Skip to main content

Overview

The Application Registry provides a centralized view of all applications identified across your ecosystems — including web apps, internal tools, API services, and shadow applications.
AIM automatically classifies each application, correlates vulnerabilities, and tracks ownership, risk, and exposure.

Application Registry Overview


Key Metrics

These metrics help security and IT teams quickly assess exposure and prioritize remediation.

Vulnerability Insights

Vulnerability Severity Breakdown

The Application Registry aggregates vulnerability data and displays:
  • Critical
  • High
  • Medium
  • Low
Severity distributions help prioritize the most impactful fixes.

Search, Filtering & Grouping

Users can filter and sort applications using:
FilterPurpose
OwnersFilter by application owner or responsible team
Risk ScoreSort apps by automated risk scoring
ExposureShow exposed, safe, or shadow apps
AdaptersView applications discovered via specific integrations
hasVulnsOnly display vulnerable applications
Last SeenFilter based on detection timeline
These controls ensure fast triage and navigation through complex inventories.

Application Table Columns

Each application entry displays structured metadata:
ColumnDescription
Application NameThe registered or detected name
SourceAdapter or input source (ASM, VM, API Sec, CSV)
Vulnerability CountNumber of linked vulnerabilities
Risk ScoreAutomatically computed risk value
TypeApplication type (Web, API, SaaS, Internal)
OwnerAssigned user or team
TagsLabels like vm, application, internal
AssociationsLinked assets (domains, APIs, repos)
Detected OnFirst and last detection timestamps

Full Application View

Each application includes a detailed internal profile.

Application Summary

A summary card displays:
  • Application Name
  • Status (Active, Inactive, Unknown)
  • Total Linked Vulnerabilities
  • Risk Score
  • Exposure (Exposed or Safe)
  • Environment (Prod, Dev, Staging)
  • Owner
  • Detection Timeline

Vulnerability Analysis

Application Vulnerability Trends

Users can view:
  • Historical vulnerability trends
  • Severity distribution
  • Detailed vulnerability table with state & history
All findings link back to VM for deeper triage.

Tags, Technologies & Components

  • Tags: Business labels or security classification
  • Technologies: Libraries, frameworks, or platforms detected (e.g., Nginx, Node.js, Django)
  • Components: Linked APIs, subdomains, containers, or cloud resources
This enables accurate dependency mapping and impact assessment.

Asset Relations

Application Asset Graph

The relation graph maps relationships between:
  • Applications
  • APIs
  • Domains
  • IPs
  • Certificates
  • Cloud components
This reveals attack paths and dependencies.

Ownership & Lifecycle Controls

Each application includes lifecycle management actions:
  • Assign Owner
  • Update Metadata
  • Decommission Application
  • Delete Application
Changes synchronize across AIM and related modules.

How Applications Are Discovered

Applications are detected through:
  • ASM Adapter — external surface scans
  • VM Adapter — vulnerability imports
  • API Sec Adapter — request-based discovery
  • TechDetect Adapter — technology fingerprinting
  • Manual Input / CSV Uploads
This ensures a continuously accurate application inventory.

Example Use Cases

Security Teams

Identify vulnerable or exposed applications quickly.

Asset Managers

Track application ownership and maintain accurate registries.

DevSecOps

Monitor application posture and ensure compliance.

Incident Response

Investigate affected applications during incidents.

Explore Live Demo

Explore AIM Live — No Signup Needed

Instantly explore how Snapsec AIM discovers, enriches, and tracks every asset in real time — all without creating an account.