- Knowledge base
- API Security
- General
-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
How does the REST API scanning work?
The REST API scanning in the web application service capabilities allows the scanner to inject vulnerability detection patterns into JSON REST APIs.
You're able to provide a Open API specification document, which is parsed by the scanner and used as the starting point for identifying any vulnerability class (such as SQL injections, XXE and deserialization issues) in REST APIs.
Note that the open API specification needs to be published in order for Holm Security to scan the API.
The specification can be converted from other file formats such as WADL.