Skip to content

Platform

The Platform section covers core infrastructure and configuration that applies across all Escape products (ASM, DAST, and AI Pentesting). These are foundational capabilities that enable security testing across your entire attack surface.

Core Platform Capabilities

Authentication

Authentication Configuration enables secure, authenticated scanning across all Escape products. Configure authentication workflows, manage credentials, and ensure proper access control for your security tests.

Key Features:

  • Multiple authentication methods (OAuth, Basic Auth, Custom workflows)
  • Session management and token refresh
  • Multi-user authentication support
  • Browser-based and API-based authentication

Locations & Networking

Private Locations: Deploy scanning infrastructure within your network to test internal applications securely. See Private Locations for deployment and configuration.

Firewall Configuration: Configure network access and IP allowlisting for Escape's scanning infrastructure. See Firewall Configuration for details.

Key Features:

  • Private Location deployment (Docker, Kubernetes, Helm)
  • Network configuration and IP allowlisting
  • Geographic control and region-specific deployment
  • Secure connectivity to internal resources

Scan Management

Scan Scheduling: Configure automated scan schedules using CRON expressions. See Scan Scheduling for details.

Internal Network Scanning: Test applications behind firewalls or VPNs using Private Locations. See Internal Network Scanning for configuration.

Scan Quality & Debugging: Monitor scan execution health and troubleshoot failures with actionable diagnostics. See Scan Quality & Debugging for comprehensive guidance.

Vulnerabilities Reference: Complete catalog of security vulnerabilities detected by Escape. See Vulnerabilities Reference for detailed information.

Who Should Use This Section?

  • Infrastructure Teams: Setting up scanning infrastructure and network access
  • Security Engineers: Configuring authentication and access controls
  • DevOps Teams: Deploying Private Locations and managing network configuration
  • Platform Engineers: Managing foundational security testing infrastructure
  • ASM: Attack Surface Management
  • AI Pentesting: AI-powered security testing
  • DAST: Dynamic Application Security Testing

Index

  •    Firewall Configuration

  •    Internal Network Scanning

  Scan Quality & Debugging

  •    Scan Diagnostics

  •    Problem Code Reference

  •    Troubleshooting

  •    Include Extra Data

  •    Roadmap

  Authentication

  •    AWS Cognito

  •    Basic

  •    Browser Actions

  •    Browser Agent

  •    cURL

  •    cURL Sequence

  •    Digest

  •    GraphQL

  •    Headers

  •    HTTP

  •    OAuth Authz Code Browser

  •    OAuth Client

  •    OAuth ROPC

  •    MFA & Captcha

  •    Email-Based Authentication

  •    Advanced Workflows

  •    Agentic Browser Authentication

  Private Locations

  •    Prerequisites

  •    Deployment Methods

  •    Quickstart

  •    SSL Configuration

  •    mTLS Authentication

  •    Proxy Configuration

  •    Resource Management

  •    Logging & Monitoring

  •    Availability & Connectivity

  •    Deploying at Scale

  •    Rate Limiting Private Location Scans

  •    Repeater Migration