthe vulnerability.\n\n### INLINE_MITIGATIONS_ALREADY_EXIST\n\n**value:** 5 \nThe product includes built-in protections or features that prevent\nexploitation of the vulnerability. These built-in protections cannot\nbe subverted by the attacker and cannot be configured or disabled by\nthe user. These mitigations completely prevent exploitation based on\nknown attack vectors."]]