SwCA Search Tokens

The following are the Search Tokens to fetch software component details in the Vulnerability Management (VM), CyberSecurity Asset Management (CSAM), and Cloud Agent (CA) User Interface.

SwCA Tokens Available in CSAM and CA Applications

Use the following tokens in the CSAM and CA application user interface to search for the software component details:

agent.swCAIdealCandidate

Use the Boolean value {true|false} to find assets on which at least one of the software components—Ruby, Node.js, Go, Rust, PHP, Python, Java Platform, and Standard Edition (Java SE), is identified.

For example,

Show assets that have at least one of the software components from the list, is identified.

agent.swCAIdealCandidate: "true"

Show assets where none of the software components from the list are identified.

agent.swCAIdealCandidate: "false"

lastSwCAScanDate

Use the date value to search Cloud Agents based on their last SwCA Scan dates.

For example,

Search Cloud Agents that were last scanned on November 25, 2025.

 lastSwCAScanDate: `25-11-2025`

agent.swcaConfigName

Use the text value to search Cloud Agents that are assigned a specific SwCA configuration profile.

For example,

Search Cloud Agents that exactly match the given SwCA Configuration Profile name.

agent.swcaConfigName: `Test_Windows_Profile`

Search Cloud Agents that partially match the given SwCA Configuration Profile name.

agent.swcaConfigName: "Test"

SwCA Tokens Available in VM Application

Use the following tokens in the VM application user interface to search for the software component details:

vulnerabilities.vulnerability.category

Select a category, such as CGI, Database, DNS, BIND, SwCA, and so on, to find vulnerabilities.

For example,

Search for vulnerabilities with category as SwCA.

 vulnerabilities.vulnerability.category: SWCA

vulnerabilities.vulnerability.scaTechnologies

Use the SCA technology values like Python or Java for listing vulnerabilities associated with assets on which any of the software components are identified.

For example,

List the vulnerabilities that have SCA Technology as Python

vulnerabilities.vulnerability.scaTechnologies: Python

vulnerabilities.detectionSource.name

Use the text values with quotes or backticks to find the vulenrabilities based on detection source name.

For example,

Search for vulnerabilities with SwCA as a detection source.

vulnerabilities.detectionSource.name: "SWCA"

Search Tokens for Components Search

The following QQL search tokens are available for the Component tab.

QQL Token Description
component.name Lists all the components as per the specified component name.
component.version Lists all the components as per the specified version.
component.technology Lists all the components as per the specified technology.

To learn more about search tokens available in component tab, refer to Search Tokens for IT Assets