[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-08-07。"],[],[],null,["# View Python package vulnerabilities\n\n| **Preview**\n|\n|\n| This feature is subject to the \"Pre-GA Offerings Terms\" in the General Service Terms section\n| of the [Service Specific Terms](/terms/service-terms#1).\n|\n| Pre-GA features are available \"as is\" and might have limited support.\n|\n| For more information, see the\n| [launch stage descriptions](/products#product-launch-stages).\n|\n| **Note:** This feature is available with either the\n| [Enterprise or Premium tier](/security-command-center/docs/service-tiers) of Security Command Center.\n\nThis page describes how you can view the vulnerabilities in Python\npackages that were detected by Notebook Security Scanner.\n\nFilter package vulnerability findings\n-------------------------------------\n\nFor Notebook Security Scanner, you can filter the package vulnerability findings\nby using the category, source display name, severity, and project ID.\n\n1. Go to the Security Command Center **Findings** page.\n\n [Go to Findings](https://console.cloud.google.com/security/command-center/findingsv2)\n2. In the project selector, select the project or organization\n for which you need to view the package vulnerability findings.\n\n The **Findings** page displays findings only for the project or organization that you\n selected.\n3. In the **Quick filters** section, select one or more of the following:\n\n - In the **Category** section, select **Package vulnerability**.\n - In the **Project ID** section, select your project ID.\n - In the **Source display name** section, select **Notebook Security Scanner**.\n - In the **Severity** section, select the required severity value.\n\n The **Findings** page displays a list of findings that match the type\n you selected.\n\nView older package vulnerability findings\n-----------------------------------------\n\nBy default, the Security Command Center **Findings** page displays only active package\nvulnerability findings that are less than seven days old.\n\nIf you want to view package vulnerability findings that are older than\nseven days and have not been addressed, do the following:\n\n1. Go to the Security Command Center **Findings** page.\n\n [Go to Findings](https://console.cloud.google.com/security/command-center/findingsv2)\n2. In the project selector, select the project or organization\n for which you need to view the package vulnerability findings.\n\n The **Findings** page displays findings only for the project or organization that you\n selected.\n3. In the **Time range** list, select the required time range.\n\n You can also add more filters such as **Source display name** and **Category**.\n4. If you want to view the package vulnerability findings that are published after a\n particular timestamp, do the following:\n\n 1. Click **Edit Query**.\n 2. In the **Query Editor** , add a condition on `create_time` and `parent_display_name`.\n\n The following example query displays the active package vulnerability\n findings that are created after 2024-07-16. \n\n state=\"ACTIVE\"\n AND NOT mute=\"MUTED\"\n AND parent_display_name=\"Notebook Security Scanner\"\n AND create_time \u003e \"2024-07-16\"\n\nWhat's next\n-----------\n\n- Learn more about [filtering vulnerability findings in Security Command Center](/security-command-center/docs/filter-vulnerability-findings)."]]