# Gets a list of all SAST engines

Retrieves a list of available engines with supported programming languages names and engine IDs. Engine ID is used in scan configurations.

Endpoint: GET /api/engines
Version: 24.9.2.5
Security: ApiKeyAuth, Bearer

## Response 200 fields (application/json):

  - `clocLanguageOptionNames` (array)

  - `defaultDepth` (object)

  - `defaultDepth.maxFunctionDepth` (integer)

  - `defaultDepth.maxVariableTrack` (integer)

  - `defaultExclusions` (array)

  - `executable` (string)

  - `extensions` (array)

  - `extensions.clocOptionName` (string)

  - `extensions.literal` (string)

  - `extensions.pattern` (string)

  - `extensions.requiresFeatureFlags` (array)

  - `extensions.useForEngineConfiguration` (boolean)

  - `extensions.useForLanguageDetection` (boolean)

  - `extensions.useForLineCounting` (boolean)

  - `id` (integer)

  - `ipcPort` (string)

  - `language` (string)

  - `languageName` (string)

  - `tempDirectory` (string)

  - `trackedInputs` (array)

  - `vulnerabilityTypes` (array)

  - `vulnerabilityTypes.capec` (object)

  - `vulnerabilityTypes.capec.id` (string)

  - `vulnerabilityTypes.capec.title` (string)

  - `vulnerabilityTypes.capec.url` (string)

  - `vulnerabilityTypes.commonId` (string)

  - `vulnerabilityTypes.cwe` (object)

  - `vulnerabilityTypes.cwe.id` (string)

  - `vulnerabilityTypes.cwe.title` (string)

  - `vulnerabilityTypes.cwe.url` (string)

  - `vulnerabilityTypes.description` (string)

  - `vulnerabilityTypes.hipaa` (object)

  - `vulnerabilityTypes.hipaa.control` (string)

  - `vulnerabilityTypes.hipaa.title` (string)

  - `vulnerabilityTypes.hitrust` (object)

  - `vulnerabilityTypes.hitrust.control` (string)

  - `vulnerabilityTypes.hitrust.title` (string)

  - `vulnerabilityTypes.id` (integer)

  - `vulnerabilityTypes.name` (string)

  - `vulnerabilityTypes.nist` (object)

  - `vulnerabilityTypes.nist.control` (string)

  - `vulnerabilityTypes.nist.priority` (string)

  - `vulnerabilityTypes.nist.title` (string)

  - `vulnerabilityTypes.nist.url` (string)

  - `vulnerabilityTypes.order` (integer)

  - `vulnerabilityTypes.owasp` (object)

  - `vulnerabilityTypes.owasp.index` (string)

  - `vulnerabilityTypes.owasp.title` (string)

  - `vulnerabilityTypes.owasp.url` (string)

  - `vulnerabilityTypes.owasp2021` (object)

  - `vulnerabilityTypes.owasp2021.index` (string)

  - `vulnerabilityTypes.owasp2021.title` (string)

  - `vulnerabilityTypes.owasp2021.url` (string)

  - `vulnerabilityTypes.pcidss` (object)

  - `vulnerabilityTypes.pcidss.section` (string)

  - `vulnerabilityTypes.pcidss.title` (string)

  - `vulnerabilityTypes.recommendation` (array)

  - `vulnerabilityTypes.references` (array)

  - `vulnerabilityTypes.risk` (string)

  - `vulnerabilityTypes.sansTop25` (object)

  - `vulnerabilityTypes.sansTop25.rank` (integer)

  - `vulnerabilityTypes.sansTop25.title` (string)

  - `vulnerabilityTypes.sarif` (string)

  - `vulnerabilityTypes.sarifLevel` (string)

  - `vulnerabilityTypes.severityRating` (number)

## Response 403 fields (application/json):

  - `message` (string)
    Example: "Something went wrong"

  - `result` (string)
    Example: "error"

  - `success` (boolean)


