# Retrieve a finding Endpoint: GET /v1/findings/{id} Version: v1 Security: x-api-key ## Path parameters: - `id` (string, required) Unique identifier for the finding ## Response 200 fields (application/json): - `id` (string) Unique identifier for the finding Example: "d6a32ba5-0532-4a66-8137-48cdf409c972" - `type` (string) The type of finding Enum: "MFA_NOT_REGISTERED", "REUSED_PASSWORD", "SHARED_ACCOUNT", "UNUSED_THIRD_PARTY_APP", "WEAK_PASSWORD", "LEAKED_PASSWORD", "PASSWORD_MANAGER_NOT_USED", "STOLEN_CREDENTIALS" - `state` (string) The state of the finding Enum: "OPEN", "RESOLVED" - `employeeId` (string,null) ID of the employee this finding is linked to, null if finding is not linked to an employee. Example: "379ac7ea-ff2a-42ef-af37-06d2020dc46a" - `passwordId` (string,null) ID of the password this finding is linked to, null if finding is not linked to a password. Example: "c4a045a1-5331-4714-af83-6a361e98960d" - `accountId` (string,null) ID of the account this finding is linked to, null if finding is not linked to an account. - `appType` (string,null) The type of app this finding is linked to, null if finding is not linked to an app. Example: "PUSH_SECURITY" - `appId` (string,null) ID of the app this finding is linked to, null if finding is not linked to an app. Example: "2a2197de-ad2c-47e4-8dcb-fb0f04cf83e0" - `weakPasswordReasons` (array,null) Reasons a password is weak, null if not a WEAK_PASSWORD finding. Enum: "COMMON_BASE_WORD", "BANNED_BASE_WORD" - `creationTimestamp` (integer) When this finding was first observed, formatted as a UNIX timestamp (in seconds) Example: 1698064423 ## Response 400 fields