With ZeroThreat, you can run both unauthenticated and authenticated API scans to ensure complete coverage of your API surface.
Running an API scan typically involves the following stages:
ZeroThreat uses your API Collection as the source for endpoint discovery and scanning.
For APIs with authentication, ZeroThreat handles login, cookies and token capture for protected endpoints.
Feature | Description |
---|---|
Collections | Your source of API definitions. Required for all API scans. |
Unauthenticated Scans | Test publicly accessible API endpoints. |
Authenticated Scans | Configure login flows or headers to scan private endpoints. |
Custom Payloads | Provide sample request bodies for endpoints with missing definitions. |
Dynamic Token Mapping | Automatically extract tokens from login responses for use in subsequent requests. |
Select the guide you want to explore next: