The Arena Model Vulnerabilities endpoint returns model vulnerability findings across all models in your tenant. Each record represents one aggregated attack category result per model, combining all penetration test runs for that model into a single success ratio. This is the primary sync feed for customers tracking AI model risk in vulnerability management or governance, risk, and compliance tools.
This endpoint covers model vulnerabilities only. For technology vulnerabilities (CVE-based package findings), see Endpoint Reference: Technology Vulnerabilities.
List Arena Model Vulnerabilities
Returns a paginated list of model vulnerability findings (attack categories) detected through Arena testing.
Request:
GET /api/public/arena/attackcategories
Authorization:
Bearer token. See Authentication & Generating Credentials.
Query parameters:

Response record:
json
{
"uniqueId": "string",
"billOfMaterialsId": "guid",
"billOfMaterialsName": "my-ml-service",
"modelId": "guid",
"modelName": "llama-3-8b-instruct",
"modelType": "LLM | DL | TradML",
"modelSource": "HuggingFace | Internal",
"attackCategoryId": "guid",
"attackCategory": "Prompt Injection",
"attackCategoryDescription": "string | null",
"attackAlgorithm": "string | null",
"attackFramework": "string | null",
"attackSuccessRatio": 0.73,
"severityLevel": "Critical | High | Medium | Low",
"weakness": "string | null",
"resolvedStatus": "Resolved | Ignored | null",
"remediationGuidance": "string | null",
"updatedDate": "2026-04-01T00:00:00Z"
}
Field Definitions
- uniqueId: Stable composite identifier of the form
{modelId}-{attackCategoryId}. Use this as an opaque deduplication and correlation key in downstream systems. This value intentionally does not match theUniqueIdcolumn in CSV vulnerability exports, which is keyed differently. The CSV export records one row per BOM item and penetration test attack, while the Public API aggregates results per model and attack category. To correlate API records with CSV exports, match onmodelIdandattackCategoryIdrather thanuniqueId. - billOfMaterialsId: Identifier of the BOM associated with the model. Correlates with
billOfMaterialsIdon the Bills of Materials endpoint. - billOfMaterialsName: Display name of the BOM, included for convenience.
- modelId: Identifier of the model in which the attack category was detected. Correlates with
modelIdon the Arena Models endpoint. - modelName: Display name of the model.
- modelType: AI type classification of the model.
LLMfor large language models,DLfor deep learning models,TradMLfor traditional machine learning models. - modelSource: Origin of the model.
HuggingFacefor models cataloged in HuggingFace Hub,Internalfor organization-specific models. - attackCategoryId: Stable dictionary identifier for the attack category. Prefer this over
attackCategorywhen correlating across systems, since names may be localized or renamed. - attackCategory: Human-readable display name of the attack category (for example,
Prompt Injection). - attackCategoryDescription: Description of the attack category. May be null.
- attackAlgorithm: Algorithm used in the attack, when applicable. May be null.
- attackFramework: Framework used in the attack, when applicable. May be null.
- attackSuccessRatio: Proportion of attack attempts that succeeded during penetration testing, expressed as a decimal between 0 and 1. A value of
0.73indicates that 73 percent of attempts were successful. - severityLevel: Severity classification derived from
attackSuccessRatiousing the same thresholds as the Arena vulnerability landing page. One ofCritical,High,Medium,Low. - weakness: Description of the underlying weakness, when documented. May be null.
- resolvedStatus: Current resolution status.
Resolvedmeans the finding was marked as fixed or accepted.Ignoredmeans it was acknowledged but intentionally not remediated. Null when the finding has not been acted on. - remediationGuidance: AI-generated remediation advice for the attack category. Returned as an HTML string when populated. Customers integrating this field with downstream tools (for example, ITSM ticket descriptions) must either render the HTML or strip the markup, depending on the target system. Null when remediation has not yet been generated for this finding.
- updatedDate: Timestamp at which the record was last updated. ISO 8601 format. This is the field the sync cursor tracks. The value advances when new penetration test results arrive (a new Vulnerability Assessment is created for the model's BOM) or when an attack category is resolved or unresolved. Incremental sync surfaces both new findings and status changes.
Notes on Resolution
resolvedStatus reflects user-actioned resolution only. Attack categories that no longer appear in subsequent penetration test runs are not automatically marked as resolved. They will remain in the feed with resolvedStatus: null until a user explicitly resolves them in Cranium. Tracking test-based resolution is a planned product capability outside the scope of the current release.
Why Model & Technology Vulnerabilities are Separate Endpoints
Technology vulnerabilities are CVE-based findings from package scanning, with CVSS scores and fixed versions. Model vulnerabilities are penetration test results from Cranium Arena, with attack categories, success ratios, and dataset context. They have fundamentally different schemas and remediation workflows. A unified endpoint would require a discriminated union schema with roughly half the fields nullable on each record type. Two focused endpoints with clean schemas allow each surface to evolve independently. To retrieve a complete vulnerability picture for a tenant, poll both endpoints.
