SwCA Search Tokens
The following are the Search Tokens to fetch software component details in the Vulnerability Management (VM), CyberSecurity Asset Management (CSAM), and Cloud Agent (CA) User Interface.
SwCA Tokens Available in CSAM and CA Applications
Use the following tokens in the CSAM and CA application user interface to search for the software component details:
agent.swCAIdealCandidate
Use the Boolean value {true|false} to find assets on which at least one of the software components—Ruby, Node.js, Go, Rust, PHP, Python, Java Platform, and Standard Edition (Java SE), is identified.
For example,
Show assets that have at least one of the software components from the list, is identified.
agent.swCAIdealCandidate: "true"
Show assets where none of the software components from the list are identified.
agent.swCAIdealCandidate: "false"
lastSwCAScanDate
Use the date value to search Cloud Agents based on their last SwCA Scan dates.
For example,
Search Cloud Agents that were last scanned on November 25, 2025.
lastSwCAScanDate: `25-11-2025`
agent.swcaConfigName
Use the text value to search Cloud Agents that are assigned a specific SwCA configuration profile.
For example,
Search Cloud Agents that exactly match the given SwCA Configuration Profile name.
agent.swcaConfigName: `Test_Windows_Profile`
Search Cloud Agents that partially match the given SwCA Configuration Profile name.
agent.swcaConfigName: "Test"
SwCA Tokens Available in VM Application
Use the following tokens in the VM application user interface to search for the software component details:
vulnerabilities.vulnerability.category
Select a category, such as CGI, Database, DNS, BIND, SwCA, and so on, to find vulnerabilities.
For example,
Search for vulnerabilities with category as SwCA.
vulnerabilities.vulnerability.category: SWCA
vulnerabilities.vulnerability.scaTechnologies
Use the SCA technology values like Python or Java for listing vulnerabilities associated with assets on which any of the software components are identified.
For example,
List the vulnerabilities that have SCA Technology as Python
vulnerabilities.vulnerability.scaTechnologies: Python
vulnerabilities.detectionSource.name
Use the text values with quotes or backticks to find the vulenrabilities based on detection source name.
For example,
Search for vulnerabilities with SwCA as a detection source.
vulnerabilities.detectionSource.name: "SWCA"
Search Tokens for Components Search
The following QQL search tokens are available for the Component tab.
| QQL Token | Description |
|---|---|
| component.name | Lists all the components as per the specified component name. |
| component.version | Lists all the components as per the specified version. |
| component.technology | Lists all the components as per the specified technology. |
To learn more about search tokens available in component tab, refer to Search Tokens for IT Assets.