Skip to content

WebApp Testing

WebApp Testing provides comprehensive security testing for web applications through browser-based dynamic analysis. The scanner is designed to test modern web architectures including Single Page Applications (SPAs), Progressive Web Apps (PWAs), and traditional multi-page applications.

Core Capabilities

State-Aware Crawling: Application states are fingerprinted using DOM structures and visible content rather than URL patterns alone. This approach enables effective testing of dynamic, client-side rendered content.

Intelligent Exploration: Reinforcement learning algorithms are employed to identify high-value exploration paths and minimize redundant crawling, optimizing scan efficiency.

Modern Framework Support: Full compatibility with contemporary JavaScript frameworks and dynamic content rendering is provided, including React, Angular, Vue, and similar architectures.

Documentation Structure

Configuration Guides

Technical References

Authentication

Advanced Features

Testing Approach

WebApp Testing analyzes web application security through multiple layers:

  • Frontend Security: DOM manipulation, JavaScript execution, browser storage, and client-side security controls
  • Network Security: HTTP headers, cookie security, SSL/TLS configuration, and Content Security Policy
  • API Security: Security testing of captured API traffic during frontend interaction
  • Authentication Security: Session management, logout mechanisms, and authentication flow validation

Scan Configuration Workflow

  1. Authentication Setup: Configure authentication method in Authentication Configuration
  2. Scope Definition: Define exploration boundaries and exclusions in scan configuration
  3. Performance Tuning: Adjust parallelism, duration, and visit limits based on application characteristics
  4. Security Check Selection: Choose appropriate security check types for the target environment
  5. Session Management: Configure session persistence and logout prevention mechanisms
  6. Execution: Run scan and analyze results through the Escape platform

Configuration Best Practices

  • Conservative settings should be validated in staging environments before production deployment
  • Parallelism should be adjusted based on application stability under load
  • Session management configuration should align with authentication architecture (stateful vs stateless)
  • Scope constraints should be applied to prevent exhaustive exploration of parameterized content
  • Production scans should utilize minimal security check types and reduced resource consumption

Index

  •    Technology

  •    Routing Patterns

  •    Scope Configuration

  •    Session Management

  •    Performance Tuning

  •    Production-Safe Scanning

  •    Agentic Crawling

  •    Reference (WebApp)

  Custom Rules

  •    Alerting

  •    Detectors

  •    Seeders

  •    Extractors

  •    Custom Rules Reference