# Data Breach Disclosure Monitor | HIPAA Breach Watch (`taroyamada/data-breach-disclosure-monitor`) Actor

Monitor the HHS OCR Breach Portal for new HIPAA data breach disclosures. Returns one summary digest row per monitored query window with executive summary, breach counts, severity signals, and raw evidence.

- **URL**: https://apify.com/taroyamada/data-breach-disclosure-monitor.md
- **Developed by:** [太郎 山田](https://apify.com/taroyamada) (community)
- **Categories:** Business, Automation
- **Stats:** 3 total users, 1 monthly users, 100.0% runs succeeded, NaN bookmarks
- **User rating**: No ratings yet

## Pricing

from $10.00 / 1,000 results

This Actor is paid per event. You are not charged for the Apify platform usage, but only a fixed price for specific events.

Learn more: https://docs.apify.com/platform/actors/running/actors-in-store#pay-per-event

## What's an Apify Actor?

Actors are a software tools running on the Apify platform, for all kinds of web data extraction and automation use cases.
In Batch mode, an Actor accepts a well-defined JSON input, performs an action which can take anything from a few seconds to a few hours,
and optionally produces a well-defined JSON output, datasets with results, or files in key-value store.
In Standby mode, an Actor provides a web server which can be used as a website, API, or an MCP server.
Actors are written with capital "A".

## How to integrate an Actor?

If asked about integration, you help developers integrate Actors into their projects.
You adapt to their stack and deliver integrations that are safe, well-documented, and production-ready.
The best way to integrate Actors is as follows.

In JavaScript/TypeScript projects, use official [JavaScript/TypeScript client](https://docs.apify.com/api/client/js.md):

```bash
npm install apify-client
```

In Python projects, use official [Python client library](https://docs.apify.com/api/client/python.md):

```bash
pip install apify-client
```

In shell scripts, use [Apify CLI](https://docs.apify.com/cli/docs.md):

````bash
# MacOS / Linux
curl -fsSL https://apify.com/install-cli.sh | bash
# Windows
irm https://apify.com/install-cli.ps1 | iex
```bash

In AI frameworks, you might use the [Apify MCP server](https://docs.apify.com/platform/integrations/mcp.md).

If your project is in a different language, use the [REST API](https://docs.apify.com/api/v2.md).

For usage examples, see the [API](#api) section below.

For more details, see Apify documentation as [Markdown index](https://docs.apify.com/llms.txt) and [Markdown full-text](https://docs.apify.com/llms-full.txt).


# README

## Data Breach Disclosure Monitor | HIPAA Breach Watch

Monitor the HHS OCR Breach Portal for new HIPAA data breach disclosures. Returns one summary digest row per monitored query window with executive summary, breach counts, severity signals, and raw evidence.

### Store Quickstart

Run this actor with your target input. Results appear in the Apify Dataset and can be piped to webhooks for real-time delivery. Use `dryRun` to validate before committing to a schedule.

### Key Features

- 🛡️ **Compliance-first** — Produces audit-ready reports mapping findings to standards (WCAG, GDPR, SOC2)
- 🔒 **Non-invasive scanning** — Uses only observable public signals — no intrusive probing
- 📊 **Severity-scored output** — Each finding rated for criticality with remediation guidance
- 📡 **Delta-alerting** — Flag new findings since last run via webhook delivery
- 📋 **Evidence export** — Raw headers/responses captured for compliance documentation

### Use Cases

| Who | Why |
|-----|-----|
| Developers | Automate recurring data fetches without building custom scrapers |
| Data teams | Pipe structured output into analytics warehouses |
| Ops teams | Monitor changes via webhook alerts |
| Product managers | Track competitor/market signals without engineering time |

### Input

| Field | Type | Default | Description |
|-------|------|---------|-------------|
| lookbackDays | integer | `30` | How many days back from today to include breach submissions. Breaches submitted before this window are ignored. Default  |
| entityKeywords | string | `""` | Comma-separated keywords to filter breaches by covered entity name. Case-insensitive substring match. Leave empty to inc |
| stateFilter | string | `""` | Comma-separated two-letter US state codes to filter breaches (e.g. 'CA,TX,NY'). Leave empty to include all states. |
| minIndividualsAffected | integer | `500` | Only include breaches affecting at least this many individuals. The HHS portal only lists breaches affecting 500+, so va |
| maxBreachesInEvidence | integer | `50` | Maximum number of individual breach records to include in the evidence array. Keeps output manageable. |
| watchTerms | string | `""` | Comma-separated terms that trigger actionNeeded=true when found in breach entity names or breach types. Use for competit |
| requestTimeoutSeconds | integer | `45` | HTTP timeout for the HHS portal request. |
| delivery | string | `"dataset"` | dataset: write digest to Apify dataset. webhook: POST digest to a URL. |

#### Input Example

```json
{
  "lookbackDays": 30,
  "entityKeywords": "",
  "stateFilter": "",
  "minIndividualsAffected": 500,
  "maxBreachesInEvidence": 50,
  "watchTerms": "",
  "requestTimeoutSeconds": 45,
  "delivery": "dataset",
  "datasetMode": "all",
  "notifyOnNoChange": false,
  "snapshotKey": "hhs-breach-monitor-snapshots",
  "dryRun": false
}
````

### Output

| Field | Type | Description |
|-------|------|-------------|
| `queryId` | string |  |
| `source` | string |  |
| `checkedAt` | timestamp |  |
| `windowStart` | string |  |
| `windowEnd` | string |  |
| `executiveSummary` | string |  |
| `status` | string |  |
| `actionNeeded` | boolean |  |
| `totalBreachCount` | number |  |
| `newBreachCount` | number |  |
| `totalIndividualsAffected` | number |  |
| `breachTypeSummary` | object |  |
| `topEntities` | array |  |
| `watchTermHits` | array |  |
| `recommendedActions` | array |  |
| `changedSinceLastRun` | boolean |  |
| `evidence` | array |  |
| `meta` | object |  |
| `topEntities[].entityName` | string |  |
| `topEntities[].state` | string |  |
| `topEntities[].individualsAffected` | number |  |
| `topEntities[].breachType` | string |  |
| `topEntities[].submissionDate` | string |  |

#### Output Example

```json
{
  "queryId": "hhs-breach-30d",
  "source": "hhs_ocr_breach_portal",
  "checkedAt": "2025-06-15T12:00:00.000Z",
  "windowStart": "2025-05-16",
  "windowEnd": "2025-06-15",
  "executiveSummary": "18 HIPAA breaches reported in the last 30 days affecting 142,853 individuals. 3 new since last run. 1 watch-term hit: UnitedHealth Group (54,200 affected).",
  "status": "action_needed",
  "actionNeeded": true,
  "totalBreachCount": 18,
  "newBreachCount": 3,
  "totalIndividualsAffected": 142853,
  "breachTypeSummary": {
    "Hacking/IT Incident": 12,
    "Unauthorized Access/Disclosure": 4,
    "Theft": 1,
    "Loss": 1
  },
  "topEntities": [
    {
      "entityName": "UnitedHealth Group",
      "state": "MN",
      "individualsAffected": 54200,
      "breachType": "Hacking/IT Incident",
      "submissionDate": "2025-06-10"
    },
    {
      "entityName": "Regional Medical Center of San Jose",
      "state": "CA",
      "individualsAffected": 32100,
      "breachType": "Hacking/IT Incident",
      "submissionDate": "2025-06-05"
    },
    {
      "entityName": "Blue Cross of Texas",
      "state": "TX",
      "individualsAffected": 21000,
      "breachType": "Unauthorized Access/Disclosure",
      "submissionDate": "2025-05-28"
    }
```

### API Usage

Run this actor programmatically using the Apify API. Replace `YOUR_API_TOKEN` with your token from [Apify Console → Settings → Integrations](https://console.apify.com/account/integrations).

#### cURL

```bash
curl -X POST "https://api.apify.com/v2/acts/taroyamada~data-breach-disclosure-monitor/run-sync-get-dataset-items?token=YOUR_API_TOKEN" \
  -H "Content-Type: application/json" \
  -d '{ "lookbackDays": 30, "entityKeywords": "", "stateFilter": "", "minIndividualsAffected": 500, "maxBreachesInEvidence": 50, "watchTerms": "", "requestTimeoutSeconds": 45, "delivery": "dataset", "datasetMode": "all", "notifyOnNoChange": false, "snapshotKey": "hhs-breach-monitor-snapshots", "dryRun": false }'
```

#### Python

```python
from apify_client import ApifyClient

client = ApifyClient("YOUR_API_TOKEN")
run = client.actor("taroyamada/data-breach-disclosure-monitor").call(run_input={
  "lookbackDays": 30,
  "entityKeywords": "",
  "stateFilter": "",
  "minIndividualsAffected": 500,
  "maxBreachesInEvidence": 50,
  "watchTerms": "",
  "requestTimeoutSeconds": 45,
  "delivery": "dataset",
  "datasetMode": "all",
  "notifyOnNoChange": false,
  "snapshotKey": "hhs-breach-monitor-snapshots",
  "dryRun": false
})

for item in client.dataset(run["defaultDatasetId"]).iterate_items():
    print(item)
```

#### JavaScript / Node.js

```javascript
import { ApifyClient } from 'apify-client';

const client = new ApifyClient({ token: 'YOUR_API_TOKEN' });
const run = await client.actor('taroyamada/data-breach-disclosure-monitor').call({
  "lookbackDays": 30,
  "entityKeywords": "",
  "stateFilter": "",
  "minIndividualsAffected": 500,
  "maxBreachesInEvidence": 50,
  "watchTerms": "",
  "requestTimeoutSeconds": 45,
  "delivery": "dataset",
  "datasetMode": "all",
  "notifyOnNoChange": false,
  "snapshotKey": "hhs-breach-monitor-snapshots",
  "dryRun": false
});

const { items } = await client.dataset(run.defaultDatasetId).listItems();
console.log(items);
```

### Tips & Limitations

- Schedule weekly runs against your production domains to catch config drift.
- Use webhook delivery to pipe findings into your SIEM (Splunk, Datadog, Elastic).
- For CI integration, block releases on `critical` severity findings using exit codes.
- Combine with `ssl-certificate-monitor` for layered cert + headers coverage.
- Findings include links to official remediation docs — share with dev teams via the webhook payload.

### FAQ

**Is running this against a third-party site legal?**

Passive public-header scanning is generally permitted, but follow your own compliance policies. Only scan sites you have authorization for.

**How often should I scan?**

Weekly for production domains; daily if you have high config-change velocity.

**Can I export to a compliance tool?**

Use webhook delivery or Dataset API — formats map well to Drata, Vanta, OneTrust import templates.

**Is this a penetration test?**

No — this actor performs passive compliance scanning only. No exploitation, fuzzing, or auth bypass.

**Does this qualify as a SOC2 control?**

This actor produces evidence artifacts suitable for SOC2 CC7.1 (continuous monitoring). It is not itself a SOC2 certification.

### Related Actors

Security & Compliance cluster — explore related Apify tools:

- [Privacy & Cookie Compliance Scanner | GDPR / CCPA Banner Audit](https://apify.com/taroyamada/privacy-cookie-compliance-scanner) — Scan public privacy pages and cookie banners for GDPR/CCPA compliance signals.
- [Security Headers Checker API | OWASP Audit](https://apify.com/taroyamada/security-headers-checker) — Bulk-audit websites for OWASP security headers, grade each response, and monitor header changes between runs.
- [SSL Certificate Monitor API | Expiry + Issuer Changes](https://apify.com/taroyamada/ssl-certificate-monitor) — Check SSL/TLS certificates in bulk, detect expiry and issuer changes, and emit alert-ready rows for ops and SEO teams.
- [DNS / SPF / DKIM / DMARC Audit API](https://apify.com/taroyamada/dns-dmarc-security-checker) — Bulk-audit domains for SPF, DKIM, DMARC, MX, and email-auth posture with grades and fix-ready recommendations.
- [robots.txt AI Policy Monitor | GPTBot ClaudeBot](https://apify.com/taroyamada/robotstxt-ai-checker) — Detect GPTBot, ClaudeBot, Google-Extended, and other AI crawler policies in robots.
- [WCAG Accessibility Checker API | ADA & EAA Compliance Audit](https://apify.com/taroyamada/wcag-accessibility-checker) — Audit websites for WCAG 2.
- [📜 Open-Source License & Dependency Audit API](https://apify.com/taroyamada/open-source-license-dependency-audit) — Audit npm packages for license risk, dependency depth, maintainer activity, and compliance posture.
- [Trust Center & Subprocessor Monitor API](https://apify.com/taroyamada/trust-center-subprocessor-monitor) — Monitor vendor trust centers, subprocessor lists, DPA updates, and security posture changes.

### Cost

**Pay Per Event**:

- `actor-start`: $0.01 (flat fee per run)
- `dataset-item`: $0.003 per output item

**Example**: 1,000 items = $0.01 + (1,000 × $0.003) = **$3.01**

No subscription required — you only pay for what you use.

# Actor input Schema

## `lookbackDays` (type: `integer`):

How many days back from today to include breach submissions. Breaches submitted before this window are ignored. Default 30 gives a rolling monthly view.

## `entityKeywords` (type: `string`):

Comma-separated keywords to filter breaches by covered entity name. Case-insensitive substring match. Leave empty to include all breaches in the window.

## `stateFilter` (type: `string`):

Comma-separated two-letter US state codes to filter breaches (e.g. 'CA,TX,NY'). Leave empty to include all states.

## `minIndividualsAffected` (type: `integer`):

Only include breaches affecting at least this many individuals. The HHS portal only lists breaches affecting 500+, so values below 500 have no effect.

## `maxBreachesInEvidence` (type: `integer`):

Maximum number of individual breach records to include in the evidence array. Keeps output manageable.

## `watchTerms` (type: `string`):

Comma-separated terms that trigger actionNeeded=true when found in breach entity names or breach types. Use for competitor names, vendor names, or breach types of concern.

## `requestTimeoutSeconds` (type: `integer`):

HTTP timeout for the HHS portal request.

## `delivery` (type: `string`):

dataset: write digest to Apify dataset. webhook: POST digest to a URL.

## `datasetMode` (type: `string`):

all: always emit the digest row. changes\_only: only when new breaches appeared since last run. action\_needed: only when actionNeeded=true.

## `webhookUrl` (type: `string`):

Required when delivery=webhook. Receives the full digest payload as JSON POST.

## `notifyOnNoChange` (type: `boolean`):

When false, webhook delivery is skipped if no new breaches since last run.

## `snapshotKey` (type: `string`):

Stable key for run-to-run state. Keep constant across runs for change detection.

## `nowIso` (type: `string`):

Optional deterministic timestamp for testing. Leave empty for real runs.

## `dryRun` (type: `boolean`):

When true, no snapshots are saved and no webhook is fired.

## Actor input object example

```json
{
  "lookbackDays": 30,
  "entityKeywords": "",
  "stateFilter": "",
  "minIndividualsAffected": 500,
  "maxBreachesInEvidence": 50,
  "watchTerms": "",
  "requestTimeoutSeconds": 45,
  "delivery": "dataset",
  "datasetMode": "all",
  "notifyOnNoChange": false,
  "snapshotKey": "hhs-breach-monitor-snapshots",
  "dryRun": false
}
```

# API

You can run this Actor programmatically using our API. Below are code examples in JavaScript, Python, and CLI, as well as the OpenAPI specification and MCP server setup.

## JavaScript example

```javascript
import { ApifyClient } from 'apify-client';

// Initialize the ApifyClient with your Apify API token
// Replace the '<YOUR_API_TOKEN>' with your token
const client = new ApifyClient({
    token: '<YOUR_API_TOKEN>',
});

// Prepare Actor input
const input = {};

// Run the Actor and wait for it to finish
const run = await client.actor("taroyamada/data-breach-disclosure-monitor").call(input);

// Fetch and print Actor results from the run's dataset (if any)
console.log('Results from dataset');
console.log(`💾 Check your data here: https://console.apify.com/storage/datasets/${run.defaultDatasetId}`);
const { items } = await client.dataset(run.defaultDatasetId).listItems();
items.forEach((item) => {
    console.dir(item);
});

// 📚 Want to learn more 📖? Go to → https://docs.apify.com/api/client/js/docs

```

## Python example

```python
from apify_client import ApifyClient

# Initialize the ApifyClient with your Apify API token
# Replace '<YOUR_API_TOKEN>' with your token.
client = ApifyClient("<YOUR_API_TOKEN>")

# Prepare the Actor input
run_input = {}

# Run the Actor and wait for it to finish
run = client.actor("taroyamada/data-breach-disclosure-monitor").call(run_input=run_input)

# Fetch and print Actor results from the run's dataset (if there are any)
print("💾 Check your data here: https://console.apify.com/storage/datasets/" + run["defaultDatasetId"])
for item in client.dataset(run["defaultDatasetId"]).iterate_items():
    print(item)

# 📚 Want to learn more 📖? Go to → https://docs.apify.com/api/client/python/docs/quick-start

```

## CLI example

```bash
echo '{}' |
apify call taroyamada/data-breach-disclosure-monitor --silent --output-dataset

```

## MCP server setup

```json
{
    "mcpServers": {
        "apify": {
            "command": "npx",
            "args": [
                "mcp-remote",
                "https://mcp.apify.com/?tools=taroyamada/data-breach-disclosure-monitor",
                "--header",
                "Authorization: Bearer <YOUR_API_TOKEN>"
            ]
        }
    }
}

```

## OpenAPI specification

```json
{
    "openapi": "3.0.1",
    "info": {
        "title": "Data Breach Disclosure Monitor | HIPAA Breach Watch",
        "description": "Monitor the HHS OCR Breach Portal for new HIPAA data breach disclosures. Returns one summary digest row per monitored query window with executive summary, breach counts, severity signals, and raw evidence.",
        "version": "0.1",
        "x-build-id": "6qrfUACNPgvuss9Ay"
    },
    "servers": [
        {
            "url": "https://api.apify.com/v2"
        }
    ],
    "paths": {
        "/acts/taroyamada~data-breach-disclosure-monitor/run-sync-get-dataset-items": {
            "post": {
                "operationId": "run-sync-get-dataset-items-taroyamada-data-breach-disclosure-monitor",
                "x-openai-isConsequential": false,
                "summary": "Executes an Actor, waits for its completion, and returns Actor's dataset items in response.",
                "tags": [
                    "Run Actor"
                ],
                "requestBody": {
                    "required": true,
                    "content": {
                        "application/json": {
                            "schema": {
                                "$ref": "#/components/schemas/inputSchema"
                            }
                        }
                    }
                },
                "parameters": [
                    {
                        "name": "token",
                        "in": "query",
                        "required": true,
                        "schema": {
                            "type": "string"
                        },
                        "description": "Enter your Apify token here"
                    }
                ],
                "responses": {
                    "200": {
                        "description": "OK"
                    }
                }
            }
        },
        "/acts/taroyamada~data-breach-disclosure-monitor/runs": {
            "post": {
                "operationId": "runs-sync-taroyamada-data-breach-disclosure-monitor",
                "x-openai-isConsequential": false,
                "summary": "Executes an Actor and returns information about the initiated run in response.",
                "tags": [
                    "Run Actor"
                ],
                "requestBody": {
                    "required": true,
                    "content": {
                        "application/json": {
                            "schema": {
                                "$ref": "#/components/schemas/inputSchema"
                            }
                        }
                    }
                },
                "parameters": [
                    {
                        "name": "token",
                        "in": "query",
                        "required": true,
                        "schema": {
                            "type": "string"
                        },
                        "description": "Enter your Apify token here"
                    }
                ],
                "responses": {
                    "200": {
                        "description": "OK",
                        "content": {
                            "application/json": {
                                "schema": {
                                    "$ref": "#/components/schemas/runsResponseSchema"
                                }
                            }
                        }
                    }
                }
            }
        },
        "/acts/taroyamada~data-breach-disclosure-monitor/run-sync": {
            "post": {
                "operationId": "run-sync-taroyamada-data-breach-disclosure-monitor",
                "x-openai-isConsequential": false,
                "summary": "Executes an Actor, waits for completion, and returns the OUTPUT from Key-value store in response.",
                "tags": [
                    "Run Actor"
                ],
                "requestBody": {
                    "required": true,
                    "content": {
                        "application/json": {
                            "schema": {
                                "$ref": "#/components/schemas/inputSchema"
                            }
                        }
                    }
                },
                "parameters": [
                    {
                        "name": "token",
                        "in": "query",
                        "required": true,
                        "schema": {
                            "type": "string"
                        },
                        "description": "Enter your Apify token here"
                    }
                ],
                "responses": {
                    "200": {
                        "description": "OK"
                    }
                }
            }
        }
    },
    "components": {
        "schemas": {
            "inputSchema": {
                "type": "object",
                "properties": {
                    "lookbackDays": {
                        "title": "Lookback window (days)",
                        "minimum": 1,
                        "maximum": 730,
                        "type": "integer",
                        "description": "How many days back from today to include breach submissions. Breaches submitted before this window are ignored. Default 30 gives a rolling monthly view.",
                        "default": 30
                    },
                    "entityKeywords": {
                        "title": "Entity name keywords (optional filter)",
                        "type": "string",
                        "description": "Comma-separated keywords to filter breaches by covered entity name. Case-insensitive substring match. Leave empty to include all breaches in the window.",
                        "default": ""
                    },
                    "stateFilter": {
                        "title": "US State filter (optional)",
                        "type": "string",
                        "description": "Comma-separated two-letter US state codes to filter breaches (e.g. 'CA,TX,NY'). Leave empty to include all states.",
                        "default": ""
                    },
                    "minIndividualsAffected": {
                        "title": "Minimum individuals affected",
                        "minimum": 0,
                        "maximum": 10000000,
                        "type": "integer",
                        "description": "Only include breaches affecting at least this many individuals. The HHS portal only lists breaches affecting 500+, so values below 500 have no effect.",
                        "default": 500
                    },
                    "maxBreachesInEvidence": {
                        "title": "Max breaches in evidence array",
                        "minimum": 1,
                        "maximum": 200,
                        "type": "integer",
                        "description": "Maximum number of individual breach records to include in the evidence array. Keeps output manageable.",
                        "default": 50
                    },
                    "watchTerms": {
                        "title": "Watch terms (action signal)",
                        "type": "string",
                        "description": "Comma-separated terms that trigger actionNeeded=true when found in breach entity names or breach types. Use for competitor names, vendor names, or breach types of concern.",
                        "default": ""
                    },
                    "requestTimeoutSeconds": {
                        "title": "Request timeout (seconds)",
                        "minimum": 10,
                        "maximum": 120,
                        "type": "integer",
                        "description": "HTTP timeout for the HHS portal request.",
                        "default": 45
                    },
                    "delivery": {
                        "title": "Delivery mode",
                        "enum": [
                            "dataset",
                            "webhook"
                        ],
                        "type": "string",
                        "description": "dataset: write digest to Apify dataset. webhook: POST digest to a URL.",
                        "default": "dataset"
                    },
                    "datasetMode": {
                        "title": "Dataset filter",
                        "enum": [
                            "all",
                            "changes_only",
                            "action_needed"
                        ],
                        "type": "string",
                        "description": "all: always emit the digest row. changes_only: only when new breaches appeared since last run. action_needed: only when actionNeeded=true.",
                        "default": "all"
                    },
                    "webhookUrl": {
                        "title": "Webhook URL",
                        "type": "string",
                        "description": "Required when delivery=webhook. Receives the full digest payload as JSON POST."
                    },
                    "notifyOnNoChange": {
                        "title": "Notify even when nothing changed",
                        "type": "boolean",
                        "description": "When false, webhook delivery is skipped if no new breaches since last run.",
                        "default": false
                    },
                    "snapshotKey": {
                        "title": "Snapshot key (recurring monitor)",
                        "type": "string",
                        "description": "Stable key for run-to-run state. Keep constant across runs for change detection.",
                        "default": "hhs-breach-monitor-snapshots"
                    },
                    "nowIso": {
                        "title": "Override current time (ISO 8601)",
                        "type": "string",
                        "description": "Optional deterministic timestamp for testing. Leave empty for real runs."
                    },
                    "dryRun": {
                        "title": "Dry run",
                        "type": "boolean",
                        "description": "When true, no snapshots are saved and no webhook is fired.",
                        "default": false
                    }
                }
            },
            "runsResponseSchema": {
                "type": "object",
                "properties": {
                    "data": {
                        "type": "object",
                        "properties": {
                            "id": {
                                "type": "string"
                            },
                            "actId": {
                                "type": "string"
                            },
                            "userId": {
                                "type": "string"
                            },
                            "startedAt": {
                                "type": "string",
                                "format": "date-time",
                                "example": "2025-01-08T00:00:00.000Z"
                            },
                            "finishedAt": {
                                "type": "string",
                                "format": "date-time",
                                "example": "2025-01-08T00:00:00.000Z"
                            },
                            "status": {
                                "type": "string",
                                "example": "READY"
                            },
                            "meta": {
                                "type": "object",
                                "properties": {
                                    "origin": {
                                        "type": "string",
                                        "example": "API"
                                    },
                                    "userAgent": {
                                        "type": "string"
                                    }
                                }
                            },
                            "stats": {
                                "type": "object",
                                "properties": {
                                    "inputBodyLen": {
                                        "type": "integer",
                                        "example": 2000
                                    },
                                    "rebootCount": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "restartCount": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "resurrectCount": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "computeUnits": {
                                        "type": "integer",
                                        "example": 0
                                    }
                                }
                            },
                            "options": {
                                "type": "object",
                                "properties": {
                                    "build": {
                                        "type": "string",
                                        "example": "latest"
                                    },
                                    "timeoutSecs": {
                                        "type": "integer",
                                        "example": 300
                                    },
                                    "memoryMbytes": {
                                        "type": "integer",
                                        "example": 1024
                                    },
                                    "diskMbytes": {
                                        "type": "integer",
                                        "example": 2048
                                    }
                                }
                            },
                            "buildId": {
                                "type": "string"
                            },
                            "defaultKeyValueStoreId": {
                                "type": "string"
                            },
                            "defaultDatasetId": {
                                "type": "string"
                            },
                            "defaultRequestQueueId": {
                                "type": "string"
                            },
                            "buildNumber": {
                                "type": "string",
                                "example": "1.0.0"
                            },
                            "containerUrl": {
                                "type": "string"
                            },
                            "usage": {
                                "type": "object",
                                "properties": {
                                    "ACTOR_COMPUTE_UNITS": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "DATASET_READS": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "DATASET_WRITES": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "KEY_VALUE_STORE_READS": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "KEY_VALUE_STORE_WRITES": {
                                        "type": "integer",
                                        "example": 1
                                    },
                                    "KEY_VALUE_STORE_LISTS": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "REQUEST_QUEUE_READS": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "REQUEST_QUEUE_WRITES": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "DATA_TRANSFER_INTERNAL_GBYTES": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "DATA_TRANSFER_EXTERNAL_GBYTES": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "PROXY_RESIDENTIAL_TRANSFER_GBYTES": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "PROXY_SERPS": {
                                        "type": "integer",
                                        "example": 0
                                    }
                                }
                            },
                            "usageTotalUsd": {
                                "type": "number",
                                "example": 0.00005
                            },
                            "usageUsd": {
                                "type": "object",
                                "properties": {
                                    "ACTOR_COMPUTE_UNITS": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "DATASET_READS": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "DATASET_WRITES": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "KEY_VALUE_STORE_READS": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "KEY_VALUE_STORE_WRITES": {
                                        "type": "number",
                                        "example": 0.00005
                                    },
                                    "KEY_VALUE_STORE_LISTS": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "REQUEST_QUEUE_READS": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "REQUEST_QUEUE_WRITES": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "DATA_TRANSFER_INTERNAL_GBYTES": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "DATA_TRANSFER_EXTERNAL_GBYTES": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "PROXY_RESIDENTIAL_TRANSFER_GBYTES": {
                                        "type": "integer",
                                        "example": 0
                                    },
                                    "PROXY_SERPS": {
                                        "type": "integer",
                                        "example": 0
                                    }
                                }
                            }
                        }
                    }
                }
            }
        }
    }
}
```
