API Discovery from Code in ZeroThreat enables users to identify and analyze all API endpoints that are exposed within a web application—without relying on static code analysis or schema parsing. Instead, ZeroThreat employs a dynamic, runtime approach to uncover APIs through comprehensive application interaction during scans.
This technique ensures that all reachable endpoints are discovered by simulating real user behavior, such as navigating through the application, clicking buttons, and submitting forms. This allows for effective and accurate API inventory generation, even in complex or dynamic single-page applications (SPAs).
ZeroThreat detects APIs as part of its dynamic scanning process. The detection happens in real-time by crawling through the entire application and simulating actual user interaction. This includes:
By observing how the application interacts with backend services, ZeroThreat compiles a detailed inventory of API endpoints, including HTTP methods, parameter structures, request bodies, and expected responses.
All discovered APIs and its vulnerabilities are listed under the Detected APIs section and Crawled URIs in the Scan Report tab of the ZeroThreat portal.
All API Requests under Crawled Uris
All Detected API vulnerabilites
Each detected API entry includes:
/api/user/profile
)This section gives teams a centralized view of the application's live API landscape based on how users and clients interact with it during runtime.
Detected APIs play a key role in ZeroThreat’s DAST engine. The discovered API endpoints help with security testing workflows, allowing scanners to:
This ensures better coverage and reduces the risk of leaving critical endpoints untested.
ZeroThreat’s API Discovery from Code is designed to be a practical, real-world solution that mirrors how applications are used in production. By combining deep crawling, UI interaction, and analysis, it creates a comprehensive view of the application’s API surface—without requiring access to code or relying on static analysis.
Explore the Detected APIs section in your Scan Report to gain full visibility into your application’s exposed interfaces and improve your overall security posture.