Skip to main content
Exclusive access to Dynamic Application Security Testing solution is provided solely for Enterprise users. If you are interested in learning more about the Enterprise Edition, please contact us.
Trickest’s Dynamic Application Security Testing (DAST) solution enables security teams to continuously scan, assess, and secure web applications through adaptive, modular workflows. It combines vulnerability scanning, content discovery, JavaScript analysis, and infrastructure assessment into a single customizable workflow that integrates seamlessly into existing security operations.

Solution Tabs

The DAST solution experience is organized into three tabs that guide you from design to execution to outcomes:

Builder Tab

Design and customize the DAST workflow. This view shows the prebuilt DAST workflow graph and lets you tailor modules for discovery, scanning, analysis, and reporting to your environment. Add open-source or in-house tools, define inputs and outputs, and configure the exact workflow used for DAST.

Modules used in the DAST Workflow

Discovery & Enumeration
Scanning & Fingerprinting
Content & Code Analysis
  • Analyze JavaScript Code: Deep analysis of JavaScript files to extract endpoints, API calls, secrets, and generate custom wordlists for further testing.
Vulnerability Scanning
Reporting
  • Generate Scan Report: Compiles all findings, discovered assets, screenshots, and metadata into a comprehensive HTML report.
The workflow also uses internal utility steps (such as deduplication, normalization, and correlation) to merge and enrich results between stages.

Configure and Execute DAST

The DAST solution requires four key inputs to define the scan scope and behavior:

Input Parameters

Target The target hostname or URL to scan.
  • Single application URL (e.g., https://app.example.com)
  • Hostname (e.g., app.example.com)
Headers One or more custom headers to include in HTTP requests during scanning.
X-DAST-Scan: True
Authorization: Bearer token123
Use custom headers to identify scan traffic, authenticate to applications, or bypass WAF detection. Each header should be on a new line.
In-Scope URL path or regex pattern that defines what is within scope for crawling and scanning. By default, everything under the target hostname is included. Examples:
example.com/.*
example.com/api/.*
Out-of-Scope URL path or regex pattern that defines what should be excluded from crawling and scanning. Examples:
.*/logout
.*/signout
.*/delete.*
example.com/admin/dangerous-action
Use out-of-scope patterns to prevent the scanner from triggering logout actions, destructive operations, or accessing sensitive administrative functions.

Configuration Examples

Basic Web Application Scan
Target: https://app.example.com
Headers: X-DAST-Scan: True
In-Scope: app.example.com/.*
Out-of-Scope: .*/logout
API-Focused Scan
Target: https://api.example.com
Headers: 
  X-DAST-Scan: True
  Authorization: Bearer eyJhbGc...
In-Scope: api.example.com/v1/.*
Out-of-Scope: api.example.com/v1/admin/.*
Authenticated Application Scan
Target: https://portal.example.com
Headers:
  Cookie: session=abc123xyz
  X-DAST-Scan: True
In-Scope: portal.example.com/.*
Out-of-Scope: .*/logout|.*/signout|.*/delete.*
For complex authentication flows, use the Get Cookies via Puppeteer Recording module to capture session cookies automatically. Record your login flow using Chrome’s built-in recorder, and the module will generate the Cookie header for you.

Run Tab

A specific execution of the workflow in time. You can start on-demand or scheduled runs, monitor node-level progress and logs, and review artifacts produced by each node. On the left sidebar you can see each node output and the status of the node. On the right sidebar you can see run list and when solution was executed.
For more information about workflow execution, check Monitoring Runs.

Insights

Explore the results generated by the workflow. View consolidated vulnerabilities, changes over time (new, missing, removed, resurfaced), technology fingerprints, exposed endpoints, and security issues. Insights provides deltas, trends, and context to help prioritize remediation actions and integrate with downstream systems.
For more information about insights, check Insights.
Looking to adapt this Solution to your environment? See Custom Solutions for patterns and best practices.

Solution API

You can access Solutions API programmatically to list solutions, browse datasets, and fetch results. Most users don’t need to memorize endpoints—when you open any Solution in Trickest, you’ll find an “API Docs” panel with ready-to-use snippets (curl, Python, JavaScript) tailored to your workspace and the selected dataset.
Where to find it: Open a Solution → Click on API Docs button. It shows the correct base URL, your vault-scoped endpoints, and example requests you can copy and run.
I