Standardize usage of Dynamic Application Security Testing (DAST) tools (ZAP, Nuclei, Nikto) and custom AI-driven curl probes for adversarial system testing. Use when advising on or running dynamic security scans on local/staging environments. (triggers: DAST, dynamic scan, zap, nuclei, nikto, curl probe, pentest, dynamic analysis)
max-depth or max-duration to avoid infinite loops on dynamic routes.Authorization) to test protected surfaces, not just public ones.Follow implementation guide for command-line setup.
curl Probing (Manual)When tools are unavailable, use the AI to generate targeted curl probes:
X-Forwarded-For, X-Custom-Auth)./metrics, /health, or .git directories to find exposed metadata.| Finding | Severity | Deduction |
|---|---|---|
| Unauthenticated access to private data | P0 | -25 |
| Successful SQLi/RCE via probe | P0 | -20 |
| Info Leakage (Server versions/Env vars) | P1 | -10 |
| Missing security headers (CSP/HSTS) | P2 | -5 |