Log in with your Twistlock account
Open the app, enter your Twistlock username and password, and submit the login form. The session token is kept only in browser memory and expires when you refresh or close the tab.
Twistlock Report Docs
This application signs in to Twistlock, searches repositories by project name, then builds a combined Word report from the selected image tags. Use this page as the operating guide for TPMs, project coordinators, and release teams.
What you need
Output
A combined .docx scan report that includes project details, microservice release details, and vulnerability findings.
Open the app, enter your Twistlock username and password, and submit the login form. The session token is kept only in browser memory and expires when you refresh or close the tab.
Enter the project name you want to report on, such as CCDI or ICDC. The app searches Twistlock for matching repositories tied to that project.
Review the repositories returned by the search. Select the repositories you want in the report and confirm the image tag for each one before continuing.
Select Generate Reports. The app resolves the registry, pulls scan data from Twistlock, fills the Word template, and downloads a combined .docx report automatically.
Repository search
The app searches Twistlock using the project name, then groups the matching image tags by repository. Search first, then review the tag choices before generating the report.
Report generation
For every selected repository, the server resolves the registry host, fetches the scan result, sorts vulnerabilities by severity, and merges the results into a single Word document.
Security model
Credentials are exchanged server-side and the session token is stored only in memory in the browser session. Nothing is written to local storage or a database.
Log in again with a current Twistlock username and password. If the problem persists, verify the credentials directly in Prisma Cloud or confirm your account has access to the expected collections.
Check the project name spelling and try the acronym used in Twistlock. Search results depend on repository naming, so broadening the project string can help.
Confirm the selected image tag exists in Twistlock and that a scan result is available. If a repository was recently published, the registry search may succeed before the vulnerability scan finishes.
The report content comes from the current scan data and the Word template. Re-run the report after the image is rescanned, or review the template if a section is formatted incorrectly.
Next step
Once you have valid Twistlock credentials, the full workflow is login, search, select, and download. If a report fails, this page should be the first place to check expected behavior.