Running Scans & Inventory

Running Scans & Inventory

Discover and catalog AI usage across your infrastructure.

Scan Types

Code Scanning

Analyze repositories for AI model usage and dependencies.

$curl -X POST https://api.governanceai.com/v1/scans \
> -H "Authorization: Bearer $API_KEY" \
> -d '{
> "scan_type": "code_scan",
> "repositories": ["repo_1", "repo_2"],
> "depth": "full"
> }'

Model Inventory

Build catalog of models and versions used.

$curl -X POST https://api.governanceai.com/v1/scans \
> -H "Authorization: Bearer $API_KEY" \
> -d '{
> "scan_type": "model_inventory",
> "include_vulnerabilities": true
> }'

Compliance Scan

Check for compliance gaps.

$curl -X POST https://api.governanceai.com/v1/scans \
> -H "Authorization: Bearer $API_KEY" \
> -d '{
> "scan_type": "compliance_scan",
> "frameworks": ["SOC2", "HIPAA", "GDPR"]
> }'

Scheduled Scans

Set up recurring scans:

$curl -X POST https://api.governanceai.com/v1/scans/schedule \
> -H "Authorization: Bearer $API_KEY" \
> -d '{
> "name": "Weekly Repository Scan",
> "schedule": "0 2 * * 0",
> "scan_type": "code_scan",
> "repositories": ["all"]
> }'

Viewing Results

$# Get latest scan results
$curl -H "Authorization: Bearer $API_KEY" \
> https://api.governanceai.com/v1/scans/results/latest
$
$# Returns:
${
> "scan_id": "scan_123",
> "status": "completed",
> "models_found": 15,
> "vulnerabilities": 3,
> "compliance_violations": 2
>}

Next Steps