Skip to main content
API Catalog in AIM

API Catalog Overview


Overview

The API Catalog serves as a comprehensive inventory of all APIs identified through integrations, scanners, or adapters (such as Postman, VM, or TechDetect).
It consolidates discovery, vulnerability data, request method analytics, and exposure indicators into one unified interface.
This catalog empowers teams to monitor shadow APIs, enforce ownership, and ensure complete coverage across internal, external, and partner APIs.

Key Metrics and Analytics

Total APIs

Displays the total number of APIs discovered within your organization.

Total Endpoints

Shows the total number of individual endpoints across all APIs.

Shadowed APIs

Highlights APIs discovered outside approved inventories, often representing untracked or unmanaged services.

Vulnerability Severity Distribution

Pie chart visualization of vulnerability severities across all APIs — Critical, High, Medium, and Low.

Vulnerability Distribution

Bar chart displaying the number of open vs. resolved vulnerabilities for APIs.

Request Method Distribution

Analyzes the distribution of HTTP request methods (GET, POST, PUT, PATCH, DELETE), helping teams understand usage and potential risks.

Search, Filters, and Sorting

The API catalog supports multi-dimensional filtering for precise visibility and control:
FilterDescription
OwnersFilter by assigned API owner or responsible workspace.
RiskFilter APIs based on calculated Auto Risk score.
ExposureShow APIs that are exposed or shadowed.
AdaptersFilter APIs imported from specific adapters (e.g., Postman, VM, or TechDetect).
TagsFilter APIs by technology or business tags (e.g., Postman, API).
hasVulnsShow APIs with linked vulnerabilities.
Date RangeFilter by first or last discovery date.
These filters make it easy to pinpoint unowned APIs, newly discovered endpoints, or those with elevated risk.

API Table Columns

Each API record includes rich contextual data:
ColumnDescription
Asset ValueAPI name or workspace identifier.
Vuln CountNumber of vulnerabilities linked to the API.
WorkspaceThe Postman or internal workspace where the API resides.
Auto RiskAutomatically computed risk score based on vulnerabilities, exposure, and classification rules.
Total EndpointsTotal number of active endpoints within the API.
OwnerAssigned person or workspace responsible for the API.
TagsTechnology or discovery tags (e.g., Postman, API).
AssociationsRelated assets connected to the API.
Detected OnTimestamp of last discovery and first identification.

API Full View

Each API in AIM is automatically enriched with vulnerability data, ownership, tags, and endpoint-level analytics.
This detailed view enables continuous visibility into API health, endpoint exposure, and security posture.
API Detailed View in AIM

API Full View


API Summary

API Detailed View in AIM

API Full View

At the top of the page, the API summary provides quick access to its key attributes:
FieldDescription
API NameName of the API asset (e.g., snapsec Control).
StatusIndicates if the API is Active or Decommissioned.
SourceDisplays which adapter or workspace provided the API (e.g., Postman).
ExposedMarks whether the API is exposed to public networks.
EnvironmentIdentifies the deployment environment (e.g., Production, Staging, Dev).
Risk ScoreShows the calculated Auto Risk value.
Managed ByLists the assigned owner or team responsible for maintenance.
Detection HistoryShows first and last detection timestamps.

Vulnerability Insights

API Detailed View in AIM

API Full View

Vulnerability Trends

Visual representation of vulnerabilities over time for the selected API, showing how remediation affects the trend line.

Severity Distribution

Distribution chart showing vulnerabilities categorized as Critical, High, Medium, or Low.
Below the trend charts, the Vulnerabilities Table lists all identified API-level issues, including:
  • Vulnerability title
  • Assessment source
  • Severity
  • State (Resolved, In Review, Retest)
  • Detection history

Tags, Technologies, and Relations

API Detailed View in AIM

API Full View

Tags

Tags applied automatically from adapters or manually by teams (e.g., Postman, API, Internal).

Technologies

Lists backend technologies or services powering the API (e.g., Node.js, FastAPI, Flask).
The Asset Relation Graph maps API dependencies and associations (e.g., linked IPs, domains, or related endpoints), allowing teams to visualize API surface connectivity.

Endpoints and Methods

API Detailed View in AIM

API Full View

Each API includes a full list of associated endpoints, including:
ColumnDescription
NameEndpoint or request title.
MethodHTTP method (GET, POST, PUT, PATCH, DELETE).
PathAPI route or path identifier.
URLFull request URL.
CollectionPostman collection or internal group reference.
WorkspaceWorkspace in which the API is registered.
This section enables analysts to trace vulnerabilities, analyze endpoint exposure, and audit HTTP method usage patterns.

Ownership & Management Actions

Each API asset supports lifecycle operations:
  • Assign Owner – designate an individual or workspace owner.
  • Decommission API – mark outdated APIs for archival or removal.
  • Delete API – remove from active inventory.
All ownership and lifecycle changes are synchronized across the AIM ecosystem.

How APIs Are Discovered

AIM continuously updates API data using connected adapters and integrations:
  • Postman Adapter – imports APIs and collections from workspaces.
  • TechDetect Adapter – fingerprints API technologies and request methods.
  • VM Adapter – enriches APIs with vulnerability data from security assessments.
Each discovery refreshes endpoint counts, exposure states, and vulnerability analytics automatically.

Example Use Cases

  • API Security Teams: Identify shadow or unmanaged APIs.
  • Developers: Track active endpoints and ensure alignment with environment policies.
  • Compliance Officers: Audit exposed APIs for data sensitivity and regulatory controls.
  • Engineering Leads: Measure API growth and assess operational risks.

Explore Live Demo

Explore AIM Live — No Signup Needed

Instantly explore how Snapsec AIM discovers, enriches, and tracks every asset in real time — all without creating an account.