flowpatrol_report
Retrieve and filter results from previous scans.
What it does
flowpatrol_report retrieves findings from previous scans. Use it to review results without re-running a scan, filter by severity, and get fix suggestions.
Cost: Free | Time: Instant
Using reports
Dashboard: Navigate to Scans in the sidebar and click any completed scan to view its full report. Use the severity filter to focus on critical issues.
MCP: Your AI assistant can pull reports inline using the parameters below.
MCP parameters
| Parameter | Type | Required | Description |
|---|---|---|---|
scan_id | string | No | Specific scan ID to retrieve |
target_url | string | No | Get the latest scan for this URL |
min_severity | string | No | Filter: critical, high, medium, low |
Provide either scan_id or target_url. If both are omitted, returns the most recent scan for your account.
MCP examples
Get the latest scan
Show me my latest Flowpatrol reportFilter by severity
Show me only critical and high severity findings from FlowpatrolGet a specific scan
Get the Flowpatrol report for scan abc-123-defResponse format
Each finding includes:
| Field | Description |
|---|---|
| Category | Vulnerability type (auth, access control, injection, etc.) |
| Severity | critical, high, medium, or low |
| Endpoint | The affected URL and HTTP method |
| CWE | Common Weakness Enumeration code |
| Description | What was found and why it matters |
| Evidence | HTTP request/response details showing the issue |
| Fix | Suggested remediation steps for your stack |
The report also includes scan metadata:
- Scan ID and timestamp
- Target URL
- Scan mode and duration
- Total findings by severity