Infinite payloads? The future of API Testing with dynamic fuzzing
What if we told you that our newly released API Scanner has 922 quintillion payloads for a single type of vulnerability test? A quintillion is …
Application environments are more complex than ever, with APIs forming the critical connective tissue. But this proliferation has created a vast, often invisible, attack surface. Security teams are caught in a difficult position: compliance frameworks like PCI and SOC 2 demand API scanning, but offer little guidance. Meanwhile, you’re grappling with incomplete API inventories, and the market is a confusing mix of expensive, hard-to-instrument niche tools.
You need a way to see everything on your attack surface from web apps to APIs, test what matters most, and do it all without derailing your existing workflows.
We are excited to introduce advanced API Scanning, fully integrated into the Detectify platform.
We built our API scanner to address the specific challenges we heard from security teams. You told us you needed to:
Our new capabilities are designed to do exactly that in combination with our intelligent scan recommendations and asset classification, providing unified visibility and research-led testing across your entire attack surface.
When we decided to build API scanning, we made an active choice not to simply wrap an existing open-source tool like ZAP. We believe our customers deserve better than repackaged checks and noisy results. Instead, we built our own proprietary engine from the ground up, focused on three key principles:
Static API scanners run the same checks time and time again. If your API hasn’t changed, you get the same results, creating a false sense of security. Our engine is different.
We use a dynamic approach where the payloads used for testing are randomized and rotated with every single scan. This means, as one of our engineers put it,
“every scan that we run against the customer’s API is going to be unique – something that we never scanned before”.
This creates a continuous opportunity to find new vulnerabilities that static checks would miss, even in an unchanged API.
Our dynamic approach allows for a massive scale of test variations. For certain tests like prompt injection, the number of potential payload permutations is theoretically over 9.2 quintillion. For command injections, we utilize a library of over 330,000 payloads.
But this isn’t chaos. The randomization is predictable. Using a “seed” – much like how a seed in Minecraft creates a specific world – we can precisely reproduce the exact payload that found a vulnerability, ensuring our findings are always verifiable and actionable for your developers.
Our engine is built by the same internal security research team that powers the rest of Detectify. We focus on exploitability, meaning we try to actually exploit the vulnerability rather than just flagging a potential issue. This approach, combined with our proprietary fuzzing technology that has a history of finding zero-days, results in high-accuracy findings you can trust, drastically reducing the time you waste on triaging false positives.
Ready to see your full API attack surface? Talk to our experts or start a 2-week free trial.
If you are a Detectify customer already, don’t miss the What’s New page for the latest product updates and new security tests added to the platform.
What if we told you that our newly released API Scanner has 922 quintillion payloads for a single type of vulnerability test? A quintillion is …
The average organization is missing testing 9 out of 10 of their complex web apps that are attacker-attractive targets. To address this, we’re launching new …