scan:blacklist:routes:-path:"/a/path/to/blacklist"method:GET-path:"/another/path/to/blacklist"method:POSThotstart:-|-POST /register HTTP/1.1Host: example.comContent-Type: application/jsonContent-Length: 194{"my": "data"}-|+GET /users HTTP/1.1Host: example.comContent-Type: application/jsonContent-Length: 194profile:surface | marketing | cicd | default | deep | unrestrictedread_only:true | falsescalars:SSET:description:The Super Secret Example Token is internal to our company and shouldnever been exposed by any APIs.examples:-SSET-ABC12names:-SSET-super_secret_example_token-SuperSecretExampleTokenparents:-Stringpatterns:-SSET-[A-Z0-9]{5}sensitivity:HIGHdetection:key_or_value_strictentropy:2
The operations that will be skipped by security tests. See more in the dedicated documentation section..
force_full_scan
boolean
null
Will perform a full scan, without listening your API health and timeout. It may degrade your results quality but will unsure that all your operations are checked.
frontend_base_urls
Dict[string, integer]
null
A map of additional base URLs to scan with their respective depth.
frontend_scopes_regexes
List[string]
null
The list of extra regexes to match the frontend scopes.
hotstart
List[string]
null
Raw queries to hotstart the API exploration.
hotstart_only
boolean
null
If true, the scan will only perform the hotstart phase and stop after.
max_duration
integer
null
The maximum time in minutes that the scan will run for before stopping. Defaults to 30 minutes for frontend scans.
null_is_unauthenticated
boolean
null
In order to improve error inference, on some scans we want to be able to consider that a null aswerimplies that the request should have been authenticated
The choosen mode for the tested API. Default mode is read-write and suited to development environment. The read_only mode is safe for production environments, but will reduce the number of tests performed and the scan coverage..