Agentless Surface Scanning at Scale and Modern Security Testing in CI/CD¶
Escape DAST (Dynamic Application Security Testing) is a feature that automatically tests APIs and Web Applications (including SPAs) for security weaknesses. By using Escape ASM’s detailed output (including automatically generated API Schemas from code or frontend assets), the Escape DAST engine works with the knowledge it needs to run meaningful business logic security tests. It can run at scale directly on all exposed APIs and Web Apps discovered by the ASM or as a configurable Modern DAST right in the CI/CD pipeline during the development phase.
This Code-to-Cloud integration means teams can test both production and development environments, internal and external assets, without manual traffic capture. By using advanced reinforcement learning to simulate real-world usage, Escape uncovers hidden vulnerabilities that other scanners miss. As a result, security teams find complex business logic issues early and often, reducing risk and improving application integrity.

By combining structured input (API Schemas) with intelligent test generation, Escape DAST provides a clear, practical way to discover and address critical vulnerabilities before they can be exploited.
Key Features¶
Agentless and Traffic-less Security Testing¶
Escape DAST uses the API Schemas from the ASM to understand how each endpoint should behave. This allows it to send well-formed requests and explore the application logically. Escape DAST does not rely on agents installed in the environment or captured network traffic. It tests the application as an outside user would, making setup easier and results more reliable.
Modern DAST to Find Complex Business Logic Vulnerabilities in CI/CD¶
Escape DAST can find issues that involve how the application handles its data and processes, not just standard injection attacks. It can detect problems like flawed tenant isolation, where one user might gain access to another user’s data. All of this can be done directly from the development stage, in CI/CD.
Custom Security Rules¶
Default security tests are extensive and cover many vulnerabilities. However, for customers with specific use cases, Escape allows the creation of custom rules. These enable teams to build their own governance and apply it at scale, using a simple yet powerful language thanks to Escape's inference engine.
Sensitive Data Detection¶
During testing, Escape DAST identifies places where sensitive information might leak. This includes personal data (PII), secrets, or tokens that should remain private. The system uses both static and dynamic analysis to reduce false positives and highlight genuine risks.
Contextualized Results (Including Code Owners)¶
Escape DAST links every detected vulnerability back to the information gathered by Escape ASM. Each finding includes details like:
- Code owners
- Environment (production, staging, etc.)
- Exposure status
- Technology in use
This extra context makes it much easier to prioritize issues requiring urgent attention.
Prioritization and Remediation¶
By knowing who owns the code and where the vulnerable component sits in the application stack, teams can quickly assign fixes to the right people. This reduces the time between detection and remediation.
Internal Assets¶
Escape supports the deployment of a Private Location to detect, fingerprint, and test internal application assets behind firewalls or VPNs using a reverse tunnel.
How it works¶
Escape DAST’s approach is grounded in advanced machine learning and reinforcement learning. It converts the API definitions into a neutral model called a MetaGraph. Using this model, it guides test cases to explore the application’s logic in realistic ways. This approach improves test coverage and uncovers issues that static or traffic-based tools might miss.
For more details, check out this article on our Business Logic Security Testing algorithm: Escape Proprietary Algorithm
Index¶
- Start a new Scan
- Understanding Results
- Schedule Scans
- Scan Quality & Debugging
- Internal Network Scanning
Authentication¶
- AWS Cognito
- Basic
- Browser Actions
- Browser Agent
- Browser Use
- cURL
- cURL Sequence
- Digest
- GraphQL
- Headers
- HTTP
- OAuth Authz Code Browser
- OAuth Client
- OAuth ROPC
- MFA & Captcha
- Advanced Workflows
- Authentication Reference
Multi-User Testing¶
- BOLA Testing
- Configuration Guide
- WebApp Examples
- API Examples
WebApp Testing¶
- Technology
- Routing Patterns
- Scope Configuration
- Session Management
- Performance Tuning
- Production-Safe Scanning
- Agentic Crawling
- Reference (WebApp)
- Custom Rules 6
API Testing¶
- Analyze Coverage
- Rate Limiting
- Scope
- Custom Payloads
- Hotstart
- Data Types Reference
- GraphQL
- Reference (REST API)
- Reference (GraphQL API)
- Custom Rules 8
Security Tests (330)¶
- Adminer Default Login - Detect
- Airflow Config Exposure
- Apache Airflow Default Login
- Apache Airflow v3 Default Login
- Alibaba Canal Leak
- Ansible Config Exposure
- Apache Apollo - Default Login
- Apache Druid - Remote Code Execution (Apache Log4j)
- Apache Flink - Remote Code Execution
- Apache HertzBeat - Default Credentials
- Apache NiFi - Remote Code Execution
- Apache OFBiz - JNDI Remote Code Execution (Apache Log4j)
- Apache Solr <=8.8.1 - Local File Inclusion
- Apache Solr 7+ - Remote Code Execution (Apache Log4j)
- Apache Solr 9.1 - Remote Code Execution
- Agentic Issue
- Apache Apisix Admin - Default Login
- Appspec Exposure
- Appveyor Config Exposure
- Arbitrary Token Scope
- Arcade.php - SQL Injection
- Auth Bypass
- AWS Access Token
- AWS Config Exposure
- AWS Docker Config Exposure
- AWStats Config Exposure
- AWStats Exposure
- Azure Tenant Id Exposure
- Broken Object Level Authorization
- BSPHP - Information Disclosure
- Apache CloudStack - Default Login
- CodiMD - File Upload
- Command Injection
- Exposed JSON Configuration Files
- Content Security Policy
- CORS
- Crashing Page
- CRLF Injection
- CSRF Get Based
- CSRF Post Based
- Apache Log4j2 Remote Code Injection
- ZenML ZenML Server - Improper Authentication
- Change Detection - Server Side Template Injection
- Veeam Backup & Replication - Unauthenticated
- DbGate Web Client - Unauthenticated Remote Command Execution
- Debug mode
- Directory listing
- Directory traversal
- Django Secret Key Exposure
- DNS Rebinding Attack
- Apache DolphinScheduler Default Login
- Apache Doris - Default Login
- Drupal 7 Elfinder - Remote Code Execution
- Drupal Avatar Uploader - Cross-Site Scripting
- Apache Dubbo - Default Admin Discovery
- EasyImage down.php - Arbitrary File Read
- Fanwei OA E-Office - Information Disclosure
- ElasticSearch - Default Login
- Error type inconsistency
- Esafenet CDG mysql - File Read
- Exposed Config File
- Exposed JWT Token
- Exposed MySQL Config
- Exposed settings.php
- Exposed Source Map
- Exposed SQL Dumps
- File disclosure
- File inclusion
- Forced Browsing
- Leaked Sensitive Data in LocalStorage
- GeoVision Geowebserver <= 5.3.3 - Local File Inclusion / Cross-Site Scripting
- Git Metadata Directory Exposure
- Gitlab Default Login
- GLPI Default Login
- Grafana Default Login
- Frontend Guessable Cookie Value
- Access-Control-Allow-Origin Header
- Cache Control Header
- Content Security Policy Header
- Content-Type header
- Header leak
- Cookie Security
- Strict Transport Security
- X-Content-Type-Options
- X-Frame-Options header
- Headers
- High number of Custom Scalars
- High number of PCI
- High number of PHI
- High number of PII
- High number of Secrets
- HTML Injection
- Frontend HTTP Parameter Pollution
- GraphQL IDE
- Improper Input Validation Injection
- Stored Improper Input Validation Injection
- Infoblox NetMRI < 7.6.1 - Remote Code Execution via Hardcoded Ruby Cookie Secret Key
- Introspection enabled
- Invalid Persisted Query
- IoTaWatt Configuration App Exposure
- Jenkins Default Login
- Jolokia <= 1.7.1 Information Leakage
- Joomla! com_booking component 2.4.9 - Information Leak
- Joomla! com_fabrik 3.9.11 - Local File Inclusion
- Joomla
departments- SQL Injection
- Joomla! Component Easy Shop 1.2.3 - Local File Inclusion
- Joomla iProperty Real Estate 4.1.1 - Cross-Site Scripting
- Joomla JLex Review 6.0.1 - Cross-Site Scripting
- Joomla jMarket 5.15 - Cross-Site Scripting
- Joomla JoomBri Careers 3.3.0 - Cross-Site Scripting
- Joomla! Component com_sef - Local File Inclusion
- Joomla JVTwitter - Cross-Site Scripting
- Joomla MarvikShop ShoppingCart 3.4 - Sql Injection
- Joomla MarvikShop ShoppingCart 3.4 - Cross-Site Scripting
- Joomla Solidres 2.13.3 - Cross-Site Scripting
- Jupyter Notebook - Remote Command Execution
- JWT algorithm confusion
- JWT no algorithm
- JWT Signature check
- Apache Kafka Center Default Login
- Apache Karaf - Default Login
- kkFileView 4.0.0 - Server-Side Request Forgery
- Apache Kylin Console - Default Login
- Large JSON input
- Possible User Enumeration
- Log4Shell
- Lucee < 6.0.1.59 - Remote Code Execution
- Malwared BYOB - Unauthenticated Remote Code Execution
- Mass Assignment
- Microsoft Access Database File - Detect
- Minio Default Login
- Mismatching persisted queries and schema
- Default MSSQL Credentials
- Exposed MSSQL Server
- Default MySQL Credentials
- Exposed MySQL Server
- Nginx Server - Local File Inclusion
- Nginx Virtual Host Traffic Status Module - Cross-Site Scripting
- Nginx Proxy Manager - Default Login
- nginxWebUI ≤ 3.5.0 - Remote Command Execution
- nginxWebUI ≤ 3.5.0 runCmd - Remote Command Execution
- Node ecstatic Internal Path - Exposure
- Node-Red - Default Login
- NoSQL Injection
- NoSQL Injection Stored
- Nuclei Issue
- Port Remediation
- Open redirection Forgery
- OpenMediaVault - Default Login
- OpenSearch Dashboard - Default Login
- Pagination missing
- Password Field Autocompletion
- PHP Timeclock <=1.04 - Cross-Site Scripting
- Xdebug remote code execution via xdebug.remote_connect_back
- PHP 8.1.0-dev - Backdoor Remote Code Execution
- PHP LDAP Admin < 1.2.5 - Cross-Site Scripting
- phpMyAdmin - Default Login
- PhpMyAdmin - Unauthenticated Access
- PHPOK - SQL Injection
- phpwiki 1.5.4 - Cross-Site Scripting/Local File Inclusion
- Positive integer validation
- Vulnerable Package
- Private data
- Private fields
- Private IP
- Private key exposure via helper detector
- Default PostgreSQL Credentials
- Exposed PostgreSQL Server
- Public state-altering operation
- RabbitMQ Default Login
- Ruby on Rails - CRLF Injection and Cross-Site Scripting
- Apache Ranger - Default Login
- React2Shell CVE-2025-55182 - Shell RCE
- React2Shell CVE-2025-55182 - Javascript RCE
- Reflected URL Parameter
- Request smuggling
- Request URL Override
- Resource limiting bypass
- Response size
- GraphQL Response Type Mismatch
- Row Level Security Bypass
- Rundeck - Default Login
- Joomla! CMS <=3.4.6 - Remote Code Execution
- Sangfor Log Center - Remote Command Execution
- Secret Token Ruby - File Disclosure
- Seeyon OA A6 createMysql.jsp Database - Information Disclosure
- Selenium - Node Exposure
- Self Signed SSL Certificate
- Sensitive Comments
- Sensitive endpoint bruteforce
- Server Error
- Software Component Leak
- SonarQube Default Login - Detect
- Spoofable SPF Records with PTR Mechanism
- Springboot Actuator Disclosure of Thread Dump
- Springboot Actuator Disclosure of Environment
- Springboot Actuator Heapdump
- Springboot Actuator Disclosure of Logfile
- Springboot Actuator Disclosure of Mappings
- Springboot Actuator Restart Misconfiguration
- Springboot Actuator Shutdown Misconfiguration
- Springboot Actuator Disclosure of Trace
- SQL Injection
- SQL Injection (Oracle-Based)
- Default SSH Credentials
- Open SSH Server
- Enabled SSH Password Authentication
- SSL enforced
- SSL Certificate
- Server Side Request Forgery
- SSRF Injection in headers
- SSTI (Server-Side Template Injection)
- Stacktrace
- Stored XSS Injection
- Subresource Integrity Missing
- Tenant isolation
- ThinkPHP 6.0.0~6.0.1 - Arbitrary File Write
- ThinkPHP ⅔ - Remote Code Execution
- ThinkPHP 5.0.1 - Remote Code Execution
- ThinkPHP 5.0.23 - Remote Code Execution
- ThinkPHP 5.0.9 - Information Disclosure
- Security timeout
- TLS Configuration Ciphers
- TLS Protocol Configuration
- TLS Configuration
- TLS Configuration Server Defaults
- TLS Configuration Server Preferences
- TLS vulnerabilities
- Apache Tomcat Manager Default Login
- Apache Tomcat - Default Login Discovery
- TOTOLINK N150RT - Password Exposure
- Twig PHP <2.4.4 template engine - SSTI
- Twonky Server - Exposure
- Typing misconfiguration
- Unhandled endpoint
- Unreachable server
- Unsafe Function Use
- WAF Bypass
- OA E-Office mysql_config.ini - Information Disclosure
- Webmin - Default Login
- WordPress wp-config Detection
- WordPress Plugin "AffiliateWP -- Allowed Products" Log Disclosure
- WordPress DB Backup
- WordPress DB Backup
- Wordpress DB Repair Exposed
- WordPress Debug Log - Exposure
- WordPress oEmbed Endpoint Exposure
- WordPress RDF Feed Users Exposed
- WordPress REST API Users Exposed
- Social Metrics Tracker <= 1.6.8 - Unauthorised Data Export
- Wordpress Oembed Proxy - Server-side request forgery
- WordPress Total Upkeep Database and Files Backup Download
- WordPress Wordfence 7.4.5 - Local File Inclusion
- Wordpress Wordfence - Cross-Site Scripting
- WordPress Wordfence 7.4.6 - Cross0Site Scripting
- WordPress wp-cron Exposed
- WordPress xmlrpc.php Exposed
- Zebra_Form PHP Library <= 2.9.8 - Cross-Site Scripting
- WordPress Woody Code Snippets <2.4.6 - Cross-Site Scripting
- WordPress PHPFreeChat 0.2.8 - Cross-Site Scripting
- XXE Injection
- Zabbix Default Login
- Angular Development Build
- ASP.NET ViewState Encryption
- ASP.NET ViewState MAC Validation Disabled
- Compromised Supply Chain
- Console Error
- Domain Takeover
- Excessive Browser Permissions
- Weak Flask Session Secret
- Broken Object Level Authorization
- Command Injection
- CRLF Injection
- CSRF Get Based
- CSRF Post Based
- Domain Takeover
- Cookie Security
- Insecure WebSocket Connection
- NoSQL Injection
- Open redirection Forgery
- Vulnerable JavaScript Library
- Server Error
- Software Component Leak
- SQL Injection
- SSL enforced
- Server Side Request Forgery via Frontend
- Security timeout
- XSS via Domain Takeover
- Client Side Prototype Pollution
- Frontend Template Injection
- XSS Injection
- XSS via Query Parameter
- React Development Build
- Vue.js Development Build
- Character Limit
- GraphQL Alias Limit
- GraphQL Automatic Persisted Queries
- GraphQL Batch Limit
- GraphQL Cyclic Recursive Query
- GraphQL Content Type
- GraphQL Depth Limit
- GraphQL Directive Overloading
- GraphQL Extension Disclosure
- GraphQL Field Duplication
- GraphQL Field Limit
- GraphQL Field Suggestion
- GraphQL Recursive Fragment
- Response Format
- GraphQL Width Limit
- DNS record DKIM
- DNS record DMARC
- DNS record private IP
- DNS record TXT length
- DNS record TXT sensitive
- DNSSEC not enabled
- DNS record loopback
- MCP Server Accessible Without Authentication
- DNS record permissive SPF
- LLM Endpoint Detection
- LLM Excessive Agency
- LLM Insecure Output Handling
- LLM Insecure Plugin Design
- LLM JailBreak
- LLM Model Denial of Service
- LLM Model Theft
- LLM Overreliance
- LLM Prompt Injection
- LLM Sensitive Information Disclosure
- LLM Supply Chain Vulnerabilities
- LLM Training Data Poisoning