Skip to main content
availability

Package: Invicti AppSec Core (on-demand), Invicti AppSec Enterprise (on-premise, on-demand)

OWASP ZAP DAST/API Integration

OWASP ZAP (Zed Attack Proxy) is a widely used open-source DAST tool for finding vulnerabilities in web applications. In Invicti AppSec, OWASP ZAP runs as an agent-based or KDT-managed scanner, meaning no external service credentials are required — scans are executed directly by the Invicti AppSec agent.

caution

OWASP ZAP is an Agent/KDT-based scanner. It does not require connection to an external service. Scans are executed by the Invicti agent installed in your environment or via KDT.

Prerequisites

RequirementDescription
Invicti AgentAn Invicti AppSec agent must be installed and running in the target environment
Target URLThe web application URL that the agent can reach and scan
DockerDocker must be installed on the agent host (ZAP runs as a Docker container)

Step 1: Navigate to Integrations

From the left sidebar menu, click on Integrations.

Integrations sidebar

Step 2: Select the DAST/API Tab

On the Integrations > Scanners page, click on the DAST/API tab.

DAST/API tab

Step 3: Find and Activate OWASP ZAP

Scroll through the list of DAST/API scanners to find OWASP ZAP.

  • If OWASP ZAP is not activated, you will see an "Activate" button. Click it to enable the integration.
note

The scan method badge on the OWASP ZAP card shows KDT, which means scans are triggered through the Kondukto CLI tool (KDT).

Step 4: Configure Connection Settings

Click on the gear icon on the OWASP ZAP card to open the configuration panel. Fill in the required fields:

  1. Token: Paste the API token from your OWASP ZAP instance.
  2. URL: Enter the base URL of your OWASP ZAP instance.
  3. Insecure: Enable this checkbox only if your OWASP ZAP instance uses a self-signed SSL certificate.
OWASP ZAP settings

Step 5: Test the Connection

Click Test Connection. A green Connection successful message confirms connectivity.

Summary

StepAction
1Navigate to Integrations from the sidebar
2Select the DAST/API tab
3Activate OWASP ZAP
4Enter Token, URL, and optional Insecure setting
5Test the connection

Create a Scan

  1. Open a project in Invicti AppSec.
  2. Go to Settings > Scanners.
  3. Click Add Scanner.

Add OWASP ZAP Scanner

  1. Select DAST/API as the scanner type.
  2. Choose OWASP ZAP from the scanner list.
  3. Click Add to open the scan configuration drawer.

Scan Configuration Fields

FieldDescriptionRequired
EnvironmentSelect the environment for the scanNo
Scan TypeScan via Target URL or Bind to an existing projectNo
Target URLWeb application URL to scan (if Scan Type = Target URL)Conditional
Bind ToProject to bind to (if Scan Type = Bind to project)Conditional
BranchSource code branch associated with this scanNo
Meta DataAdditional metadata for the scanNo
Scan TagTag to identify the scanNo
OWASP ZAP scan creation

Scheduler

Enable the Scheduler toggle to run ZAP scans on a recurring schedule.

Webhook (Optional)

Add a webhook URL to receive scan completion notifications.

KDT Command

kdt scan -p <project_name> -t zap -b <branch_name>

Troubleshooting

Scan Issues

IssueResolution
Agent not availableEnsure the Invicti agent is installed, running, and connected to Invicti AppSec
Docker not foundInstall Docker on the agent host and ensure the Docker daemon is running
Target not reachableVerify the target URL is accessible from the agent host (check network/firewall rules)
Image pull failedEnsure the agent host has internet access to pull the ZAP Docker image from Docker Hub
Scan timeoutIncrease the scan timeout setting or reduce the scan scope
Empty resultsUse Standard or Full scan mode for more comprehensive coverage

Best Practices

  • Run OWASP ZAP scans in Baseline mode for quick CI/CD pipeline checks.
  • Use Full scan mode for scheduled comprehensive security assessments.
  • Pin the ZAP Docker image tag to a specific version to ensure reproducible scan results.
  • Ensure the agent host has sufficient resources (CPU, RAM) for Docker-based scanning.
  • Combine ZAP results with other scanners for broader coverage.

Limitations

  • OWASP ZAP requires Docker to be installed on the agent host.
  • The target application must be reachable from the agent host network.
  • Authenticated scan setup (login scripts, session handling) must be configured manually.
  • Scan depth and thoroughness are limited by ZAP's crawling capabilities for complex JavaScript-heavy applications.
  • False positive rates may be higher compared to commercial DAST tools; result triaging is recommended.

Need help?

Invicti Support team is ready to provide you with technical help. Go to Help Center

Was this page useful?