With ZeroThreat, you can run both unauthenticated and authenticated API scans to ensure complete coverage of your API surface.
Running an API scan typically involves the following stages:
ZeroThreat uses your API Collection as the source for endpoint discovery and scanning.
For APIs with authentication, ZeroThreat handles login, cookies and token capture for protected endpoints.
| Feature | Description |
|---|---|
| Collections | Your source of API definitions. Required for all API scans. |
| Unauthenticated Scans | Test publicly accessible API endpoints. |
| Authenticated Scans | Configure login flows or headers to scan private endpoints. |
| Custom Payloads | Provide sample request bodies for endpoints with missing definitions. |
| Dynamic Token Mapping | Automatically extract tokens from login responses for use in subsequent requests. |
Select the guide you want to explore next: