You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Run ZAP using the stable Docker image, mapping the CWD so that Docker can access the file and export the report
32
+
docker run -v $(pwd):/zap/wrk/:rw -t zaproxy/zap-stable zap.sh -cmd -autorun wrk/FullScanGinNJuiceAuth.yaml
33
+
```
34
+
35
+
To run this command on Windows see the [relevant documentation](/docs/docker/about/#mounting-the-current-directory).
36
+
37
+
You will need to have Docker installed. If you do not want to use Docker then you can of course install ZAP locally.
38
+
39
+
This command should take around 25 minutes (once the Docker image has been downloaded) on a MacBook M2 and should find the following High and Medium risk alerts:
40
+
41
+
* 🔴 [Cross Site Scripting (DOM Based)](/docs/alerts/40026/)
42
+
* 🔴 [Cross Site Scripting (Reflected](/docs/alerts/40012/)
43
+
* 🔴 [SQL Injection](/docs/alerts/40018/)
44
+
* 🔴 [Vulnerable JS Library](/docs/alerts/10003/)
45
+
* 🟠 [Absence of Anti-CSRF Tokens](/docs/alerts/10202/)
46
+
* 🟠 [CRLF Injection](/docs/alerts/40003/)
47
+
* 🟠 [Content Security Policy (CSP) Header Not Set](/docs/alerts/10038/)
48
+
49
+
It will create an HTML file in your CWD containing full details of all of the issues found.
50
+
21
51
### Potential Pitfalls
22
52
23
53
This is an online app which may be unavailable or broken at any point.
0 commit comments