Dynamic Application Security Testing (DAST)
Dynamic Application Security Testing (DAST) runs automated penetration tests to find vulnerabilities in your web applications and APIs as they are running. DAST automates a hacker’s approach and simulates real-world attacks for critical threats such as cross-site scripting (XSS), SQL injection (SQLi), and cross-site request forgery (CSRF) to uncover vulnerabilities and misconfigurations that other security tools cannot detect.
DAST is completely language agnostic and examines your application from the outside in. With a running application in a test environment, DAST scans can be automated in a CI/CD pipeline, automated on a schedule, or run independently by using on-demand scans. Using DAST during the software development life cycle enables teams to uncover vulnerabilities before their applications are in production. DAST is a foundational component of software security and should be used in tandem with SAST, dependency and license scanning, and secret detection, to provide a comprehensive security assessment of your applications.
GitLab’s Browser-based DAST and DAST API are proprietary runtime tools, which provide broad security coverage for modern-day web applications and APIs.
For an overview, see Dynamic Application Security Testing (DAST).
GitLab DAST
GitLab provides the following DAST analyzers, one or more of which may be useful depending on the kind of application you’re testing.
For scanning websites, use one of:
- The DAST proxy-based analyzer for scanning traditional applications serving simple HTML. The proxy-based analyzer can be run automatically or on-demand.
- The DAST browser-based analyzer for scanning applications that make heavy use of JavaScript. This includes single page web applications.
For scanning APIs, use:
- The API security testing analyzer for scanning web APIs. Web API technologies such as GraphQL, REST, and SOAP are supported.
Analyzers follow the architectural patterns described in Secure your application. Each analyzer can be configured in the pipeline using a CI template and runs the scan in a Docker container. Scans output a DAST report artifact which GitLab uses to determine discovered vulnerabilities based on differences between scan results on the source and target branches.
Getting started
Prerequisites
- Support for the arm64 architecture was introduced in GitLab 17.0.
-
GitLab Runner available, with the
docker
executor or the Kubernetes executor on Linux/amd64 or Linux/arm64. - Target application deployed. For more details, read Deployment options.
-
dast
stage added to the CI/CD pipeline definition. This should be added after the deploy step, for example:stages: - build - test - deploy - dast
Recommendations
- Take care if your pipeline is configured to deploy to the same web server in each run. Running a DAST scan while a server is being updated leads to inaccurate and non-deterministic results.
- Configure runners to use the always pull policy to run the latest versions of the analyzers.
-
By default, DAST downloads all artifacts defined by previous jobs in the pipeline. If your DAST job does not rely on
environment_url.txt
to define the URL under test or any other files created in previous jobs, we recommend you don’t download artifacts. To avoid downloading artifacts, extend the analyzer CI/CD job to specify no dependencies. For example, for the DAST proxy-based analyzer add the following to your.gitlab-ci.yml
file:dast: dependencies: []
Analyzer configuration
See DAST proxy-based analyzer, DAST browser-based analyzer or API security testing analyzer for analyzer-specific configuration instructions.
View scan results
Detected vulnerabilities appear in merge requests, the pipeline security tab, and the vulnerability report.
- To see all vulnerabilities detected, either:
- From your project, select Security & Compliance, then Vulnerability report.
- From your pipeline, select the Security tab.
- From the merge request, go to the Security scanning widget and select Full report tab.
-
Select a DAST vulnerability’s description. The following fields are examples of what a DAST analyzer may produce to aid investigation and rectification of the underlying cause. Each analyzer may output different fields.
Field Description Description Description of the vulnerability. Evidence Evidence of the data found that verified the vulnerability. Often a snippet of the request or response, this can be used to help verify that the finding is a vulnerability. Identifiers Identifiers of the vulnerability. Links Links to further details of the detected vulnerability. Method HTTP method used to detect the vulnerability. Project Namespace and project in which the vulnerability was detected. Request Headers Headers of the request. Response Headers Headers of the response received from the application. Response Status Response status received from the application. Scanner Type Type of vulnerability report. Severity Severity of the vulnerability. Solution Details of a recommended solution to the vulnerability. URL URL at which the vulnerability was detected.
List URLs scanned
When DAST completes scanning, the merge request page states the number of URLs scanned. Select View details to view the web console output which includes the list of scanned URLs.
Application deployment options
DAST requires a deployed application to be available to scan.
Depending on the complexity of the target application, there are a few options as to how to deploy and configure the DAST template. A set of example applications have been provided with their configurations in the DAST demonstrations project.
Review apps
Review apps are the most involved method of deploying your DAST target application. To assist in the process, we created a Review App deployment using Google Kubernetes Engine (GKE). This example can be found in our Review apps - GKE project, along with detailed instructions in the README.md on how to configure review apps for DAST.
Docker Services
If your application uses Docker containers you have another option for deploying and scanning with DAST. After your Docker build job completes and your image is added to your container registry, you can use the image as a service.
By using service definitions in your .gitlab-ci.yml
, you can scan services with the DAST analyzer.
When adding a services
section to the job, the alias
is used to define the hostname that can be used to access the service. In the following example, the alias: yourapp
portion of the dast
job definition means that the URL to the deployed application uses yourapp
as the hostname (https://yourapp/
).
stages:
- build
- dast
include:
- template: DAST.gitlab-ci.yml
# Deploys the container to the GitLab container registry
deploy:
services:
- name: docker:dind
alias: dind
image: docker:20.10.16
stage: build
script:
- docker login -u gitlab-ci-token -p $CI_JOB_TOKEN $CI_REGISTRY
- docker pull $CI_REGISTRY_IMAGE:latest || true
- docker build --tag $CI_REGISTRY_IMAGE:$CI_COMMIT_SHA --tag $CI_REGISTRY_IMAGE:latest .
- docker push $CI_REGISTRY_IMAGE:$CI_COMMIT_SHA
- docker push $CI_REGISTRY_IMAGE:latest
dast:
services: # use services to link your app container to the dast job
- name: $CI_REGISTRY_IMAGE:$CI_COMMIT_SHA
alias: yourapp
variables:
DAST_WEBSITE: https://yourapp
DAST_FULL_SCAN_ENABLED: "true" # do a full scan
DAST_BROWSER_SCAN: "true" # use the browser-based GitLab DAST crawler
Most applications depend on multiple services such as databases or caching services. By default, services defined in the services fields cannot communicate
with each another. To allow communication between services, enable the FF_NETWORK_PER_BUILD
feature flag.
variables:
FF_NETWORK_PER_BUILD: "true" # enable network per build so all services can communicate on the same network
services: # use services to link the container to the dast job
- name: mongo:latest
alias: mongo
- name: $CI_REGISTRY_IMAGE:$CI_COMMIT_SHA
alias: yourapp