Assistance with setting up, running, and parsing results from OWASP ZAP (Zed Attack Proxy) for Dynamic Application Security Testing to discover runtime vulnerabilities like misconfigurations and injection flaws.
This skill helps users integrate Dynamic Application Security Testing (DAST) into their workflow using OWASP ZAP. DAST identifies runtime vulnerabilities that static analysis might miss, strongly addressing A02:2025 (Security Misconfiguration), A05:2025 (Injection), and client-side issues.
Use this skill when the user wants to test a running instance of their application or needs help deciphering a ZAP scan report.
Example Triggers:
docker run -t owasp/zap2docker-stable zap-baseline.py -t http://host.docker.internal:8080/