dataset_name
stringclasses
2 values
api_definition
stringlengths
365
6.49k
api_name
stringlengths
9
47
cvecpe
{\n "name": "count_cvecpe_items",\n "description": "This function counts the total number of CVE and CPE items provided in the arg.",\n "parameters": {\n "type": "object",\n "properties": {\n "cvecpeList": {\n "type": "list",\n "description": "This arg takes in a list of CVE or CPE items.",\n }\n },\n "required": ["cvecpeList"],\n },\n}
count_cvecpe_items
cvecpe
{\n "name": "summarize_cvecpes",\n "description": "This function can summarize the contents of provided CVE or CPE items.",\n "parameters": {\n "type": "object",\n "properties": {\n "cvecpeList": {\n "type": "list",\n "description": "This arg takes in a list of CVE or CPE items.",\n }\n },\n "required": ["cvecpeList"],\n },\n}
summarize_cvecpes
cvecpe
{\n "name": "verify_and_process_data_range_start",\n "description": "This function can verify whether the range of dates being searched is within 3 months. If true, it returns the original startdate. If not, it will automatically truncate and return an appropriate startdate resulting in a 3-month time span. Note that searchCVE or searchCPE cannot handle time span longer than 3 months.",\n "parameters": {\n "type": "object",\n "properties": {\n "startdate": {\n "type": "str",\n "description": "The start date of the searched time span.",\n },\n "enddate": {\n "type": "str",\n "description": "The end date of the searched time span.",\n },\n },\n "required": ["startdate", "enddate"],\n },\n}
verify_and_process_data_range_start
cvecpe
{\n "name": "verify_and_process_data_range_end",\n "description": "This function can verify whether the range of dates being searched is within 3 months. If true, it returns the original enddate. If not, it will automatically truncate and return an appropriate enddate resulting in a 3-month time span. Note that searchCVE or searchCPE cannot handle time span longer than 3 months.",\n "parameters": {\n "type": "object",\n "properties": {\n "startdate": {\n "type": "str",\n "description": "The start date of the searched time span."\n },\n "enddate": {\n "type": "str",\n "description": "The end date of the searched time span."\n }\n },\n "required": ["startdate", "enddate"]\n }\n}
verify_and_process_data_range_end
cvecpe
{\n "name": "compare_cvecpes",\n "description": "This function can compare the contents of two lists of provided CVE or CPE items, summarizing the common parts and differences between the two lists.",\n "parameters": {\n "type": "object",\n "properties": {\n "cvecpeList1": {\n "type": "list",\n "description": "This arg takes in a list of CVE or CPE items to compare with another list.",\n },\n "cvecpeList2": {\n "type": "list",\n "description": "This arg takes in a list of CVE or CPE items to compare with another list.",\n }\n },\n "required": ["cvecpeList1", "cvecpeList2"],\n },\n}
compare_cvecpes
cvecpe
{\n "name": "search_backup_keywords",\n "description": "This function takes in a backup keyword and a list of CVE or CPE items found by an initial searchCVE or searchCPE. If the list is empty, the function will search again using the backup keyword instead of the original keyword. If it is not empty, the function returns the original searched results.",\n "parameters": {\n "type": "object",\n "properties": {\n "cvecpeList": {\n "type": "list",\n "description": "This arg takes in a list of CVE or CPE items."\n },\n "backup_keyword": {\n "type": "str",\n "description": "The backup keyword to search if the original keyword doesn\'t lead to corresponding results."\n }\n },\n "required": ["cvecpeList", "backup_keyword"]\n }\n}
search_backup_keywords
cvecpe
{\n "name": "getCPEName",\n "description": "This function takes a CPE object and extracts the CPE name. Args: - cpeObject: A CPE object from which the CPE name is to be extracted. The object should have a \'cpeName\' field, Returns: - str: The CPE name retrieved from the CPE object.",\n "parameters": {\n "type": "object",\n "properties": {\n "cpeObject": {\n "type": "object",\n "description": "A CPE object from which the CPE name is to be extracted. The object should have a \'cpeName\' field."\n }\n },\n "required": ["cpeObject"],\n },\n}
getCPEName
cvecpe
{\n "name": "get_first_object_from_list",\n "description": "Retrieves the first object from a given list. If the list is empty, it return `None`. Args: - list_of_objects: list, required, List containing objects from which the function will pick out the first object.",\n "parameters": {\n "type": "object",\n "properties": {\n "list_of_objects": {\n "type": "list",\n "description": "List containing objects.",\n }\n },\n "required": ["list_of_objects"],\n },\n}
get_first_object_from_list
cvecpe
{\n "name": "countCVEsBySeverity",\n "description": "Analyze a list of CVE objects, and return a dictionary with counts of CVEs according to their \'cvssV3Severity\' (LOW, MEDIUM, HIGH, CRITICAL).",\n "parameters": {\n "type": "object",\n "properties": {\n "cve_list": {\n "type": "list",\n "description": "A list of dictionary objects each representing a CVE. Each dictionary should include a \'cvssV3Severity\' key.",\n }\n },\n "required": ["cve_list"],\n },\n}
countCVEsBySeverity
cvecpe
{\n "name": "sortCVEsByCVSSv3Score",\n "description": "Accepts a list of CVE objects and sorts them by their CVSS Version 3.x base scores. If a CVE object does not contain a CVSS v3 score, it is assumed to have the lowest possible score (i.e., 0). Args: - cve_list (list): List of CVE objects, where each object contains details such as CVE identifier, CVSS v2 and v3 scores, etc. - descending (bool, optional): If set to True, the list will be sorted in descending order (highest CVSSv3Score first). Defaults to True. Returns: - list: The input list of CVEs sorted in decreasing order of their CVSS Version 3.x base scores.",\n "parameters": {\n "type": "object",\n "properties": {\n "cve_list": {\n "type": "list",\n "description": "List of CVE objects, where each object contains details such as CVE identifier, CVSS v2 and v3 scores, etc."\n },\n "descending": {\n "type": "bool",\n "description": "If set to True, the list will be sorted in descending order (highest CVSSv3Score first)."\n }\n },\n "required": ["cve_list"]\n }\n}
sortCVEsByCVSSv3Score
cvecpe
{\n "name": "sortCVEsByCVSSv2Score",\n "description": "Accepts a list of CVE objects and sorts them by their CVSS Version 2.0 base scores. If a CVE object does not contain a CVSS v2 score, it is assumed to have the lowest possible score (i.e., 0). Returns: list: The input list of CVEs sorted in decreasing order of their CVSS Version 2.0 base scores.",\n "parameters": {\n "type": "object",\n "properties": {\n "cve_list": {\n "type": "list",\n "description": "List of CVE objects, where each object contains details such as CVE identifier, CVSS v2 and v3 scores, etc.",\n },\n "descending": {\n "type": "bool",\n "description": "If set to True, the list will be sorted in descending order (highest CVSSv2Score first). Defaults to True.",\n },\n },\n "required": ["cve_list"],\n },\n}
sortCVEsByCVSSv2Score
cvecpe
{\n "name": "sortCVEsByModDate",\n "description": "This function sorts a list of CVE objects by their last modification date. Args: - cve_list (list of CVE objects): A required list of CVE objects. Each object should at least have a property for last modification date. - descending (bool, optional): If set to True, the list will be sorted in descending order (most recently modified first). Defaults to True. Returns: - list of CVE objects: Sorted list of CVE objects.",\n "parameters": {\n "type": "object",\n "properties": {\n "cve_list": {\n "type": "list",\n "description": "A list of CVE objects. Each object should at least have a property for last modification date.",\n },\n "descending": {"type": "bool", "description": "If set to True, the list will be sorted in descending order (most recently modified first). Defaults to True."},\n },\n "required": ["cve_list"],\n },\n}
sortCVEsByModDate
cvecpe
{\n "name": "filterCVEByLanguage",\n "description": "Filters a collection of CVE (Common Vulnerabilities and Exposures) objects and returns a list of the ones that have descriptions for a specific language.",\n "parameters": {\n "type": "object",\n "properties": {\n "cve_list": {\n "type": "list",\n "description": "A list of CVE objects. Each object should contain information about a particular CVE, including its description available in various languages."\n },\n "language": {\n "type": "str",\n "description": "Language code for which the function will check in the description field of the CVE objects. This must follow the ISO 639-1 language codes, such as \'en\' for English, \'es\' for Spanish, and \'de\' for German, etc."\n }\n },\n "required": ["cve_list", "language"]\n }\n}
filterCVEByLanguage
cvecpe
{\n "name": "filterCVEsBySeverity",\n "description": "Returns a list of CVE objects from the given collection that have the provided severity level. Args: - cveList: list, required, List of objects containing a collection of CVEs. Each CVE object is expected to have \'cvssV2Severity\' and/or \'cvssV3Severity\' properties reflecting the severity level of the vulnerability. - severityLevel: str, required, The severity level with which to filter the CVEs. Accepts \'LOW\', \'MEDIUM\', \'HIGH\' for both \'cvssV2Severity\' and \'cvssV3Severity\', and \'CRITICAL\' for \'cvssV3Severity\' only. Returns: - matchingCVEs: list, Only the objects from the given CVE list that have the provided severity level.",\n "parameters": {\n "type": "object",\n "properties": {\n "cveList": {\n "type": "list",\n "description": "List of objects containing a collection of CVEs. Each CVE object is expected to have \'cvssV2Severity\' and/or \'cvssV3Severity\' properties reflecting the severity level of the vulnerability.",\n },\n "severityLevel": {\n "type": "str",\n "description": "The severity level with which to filter the CVEs. Accepts \'LOW\', \'MEDIUM\', \'HIGH\' for both \'cvssV2Severity\' and \'cvssV3Severity\', and \'CRITICAL\' for \'cvssV3Severity\' only."\n },\n },\n "required": ["cveList", "severityLevel"]\n }\n}
filterCVEsBySeverity
cvecpe
{\n "name": "filterDeprecatedCPEs",\n "description": "Loop through the CPE objects in the list and return the ones that are not deprecated. Args: - cpeList (list): A list of CPE objects. Each CPE object has a \'deprecated\' key. If the value of this key is False, it means the CPE object is not deprecated. Returns: - cpeList (list): This function will return a list of non-deprecated CPE objects.",\n "parameters": {\n "type": "object",\n "properties": {\n "cpeList": {\n "type": "list",\n "description": "A list of CPE objects. Each CPE object in the list has a \'deprecated\' key. If the value of this key is False, it means the CPE object is not deprecated.",\n }\n },\n "required": ["cpeList"],\n }\n}
filterDeprecatedCPEs
cvecpe
{\n "name": "sortCPEsByLastMod",\n "description": "Sorts a list of object collections of CPEs by their last modification time. Args: - cpeList (list): The list of object collections of CPEs that need to be sorted. Each object collection has a lastModified field. - descending (bool): Determines the order of sort. If True, CPEs will be sorted in descending order of \'last modification time\'. If False, the sorting will be in ascending order. Default value is True. Returns: - List of object collections of CPEs sorted by the lastModified field.",\n "parameters": {\n "type": "object",\n "properties": {\n "cpeList": {\n "type": "list",\n "description": "The list of object collections of CPEs that need to be sorted. Each object collection has a lastModified field."\n },\n "descending": {\n "type": "bool",\n "description": "Determines the order of sort. If True, CPEs will be sorted in descending order of \'last modification time\'. If False, the sorting will be in descending order.",\n "default": "True"\n }\n },\n "required": ["cpeList"],\n },\n}
sortCPEsByLastMod
cvecpe
{\n "name": "mergeCVEs",\n "description": "This function takes two lists of objects each containing a collection of CVEs, and combines them into a single list.",\n "parameters": {\n "type": "object",\n "properties": {\n "list1": {\n "type": "list",\n "description": "First list of objects each holding details of a CVE. Defined by NVD format.",\n },\n "list2": {\n "type": "list",\n "description": "Second list of objects each holding details of a CVE. Defined by NVD format."\n }\n },\n "required": ["list1", "list2"],\n }\n}
mergeCVEs
cvecpe
{\n "name": "mergeCPEs",\n "description": "Combines two lists of CPEs into one. Args: - list1 (list): List of CPEs. Each object in the list should contain a collection of CPEs. - list2 (list): Another list of CPEs. Each object in this list should also contain a collection of CPEs. Returns: - combined_list (list): A combined list of CPEs from both the input lists.",\n "parameters": {\n "type": "object",\n "properties": {\n "list1": {\n "type": "list",\n "description": "List of CPEs. Each object in the list should contain a collection of CPEs."\n },\n "list2": {\n "type": "list",\n "description": "Another list of CPEs. Each object in this list should also contain a collection of CPEs."\n }\n },\n "required": ["list1", "list2"]\n },\n}
mergeCPEs
cvecpe
{\n "name": "searchCVE",\n "description": "NVDLib is a Python API wrapper utilizing the REST API provided by NIST for the National Vulnerability Database (NVD). NVDLib CVESearch can search specific CVEs according to the uses\' requests.",\n "parameters": {\n "type": "object",\n "properties": {\n "cpeName": {\n "type": "str",\n "description": "This value will be compared against the CPE Match Criteria within a CVE applicability statement. Partial match strings are allowed.",\n },\n "cveId": {"type": "str","description": "Returns a single CVE that already exists in the NVD."},\n "cvssV2Metrics": { "type": "str","description": "This parameter returns only the CVEs that match the provided CVSSv2 vector string. Either full or partial vector strings may be used. This parameter cannot be used in requests that include cvssV3Metrics."},\n "cvssV2Severity": {"type": "str", "description": "Find vulnerabilities having a \'LOW\', \'MEDIUM\', or \'HIGH\' version 2 severity."},\n "cvssV3Metrics": {"type": "str", "description": "This parameter returns only the CVEs that match the provided CVSSv3 vector string. Either full or partial vector strings may be used. This parameter cannot be used in requests that include cvssV2Metrics."},\n "cvssV3Severity": {"type": "str", "description": "Find vulnerabilities having a \'LOW\', \'MEDIUM\', \'HIGH\', or \'CRITICAL\' version 3 severity."},\n "cweId": {"type": "str", "description": "Filter collection by CWE (Common Weakness Enumeration) ID. A CVE can have multiple CWE IDs assigned to it."},\n "hasCertAlerts": {"type": "bool", "description": "Returns CVE that contain a Technical Alert from US-CERT."},\n "hasCertNotes": {"type": "bool", "description": "Returns CVE that contain a Vulnerability Note from CERT/CC."},\n "hasOval": {"type": "bool", "description": "Returns CVE that contain information from MITRE\'s Open Vulnerability and Assessment Language (OVAL) before this transitioned to the Center for Internet Security (CIS)."},\n "isVulnerable": {"type": "bool", "description": "Returns CVE associated with a specific CPE, where the CPE is also considered vulnerable. REQUIRES cpeName parameter. isVulnerable is not compatible with virtualMatchString parameter."},\n "keywordExactMatch": {"type": "bool", "description": "When keywordSearch is used along with keywordExactmatch, it will search the NVD for CVEs containing exactly what was passed to keywordSearch. REQUIRES keywordSearch."},\n "keywordSearch": {"type": "str", "description": "Searches CVEs where a word or phrase is found in the current description. If passing multiple keywords with a space character in between then each word must exist somewhere in the description, not necessarily together unless keywordExactMatch=True is passed to searchCVE."},\n "lastModStartDate": {"type": "str", "description": "This argument has a str with datetime format. These parameters return only the CVEs that were last modified during the specified period. If a CVE has been modified more recently than the specified period, it will not be included in the response. If filtering by the last modified date, both lastModStartDate and lastModEndDate are REQUIRED. The maximum allowable range when using any date range parameters is 120 consecutive days."},\n "lastModEndDate": {"type": "str", "description": "This argument has a str with datetime format. Required if using lastModStartDate."},\n "noRejected": {"type": "bool", "description": "Filters out all CVEs that are in a reject or rejected status. Searches without this parameter include rejected CVEs."},\n "pubStartDate": {"type": "str", "description": "This argument has a str with datetime format. These parameters return only the CVEs that were added to the NVD during the specified period. If filtering by the published date, both pubStartDate and pubEndDate are REQUIRED. The maximum allowable range when using any date range parameters is 120 consecutive days."},\n "pubEndDate": {"type": "str", "description": "This argument has a str with datetime format. Required if using pubStartDate."},\n "sourceIdentifier": {"type": "str", "description": "Returns CVE where the data source of the CVE is the value that is passed to sourceIdentifier."},\n "versionEnd": {"type": "str", "description": "Must be combined with versionEndType and virtualMatchString. Returns only the CVEs associated with CPEs in specific version ranges."},\n "versionEndType": {"type": "str", "description": "Must be combined with versionEnd and virtualMatchString. Valid values are including or excluding. Denotes to include the specified version in versionEnd, or exclude it."},\n "versionStart": {"type": "str", "description": "Must be combined with versionStartType and virtualMatchString. Returns only CVEs with specific versions. Requests that include versionStart cannot include a version component in the virtualMatchString."},\n "versionStartType": {"type": "str", "description": "Must be combined with versionStart and virtualMatchString. Valid values are including or excluding. Denotes to include the specified version in versionStart, or exclude it."},\n "virtualMatchString": {"type": "str", "description": "A more broad filter compared to cpeName. The cpe match string that is passed to virtualMatchString is compared against the CPE Match Criteria present on CVE applicability statements."},\n "limit": {"type": "int", "description": "Custom argument to limit the number of results of the search. Allowed any number between 1 and 2000."},\n "delay": {"type": "int", "description": "Can only be used if an API key is provided. This allows the user to define a delay. The delay must be greater than 0.6 seconds. The NVD API recommends scripts sleep for at least 6 seconds in between requests."},\n "key": {"type": "str", "description": "NVD API Key. Allows for the user to define a delay. NVD recommends scripts sleep 6 seconds in between requests. If no valid API key is provided, requests are sent with a 6 second delay."},\n "verbose": {"type": "bool", "description": "Prints the full NVD API URL for each request."},\n },\n "required": [],\n },\n}
searchCVE
cvecpe
{\n "name": "searchCPE",\n "description": "NVDLib is a Python API wrapper utilizing the REST API provided by NIST for the National Vulnerability Database (NVD). Searching for CPEs is similar to searching for CVEs albeit less parameters. CPE match strings are allowed, meaning if partial strings are known, you can search for all possible CPE names. Like searching CVEs, the parameters are not positional.",\n "parameters": {\n "type": "object",\n "properties": {\n "cpeNameId": {\n "type": "str",\n "description": "Returns a specific CPE record using its UUID. If a correctly formatted UUID is passed but it does not exist, it will return empty results. The UUID is the cpeNameId value when searching CPE."\n },\n "cpeMatchString": {\n "type": "str",\n "description": "Use a partial CPE name to search for other CPE names."\n },\n "keywordExactMatch": {\n "type": "bool",\n "description": "Searches metadata within CPE title and reference links for an exact match of the phrase or word passed to it. Must be included with keywordSearch."\n },\n "keywordSearch": {\n "type": "str",\n "description": "Returns CPE records where a word or phrase is found in the metadata title or reference links. Space characters act as an AND statement."\n },\n "lastModStartDate": {\n "type": "str/datetime obj",\n "description": "CPE last modification start date. Maximum 120 day range. A start and end date is required. All times are in UTC 00:00. A datetime object or string can be passed as a date. NVDLib will automatically parse the datetime object into the correct format. String Example: 2020-06-28 00:00"\n },\n "lastModEndDate": {\n "type": "str/datetime obj",\n "description": "CPE last modification end date. Maximum 120 day range. Must be included with lastModStartDate. Example: 2020-06-28 00:00"\n },\n "limit": {\n "type": "int",\n "description": "Limits the number of results of the search."\n },\n "key": {\n "type": "str",\n "description": "NVD API Key. Allows for a request every 0.6 seconds instead of 6 seconds."\n },\n "delay": {\n "type": "int/float",\n "description": "Can only be used if an API key is provided. The amount of time to sleep in between requests. Must be a value above 0.6 seconds if an API key is present. delay is set to 6 seconds if no API key is passed."\n },\n "verbose": {\n "type": "bool",\n "description": "Prints the URL request for debugging purposes."\n }\n }\n },\n "required": [],\n "responses": {\n "CPEs": {\n "type": "array",\n "items": {\n "type": "string"\n }\n }\n }\n}
searchCPE
virustotal
{\n "name": "get_random_object_from_list",\n "description": "This function selects and returns a random object from a list of objects. It is designed to handle any list length, including empty lists",\n "parameters": {\n "type": "object",\n "properties": {\n "list_of_objects": {\n "type": "array",\n "description": "List containing objects from which the function will pick out a random object",\n },\n },\n "required": ["list_of_objects"],\n },\n}
get_random_object_from_list
virustotal
Here is the transformed format:\n{\n "name": "get_first_object_from_list",\n "description": "Retrieves the first object from a given list. If the list is empty, it return `None`.",\n "parameters": {\n "type": "object",\n "properties": {\n "list_of_objects": {\n "type": "array",\n "description": "List containing objects from which the function will pick out the first object.",\n },\n },\n "required": ["list_of_objects"],\n },\n}
get_first_object_from_list
virustotal
{\n "name": "calculate_sum_of_numbers",\n "description": "Computes the sum of two numbers provided. Input numbers can be either integer or floating-point values.",\n "parameters": {\n "type": "object",\n "properties": {\n "num1": {\n "type": ["integer", "float"],\n "description": "The first number",\n },\n "num2": {\n "type": ["integer", "float"],\n "description": "The second number",\n },\n },\n "required": ["num1", "num2"],\n },\n}
calculate_sum_of_numbers
virustotal
{\n "name": "extract_resolution_date",\n "description": "Extracts the date of DNS resolution from a DNS resolution object. The date is returned as a Unix timestamp.",\n "parameters": {\n "type": "object",\n "properties": {\n "dns_res_obj": {\n "type": "object",\n "description": "The DNS resolution object from which the date of resolution is to be extracted.",\n },\n },\n "required": ["dns_res_obj"],\n },\n}
extract_resolution_date
virustotal
{\n "name": "count_items_in_list",\n "description": "This function takes a list as an input and returns the number of items present in the list.",\n "parameters": {\n "type": "object",\n "properties": {\n "input_list": {\n "type": "list",\n "description": "List whose items are to be counted",\n }\n },\n "required": ["input_list"],\n },\n}
count_items_in_list
virustotal
{\n "name": "vt_get_majority_vote",\n "description": "This function takes a dictionary of votes returns the name with the majority votes. If the votes are equal, it will return the first encountered key in the dictionary.",\n "parameters": {\n "type": "object",\n "properties": {\n "votes": {\n "type": "dictionary",\n "description": "dictionary of votes",\n },\n },\n "required": ["votes"],\n },\n}
vt_get_majority_vote
virustotal
{\n "name": "vt_get_multiple_domain_reports",\n "description": "retrieves reports for a list of domains provided. For each domain in the list, it requests the collected information regarding that domain from VirusTotal.",\n "parameters": {\n "type": "object",\n "properties": {\n "domains": {\n "type": "array",\n "items": {\n "type": "string"\n },\n "description": "A list of Domain names",\n },\n "x_apikey": {\n "type": "string",\n "description": "Your API key"\n },\n },\n "required": ["domains", "x_apikey"],\n }\n}
vt_get_multiple_domain_reports
virustotal
{\n "name": "vt_get_comments_on_multiple_domains",\n "description": "This function will retrieve comments for each specified domain in the given list",\n "parameters": {\n "type": "object",\n "properties": {\n "domains": {\n "type": "array",\n "items": {\n "type": "string"\n },\n "description": "List of domain names",\n },\n "x_apikey": {\n "type": "string",\n "description": "Your API key"}\n ,\n "limit": {\n "type": "int32",\n "description": "Maximum number of comments to retrieve for each domain"\n },\n "cursor": {\n "type": "string",\n "description": "Continuation cursor"\n },\n },\n "required": ["domains", "x_apikey"],\n },\n}
vt_get_comments_on_multiple_domains
virustotal
{\n "name": "vt_get_last_analysis_date_from_report",\n "description": "This function retrieves the last analysis date from the domain report collected by VirusTotal. The returned date is in Unix timestamp format.",\n "parameters": {\n "type": "object",\n "properties": {\n "report": {\n "type": "dict",\n "description": "The domain report collected by vt_get_domain_report function.",\n }\n },\n "required": ["report"],\n },\n}
vt_get_last_analysis_date_from_report
virustotal
{\n "name": "vt_is_date_within_range",\n "description": "Checks if a given Unix timestamp is within a specified date range. The range is specified by \'start\' and \'end\' dates formatted as \'YYYY/MM/DD\'. It\'s permissible for only one of \'start\' or \'end\' to be present in the function call. If \'start\' is not provided, the function checks if the timestamp is earlier than or equal to the \'end\' date. Similarly, If \'end\' is not provided, the function checks if the timestamp is later than or equal to the \'start\' date.",\n "parameters": {\n "type": "object",\n "properties": {\n "timestamp": {\n "type": "integer",\n "description": "Unix timestamp"\n },\n "start": {\n "type": "string",\n "description": "Start of the date range in \'YYYY/MM/DD\' format",\n },\n "end": {\n "type": "string",\n "description": "End of the date range in \'YYYY/MM/DD\' format",\n }\n },\n "required": ["timestamp"],\n },\n}
vt_is_date_within_range
virustotal
{\n "name": "convert_unix_timestamp_to_date",\n "description": "Converts a UNIX timestamp to a human-readable date in the format \'YYYY/MM/DD\'",\n "parameters": {\n "type": "object",\n "properties": {\n "unix_timestamp": {\n "type": "integer",\n "description": "The UNIX timestamp to be converted"\n }\n },\n "required": ["unix_timestamp"]\n }\n}
convert_unix_timestamp_to_date
virustotal
{\n "name": "vt_get_threat_actors_latest_modification_date",\n "description": "This function retrieves the latest modification date from a list of threat actor objects. It iterates through each threat actor object, checks its modification date, and returns the most recent modification date.",\n "parameters": {\n "type": "object",\n "properties": {\n "threat_actor_objects": {\n "type": "array",\n "items": { "type": "object" },\n "description": "A list of threat actor objects."\n },\n "x_apikey": {\n "type": "string",\n "description": "Your API key."\n }\n },\n "required": ["threat_actor_objects", "x_apikey"]\n }\n}
vt_get_threat_actors_latest_modification_date
virustotal
{\n "name": "vt_get_threat_actors_main_source_region",\n "description": "This function takes a list of threat actor objects and returns the primary source region among them. Each threat actor object has an attribute \'source region\', and the function analyses this attribute across all objects to determine and return the most common source region, deemed as the \'main\' source region.",\n "parameters": {\n "type": "object",\n "properties": {\n "threat_actors": {\n "type": "array",\n "items": {\n "type": "object"\n },\n "description": "List of threat actor objects"\n },\n "x_apikey": {\n "type": "string",\n "description": "Your API key."\n }\n },\n "required": ["threat_actors", "x_apikey"],\n }\n}
vt_get_threat_actors_main_source_region
virustotal
{\n "name": "vt_validate_historical_ssl_certificates",\n "description": "This function takes historical SSL certificates as input and checks if there is at least one valid SSL certificate present inside the provided historical data. It validates the SSL certificate by checking whether it is not expired and its issuing authority is trustworthy.",\n "parameters": {\n "type": "object",\n "properties": {\n "historical_ssl_certificates": {\n "type": "list",\n "description": "List of SSL certificates in the history"\n },\n "x_apikey": {\n "type": "string",\n "description": "Your API key"\n }\n },\n "required": ["historical_ssl_certificates", "x_apikey"]\n }\n}
vt_validate_historical_ssl_certificates
virustotal
{\n "name": "vt_get_dns_resolution_object",\n "description": "This endpoint retrieves a Resolution object by its ID. A resolution object ID is made by appending the IP and the domain it resolves to together. Domain-IP resolutions. Resolution objects include the following attributes: date: <integer> date when the resolution was made (UTC timestamp). host_name: <string> domain or subdomain requested to the resolver. host_name_last_analysis_stats: <dictionary> last detection stats from the resolution\'s domain. Similar to the domains\'s last_analysis_stats attribute. ip_address: <string> IP address the domain was resolved to. ip_address_last_analysis_stats: <dictionary> last detection stats from the resolution\'s IP address. Similar to the IP address\' last_analysis_stats attribute. resolver: <string> source of the resolution.",\n "parameters": {\n "type": "object",\n "properties": {\n "id": {\n "type": "string",\n "description": "Resolution object ID",\n },\n "x_apikey": {"type": "string", "description": "Your API key"}\n },\n "required": ["id", "x_apikey"],\n },\n}
vt_get_dns_resolution_object
virustotal
{\n "name": "vt_get_objects_related_to_ip_address",\n "description": "IP addresses have number of relationships to other objects. This returns ALL objects that fit the relationship.",\n "parameters": {\n "type": "object",\n "properties": {\n "ip": {\n "type": "string",\n "description": "IP address"\n },\n "relationship": {\n "type": "string",\n "description": "Relationship name (see the list of items from above)"\n },\n "x_apikey": {\n "type": "string",\n "description": "Your API key"\n },\n "limit": {\n "type": "int32",\n "description": "Maximum number of comments to retrieve"\n },\n "cursor": {\n "type": "string",\n "description": "Continuation cursor"\n }\n },\n "required": ["ip", "relationship", "x_apikey"],\n },\n}
vt_get_objects_related_to_ip_address
virustotal
{\n "name": "vt_get_ip_address_report",\n "description": "Retrieve an IP address report. These reports condense all of the recent activity that VirusTotal has seen for the resource under consideration, as well as contextual information about it. This function specifically generates these reports using the IP address parameter.",\n "parameters": {\n "type": "object",\n "properties": {\n "ip": {\n "type": "string",\n "description": "IP address",\n },\n "x_apikey": {\n "type": "string",\n "description": "Your API key",\n },\n },\n "required": ["ip", "x_apikey"],\n },\n}
vt_get_ip_address_report
virustotal
{\n "name": "vt_add_votes_to_ip_address",\n "description": "With this function you can post a vote for a given file. The body for the POST request must be the JSON representation of a vote object. Note however that you don\'t need to provide an ID for the object, as they are automatically generated for new votes. The verdict attribute must have be either harmless or malicious. Please ensure that the JSON object you provide conforms accurately to valid JSON standards.",\n "parameters": {\n "type": "object",\n "properties": {\n "ip": {\n "type": "string",\n "description": "IP address",\n },\n "data": {\n "type": "json",\n "description": "Vote object"\n },\n "x_apikey": {\n "type": "string",\n "description": "Your API key"\n },\n },\n "required": ["ip", "x_apikey"],\n }, \n}
vt_add_votes_to_ip_address
virustotal
{\n "name": "vt_get_domain_report",\n "description": "Retrieves a domain report. These reports contain information regarding the domain itself that VirusTotal has collected.",\n "parameters": {\n "type": "object",\n "properties": {\n "domain": {\n "type": "string",\n "description": "Domain name",\n },\n "x_apikey": {\n "type": "string",\n "description": "Your API key"\n }\n },\n "required": ["domain", "x_apikey"]\n }\n}
vt_get_domain_report
virustotal
{\n "name": "vt_get_comments_on_ip_address",\n "description": "Retrieves the comments on a provided IP address. Returns a list of Comment objects",\n "parameters": {\n "type": "object",\n "properties": {\n "ip": {\n "type": "string",\n "description": "IP address",\n },\n "x_apikey": {\n "type": "string",\n "description": "Your API key",\n },\n "limit": {\n "type": "int32",\n "description": "Maximum number of comments to retrieve",\n },\n "cursor": {\n "type": "string",\n "description": "Continuation cursor",\n },\n "required": ["ip", "x_apikey"],\n },\n}
vt_get_comments_on_ip_address
virustotal
{\n "name": "vt_add_comment_to_ip_address",\n "description": "With this function you can post a comment for a given IP address. The body for the POST request must be the JSON representation of a comment object. Notice however that you don\'t need to provide an ID for the object, as they are automatically generated for new comments. However, please note that you will need to provide a valid data JSON for using this function. Any word starting with # in your comment\'s text will be considered a tag, and added to the comment\'s tag attribute. Returns a Comment object.",\n "parameters": {\n "type": "object",\n "properties": {\n "ip": {\n "type": "string",\n "description": "IP address",\n },\n "data": {\n "type": "json",\n "description": "A comment object"\n },\n "x_apikey": {\n "type": "string",\n "description": "Your API key"\n }, \n },\n "required": ["ip", "data", "x_apikey"],\n },\n}
vt_add_comment_to_ip_address
virustotal
{\n "name": "vt_get_object_descriptors_related_to_ip_address",\n "description": "This specifically returns related object\'s IDs (and context attributes, if any). Please note that this will not return all attributes. You are expected to provide the relationship to the object you\'re interested in. The valid relationships are comments, communicating_files, downloaded_files, graphs, historical_ssl_certificates, historical_whois, related_comments, related_references, related_threat_actors, referrer_files, resolutions, urls.",\n "parameters": {\n "type": "object",\n "properties": {\n "ip": {\n "type": "string",\n "description": "IP address"\n },\n "relationship": {\n "type": "string",\n "description": "Relationship name"\n },\n "x_apikey": {\n "type": "string",\n "description": "Your API key"\n },\n "limit": {\n "type": "int32",\n "description": "Maximum number of comments to retrieve"\n },\n "cursor": {\n "type": "string",\n "description": "Continuation cursor"\n }\n },\n "required": ["ip", "relationship", "x_apikey"]\n },\n}
vt_get_object_descriptors_related_to_ip_address
virustotal
Here is the transformed format:\n\n{\n "name": "vt_get_objects_related_to_domain",\n "description": "Objects are a key concept in the VirusTotal API. Each object has an identifier and a type. Each object has an associated URL, and each domain is associated with objects. This function returns ALL of the objects related to the domain, based on the specified relationship.",\n "parameters": {\n "type": "object",\n "properties": {\n "domain": {\n "type": "string",\n "description": "Domain name"\n },\n "relationship": {\n "type": "string",\n "description": "Relationship name (see table)"\n },\n "x_apikey": {\n "type": "string",\n "description": "Your API key"\n },\n "limit": {\n "type": "integer",\n "description": "Maximum number of comments to retrieve"\n },\n "cursor": {\n "type": "string",\n "description": "Continuation cursor"\n }\n },\n "required": ["domain", "relationship", "x_apikey"]\n }\n}
vt_get_objects_related_to_domain
virustotal
{\n "name": "vt_get_object_descriptors_related_to_domain",\n "description": "This specifically returns related object\'s IDs (and context attributes, if any). Please note that this will not return all attributes. This will return objects relating to a domain.",\n "parameters": {\n "type": "object",\n "properties": {\n "domain": {\n "type": "string",\n "description": "Domain name"\n },\n "relationship": {\n "type": "string",\n "description": "Relationship name"\n },\n "x_apikey": {\n "type": "string",\n "description": "Your API key"\n },\n "limit": {\n "type": "int32",\n "description": "Maximum number of comments to retrieve"\n },\n "cursor": {\n "type": "string",\n "description": "Continuation cursor"\n }\n },\n "required": ["domain", "relationship", "x_apikey"]\n },\n "returns": {\n "type": "object",\n "properties": {\n "caa_records": {"type": "string"},\n "cname_records": {"type": "string"},\n "comments": {"type": "string"},\n "communicating_files": {"type": "string"},\n "downloaded_files": {"type": "string"},\n "graphs": {"type": "string"},\n "historical_ssl_certificates": {"type": "string"},\n "historical_whois": {"type": "string"},\n "immediate_parent": {"type": "string"},\n "mx_records": {"type": "string"},\n "ns_records": {"type": "string"},\n "parent": {"type": "string"},\n "referrer_files": {"type": "string"},\n "related_comments": {"type": "string"},\n "related_references": {"type": "string"},\n "related_threat_actors": {"type": "string"},\n "resolutions": {"type": "string"},\n "soa_records": {"type": "string"},\n "siblings": {"type": "string"},\n "subdomains": {"type": "string"},\n "urls": {"type": "string"},\n "user_votes": {"type": "string"}\n }\n }\n}
vt_get_object_descriptors_related_to_domain
virustotal
{\n "name": "vt_get_comments_on_domain",\n "description": "This function will retrieve comments on a specified domain",\n "parameters": {\n "type": "object",\n "properties": {\n "domain": {\n "type": "string",\n "description": "Domain name",\n },\n "x_apikey": {\n "type": "string",\n "description": "Your API key",\n },\n "limit": {\n "type": "int32",\n "description": "Maximum number of comments to retrieve",\n },\n "cursor": {\n "type": "string",\n "description": "Continuation cursor",\n },\n },\n "required": ["domain", "x_apikey"],\n },\n}
vt_get_comments_on_domain
virustotal
{\n "name": "vt_get_votes_on_ip_address",\n "description": "This function will retrieve votes on a provided IP address",\n "parameters": {\n "type": "object",\n "properties": {\n "ip": {\n "type": "string",\n "description": "ip address"\n }\n },\n "required": ["ip"]\n }\n}
vt_get_votes_on_ip_address

Dataset Card for "reformatted_multiapi_openai"

More Information needed

Downloads last month
61
Edit dataset card