Overview
The Application Registry provides a centralized view of all applications identified across your ecosystems — including web apps, internal tools, API services, and shadow applications.AIM automatically classifies each application, correlates vulnerabilities, and tracks ownership, risk, and exposure.

Application Registry Overview
Key Metrics
These metrics help security and IT teams quickly assess exposure and prioritize remediation.Vulnerability Insights

Vulnerability Severity Breakdown
- Critical
- High
- Medium
- Low
Search, Filtering & Grouping
Users can filter and sort applications using:| Filter | Purpose |
|---|---|
| Owners | Filter by application owner or responsible team |
| Risk Score | Sort apps by automated risk scoring |
| Exposure | Show exposed, safe, or shadow apps |
| Adapters | View applications discovered via specific integrations |
| hasVulns | Only display vulnerable applications |
| Last Seen | Filter based on detection timeline |
Application Table Columns
Each application entry displays structured metadata:| Column | Description |
|---|---|
| Application Name | The registered or detected name |
| Source | Adapter or input source (ASM, VM, API Sec, CSV) |
| Vulnerability Count | Number of linked vulnerabilities |
| Risk Score | Automatically computed risk value |
| Type | Application type (Web, API, SaaS, Internal) |
| Owner | Assigned user or team |
| Tags | Labels like vm, application, internal |
| Associations | Linked assets (domains, APIs, repos) |
| Detected On | First and last detection timestamps |
Full Application View
Each application includes a detailed internal profile.Application Summary
A summary card displays:- Application Name
- Status (Active, Inactive, Unknown)
- Total Linked Vulnerabilities
- Risk Score
- Exposure (Exposed or Safe)
- Environment (Prod, Dev, Staging)
- Owner
- Detection Timeline
Vulnerability Analysis

Application Vulnerability Trends
- Historical vulnerability trends
- Severity distribution
- Detailed vulnerability table with state & history
Tags, Technologies & Components
- Tags: Business labels or security classification
- Technologies: Libraries, frameworks, or platforms detected (e.g., Nginx, Node.js, Django)
- Components: Linked APIs, subdomains, containers, or cloud resources
Asset Relations

Application Asset Graph
- Applications
- APIs
- Domains
- IPs
- Certificates
- Cloud components
Ownership & Lifecycle Controls
Each application includes lifecycle management actions:- Assign Owner
- Update Metadata
- Decommission Application
- Delete Application
How Applications Are Discovered
Applications are detected through:- ASM Adapter — external surface scans
- VM Adapter — vulnerability imports
- API Sec Adapter — request-based discovery
- TechDetect Adapter — technology fingerprinting
- Manual Input / CSV Uploads
Example Use Cases
Security Teams
Identify vulnerable or exposed applications quickly.Asset Managers
Track application ownership and maintain accurate registries.DevSecOps
Monitor application posture and ensure compliance.Incident Response
Investigate affected applications during incidents.Explore Live Demo
Explore AIM Live — No Signup Needed
Instantly explore how Snapsec AIM discovers, enriches, and tracks every asset in real time — all without creating an account.