Dast Scanning
Dast Scanning identifies vulnerabilities in your systems by analyzing open-source vulnerability databases – crucial for proactive security.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add dast-scanning npx -- -y @trustedskills/dast-scanning
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"dast-scanning": {
"command": "npx",
"args": [
"-y",
"@trustedskills/dast-scanning"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
This skill performs Dynamic Application Security Testing (DAST) scans on web applications. It identifies vulnerabilities such as SQL injection, cross-site scripting (XSS), and other common security flaws by simulating real-world attacks against a running application. The results are then reported to highlight potential risks and areas for remediation.
When to use it
- Pre-release testing: Scan an application before deployment to identify and fix vulnerabilities early in the development lifecycle.
- Continuous Integration/Continuous Delivery (CI/CD) pipelines: Integrate DAST scanning into automated build processes to ensure ongoing security.
- Post-deployment monitoring: Regularly scan live applications to detect new vulnerabilities introduced by code changes or external factors.
- Security audits: Use DAST as part of a broader security audit process to assess the overall security posture of an application.
Key capabilities
- Automated vulnerability scanning
- Identification of common web application vulnerabilities (e.g., SQL injection, XSS)
- Reporting of scan results with potential remediation guidance
Example prompts
- "Scan this web application:
https://example.com." - "Run a DAST scan on the staging environment at
https://staging.example.comand report any high-severity findings." - "Perform a full DAST scan, including authentication flow testing, against
https://internal.company.net."
Tips & gotchas
- DAST scans require a running application to test; ensure the target environment is accessible and configured correctly.
- Authentication flows can be complex; providing accurate credentials or configuration for authenticated scanning is crucial for comprehensive results.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.