Severity levels in Artifact Analysis Stay organized with collections Save and categorize content based on your preferences.
This document describes how Artifact Analysis evaluates vulnerabilities andassigns severity levels.
Artifact Analysis rates vulnerability severity using the following levels:
- Critical
- High
- Medium
- Low
These severity levels are qualitative labels that reflect factors such asexploitability, scope, impact, and maturity of the vulnerability. For example,if a vulnerability enables a remote user to access a system and run arbitrarycode without authentication or user interaction, that vulnerabilitywould be classified asCritical.
Two additional types of severity are associated with each vulnerability:
Effective severity - Depending on the vulnerability type:
- OS packages - The severity level assigned by the Linux distributionmaintainer. If these severity levels are unavailable,Artifact Analysis uses the severity value from the note provider,(NVD). If NVD's CVSS v2 rating isunavailable, Artifact Analysis uses the CVSS v3 rating from NVD.
- Language packages - Theseverity level assigned bythe GitHub Advisory Database, with a slight difference:Moderate is reported asMedium.
CVSS score - The CommonVulnerability Scoring System score and associated severity level, with twoscoring versions:
What's next
- Investigate vulnerabilities.
- Gate builds in your Cloud Build pipeline based on vulnerability severity.
Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2026-02-19 UTC.