flowpatrol_report

Retrieve and filter results from previous scans.

What it does

flowpatrol_report retrieves findings from previous scans. Use it to review results without re-running a scan, filter by severity, and get fix suggestions.

Cost: Free | Time: Instant

Using reports

Dashboard: Navigate to Scans in the sidebar and click any completed scan to view its full report. Use the severity filter to focus on critical issues.

MCP: Your AI assistant can pull reports inline using the parameters below.

MCP parameters

ParameterTypeRequiredDescription
scan_idstringNoSpecific scan ID to retrieve
target_urlstringNoGet the latest scan for this URL
min_severitystringNoFilter: critical, high, medium, low

Provide either scan_id or target_url. If both are omitted, returns the most recent scan for your account.

MCP examples

Get the latest scan

Show me my latest Flowpatrol report

Filter by severity

Show me only critical and high severity findings from Flowpatrol

Get a specific scan

Get the Flowpatrol report for scan abc-123-def

Response format

Each finding includes:

FieldDescription
CategoryVulnerability type (auth, access control, injection, etc.)
Severitycritical, high, medium, or low
EndpointThe affected URL and HTTP method
CWECommon Weakness Enumeration code
DescriptionWhat was found and why it matters
EvidenceHTTP request/response details showing the issue
FixSuggested remediation steps for your stack

The report also includes scan metadata:

  • Scan ID and timestamp
  • Target URL
  • Scan mode and duration
  • Total findings by severity