OWASP PTK Findings as ZAP Alerts

The OWASP PTK add-on version 0.3.0 for ZAP (Zed Attack Proxy) now surfaces findings from the OWASP PenTest Kit browser extension as native ZAP alerts, bridging the gap between proxy-level scanning and client-side security testing. PTK runs inside the browser to detect issues that ZAP cannot reliably see from the proxy layer alone, including UI-driven flows in single-page applications, DOM updates, JavaScript sinks in bundled code, and runtime behavior. The add-on supports three engine types: SAST for analyzing loaded JavaScript scripts, IAST for capturing runtime signals during user flows, and DAST for browser-driven request mutation. Users can select which rule packs to run, optionally enable automated scanning when the browser launches, and review all findings in ZAP's standard Alerts tab with severity filtering, false positive marking, and reporting. The integration adds 142 OWASP PTK-tagged alert types to ZAP, with a Juice Shop walkthrough demonstrating the workflow of launching a ZAP browser, exercising application flows, and reviewing client-side findings alongside traditional proxy alerts. Future plans include full automation for CI/CD pipelines. 

https://www.zaproxy.org/blog/2026-04-01-owasp-ptk-findings-to-zap-alerts/

Comments

Popular posts from this blog

Prompt Engineering Demands Rigorous Evaluation

KEVIntel: Real-Time Intelligence on Exploited Vulnerabilities

SecObserve: Simplified Vulnerability and License Management for CI/CD Pipelines