Historial de auditorías
dast-zap - 5 auditorías
Versión de auditoría 5
Más reciente Riesgo bajoJan 16, 2026, 03:37 PM
Legitimate DAST security testing skill using official OWASP ZAP tooling. Contains documentation, configuration templates, and CI/CD workflows for vulnerability scanning. All 465 static findings are false positives - the patterns detected are expected behaviors for security testing documentation (shell commands for running scanners, URLs in documentation, and security terminology explaining vulnerabilities). No malicious intent detected.
Factores de riesgo
⚙️ Comandos externos (1)
🌐 Acceso a red (1)
📁 Acceso al sistema de archivos (1)
Versión de auditoría 4
Riesgo bajoJan 16, 2026, 03:37 PM
Legitimate DAST security testing skill using official OWASP ZAP tooling. Contains documentation, configuration templates, and CI/CD workflows for vulnerability scanning. All 465 static findings are false positives - the patterns detected are expected behaviors for security testing documentation (shell commands for running scanners, URLs in documentation, and security terminology explaining vulnerabilities). No malicious intent detected.
Factores de riesgo
⚙️ Comandos externos (1)
🌐 Acceso a red (1)
📁 Acceso al sistema de archivos (1)
Versión de auditoría 3
Riesgo bajoJan 10, 2026, 10:27 AM
Legitimate DAST security testing skill using official OWASP ZAP tooling. Contains only documentation, configuration templates, and CI/CD workflows. Purpose matches capabilities. All network calls are to target scanning domains. Credential handling uses secure patterns (environment variables). Includes explicit authorization warnings and legal compliance guidance.
Factores de riesgo
⚡ Contiene scripts (1)
🌐 Acceso a red (1)
📁 Acceso al sistema de archivos (1)
⚙️ Comandos externos (1)
Versión de auditoría 2
Riesgo bajoJan 10, 2026, 10:27 AM
Legitimate DAST security testing skill using official OWASP ZAP tooling. Contains only documentation, configuration templates, and CI/CD workflows. Purpose matches capabilities. All network calls are to target scanning domains. Credential handling uses secure patterns (environment variables). Includes explicit authorization warnings and legal compliance guidance.
Factores de riesgo
⚡ Contiene scripts (1)
🌐 Acceso a red (1)
📁 Acceso al sistema de archivos (1)
⚙️ Comandos externos (1)
Versión de auditoría 1
Riesgo bajoJan 10, 2026, 10:27 AM
Legitimate DAST security testing skill using official OWASP ZAP tooling. Contains only documentation, configuration templates, and CI/CD workflows. Purpose matches capabilities. All network calls are to target scanning domains. Credential handling uses secure patterns (environment variables). Includes explicit authorization warnings and legal compliance guidance.