Documentation Index
Fetch the complete documentation index at: https://vanta.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Before you begin
This guide is for Vanta admins managing data inside their own Vanta account. You’ll need:- A Manage Vanta API token.
- The token must have scope
vanta-api.all:read. - At least one vulnerability scanner integration connected to Vanta (e.g. Snyk, Qualys, Inspector).
Wiring this into a daily nudge or ticketing automation? Re-mint your token at the top of each run, query
slaDeadlineBeforeDate set to “today + 14 days”, and feed the response into your downstream system.Pick the SLA window
Decide which vulnerabilities to surface. Most teams use one of:
- Approaching breach —
slaDeadlineAfterDate= now,slaDeadlineBeforeDate= now + 7–14 days. - Already breached —
slaDeadlineBeforeDate= now (with noslaDeadlineAfterDate). - All vulnerabilities with an SLA — both params omitted, but
includeVulnerabilitiesWithoutSlas=false.
severity=CRITICAL (or HIGH), isFixAvailable=true, and integrationId=<scanner> to narrow further.Terminal
What other filters can I combine?
What other filters can I combine?
severity (CRITICAL/HIGH/MEDIUM/LOW), isFixAvailable, integrationId, packageIdentifier, vulnerableAssetId, externalVulnerabilityId, q (free-text search), and includeVulnerabilitiesWithoutSlas.Vulnerabilities without SLAs?
Vulnerabilities without SLAs?
By default the endpoint excludes vulnerabilities that have no
remediateByDate. Set includeVulnerabilitiesWithoutSlas=true to include them — useful if a scanner doesn’t emit severities Vanta can map to an SLA.Query vulnerabilities by SLA window
Your terminal — call Expected response (Use
GET /v1/vulnerabilities with the SLA window and any extra filters.200) — paginated vulnerabilities, sorted by remediateByDate ascending (most urgent first):targetId to join back to the affected asset, externalURL to deep-link to your scanner, and remediateByDate to drive your countdown.Got a 401?
Got a 401?
Token is expired (one-hour lifetime), missing, or lacks
vanta-api.all:read. Mint a fresh one — see Authentication → Tokens expire after one hour.Got a 400 on the date params?
Got a 400 on the date params?
slaDeadlineAfterDate and slaDeadlineBeforeDate must be ISO 8601 timestamps with timezone (e.g. 2024-04-16T17:14:26.718Z). Plain dates without time-of-day will be rejected.Need to paginate?
Need to paginate?
Read
results.pageInfo.endCursor and hasNextPage. Re-call with pageCursor=<endCursor> until hasNextPage is false. Don’t try to fetch all vulnerabilities in one call — pageSize caps at 100.Result includes a `deactivateMetadata` object?
Result includes a `deactivateMetadata` object?
That vulnerability has been deactivated (suppressed). It still appears in the list but won’t impact tests. Filter client-side on
deactivateMetadata == null if you only want active items.Suppressing a known false positive? Use
POST /v1/vulnerabilities/deactivate with a reason. Reactivate later with the matching /reactivate endpoint.Congratulations
You’ve pulled the canonical list of vulnerabilities approaching their SLA deadline. Wire this into a Slack channel, Jira ticket creator, or PagerDuty schedule so your remediation work happens against actual deadlines instead of a static dashboard.Next steps
Query failing tests
See which tests are failing because of overdue vulnerabilities.
Subscribe to webhooks
React in real time when a vulnerability is detected, deactivated, or remediated.
Try it in Postman
Import the collection and run the vulnerability query against a sandbox in seconds.
Manage Vanta API reference
Browse every Manage Vanta endpoint — vulnerabilities, tests, controls, documents, people.