When To Use
- Launch immediate scans after threat intelligence updates.
- Scan newly discovered assets in onboarding workflows.
Configuration Checklist
- Provide target site and list of IP addresses.
- Optionally pre-filter IP list to keep scan scope focused.
- Trigger scan and capture returned job/result identifiers.
- Notify security teams with scan initiation or findings summary.
Inputs
- Required
node.datametadata:uiId,componentId, andoperation(for actions that define an operation). - Action-specific configuration fields from the node editor.
- Upstream context values from triggers or previous nodes (for example
trigger.*or prior action outputs).
Outputs
- Adds action result data to the workflow context for downstream nodes.
- May produce external side effects (API updates, notifications, scripts, SSH commands, etc.).
- Can emit structured values consumed by conditions or subsequent actions.
Failure Modes
- Missing required configuration or invalid parameter values.
- Missing/invalid context variable references from upstream nodes.
- External dependency failures (HTTP errors, auth failures, timeouts, rate limits).
- Payload validation/parsing errors during request or response handling.
Best Practices
- Prefer small, composable actions over one large action with many responsibilities.