OWASP PTK Findings as ZAP Alerts
The OWASP PTK add-on version 0.3.0 for ZAP (Zed Attack Proxy) now surfaces findings from the OWASP PenTest Kit browser extension as native ZAP alerts, bridging the gap between proxy-level scanning and client-side security testing. PTK runs inside the browser to detect issues that ZAP cannot reliably see from the proxy layer alone, including UI-driven flows in single-page applications, DOM updates, JavaScript sinks in bundled code, and runtime behavior. The add-on supports three engine types: SAST for analyzing loaded JavaScript scripts, IAST for capturing runtime signals during user flows, and DAST for browser-driven request mutation. Users can select which rule packs to run, optionally enable automated scanning when the browser launches, and review all findings in ZAP's standard Alerts tab with severity filtering, false positive marking, and reporting. The integration adds 142 OWASP PTK-tagged alert types to ZAP, with a Juice Shop walkthrough demonstrating the workflow of launching a ZAP browser, exercising application flows, and reviewing client-side findings alongside traditional proxy alerts. Future plans include full automation for CI/CD pipelines.
https://www.zaproxy.org/blog/2026-04-01-owasp-ptk-findings-to-zap-alerts/
Comments
Post a Comment