
WAS Project Overview
Overview
Each project represents a single web application or API environment under assessment.A project contains:
- Metrics – high-level status and vulnerability counts
- API Endpoints – discovered or imported request inventory
- Transformed Requests – AI-enhanced or mutated requests
- Vulnerabilities – all findings detected during scanning
- Configuration – settings for authentication, crawling, rules, and scope
Project Metrics

Project Metrics Dashboard
Pending Vulnerabilities
Total vulnerabilities identified and awaiting remediation.
Resolved Vulnerabilities
Number of findings resolved or marked safe.
Progress Overview
Tracks remediation progress out of total findings.
API Endpoints

API Endpoints Inventory
- Total requests discovered
- Total transformed requests
- Requests sent to the scanner
- Vulnerabilities found per request
- Endpoint path & host
- Request method (GET, POST, etc.)
- Associated vulnerabilities by severity
- Severity
- HTTP method
- Whether vulnerabilities exist
Transformed Requests

Transformed Requests View
- Edge cases
- Unexpected payload behaviors
- Authentication bypass attempts
- Input rewriting
Vulnerabilities

Vulnerability Listing
- Severity badges
- State (Open / Resolved)
- Detection timestamps
- Endpoint association
- Detailed findings after expansion
Configure

Project Configuration Panel
Application Information
- Target URL
- Application Name
- Owner
- Tags
Scanning Scope
Define include/exclude patterns using scope rules.Authentication
Upload Playwright authentication scripts to enable authenticated scans. Includes:- File upload interface
- String-based authentication validation logic
Crawler Settings
Aggressive
Fast, comprehensive crawling with maximum coverage.
Intelligent (AI)
AI-guided crawling that prioritizes important paths.
Webhook URL
Send vulnerability results to external systems.Scan Rules
Enable or disable detection categories such as:- Security Headers
- Authentication Bypass
- Directory Traversal
- XSS (Stored / Reflected)
- Open Redirect
- Server Error Leaks
Best Practices
Organize Projects
Use tags and owners to categorize applications by teams or environments.
Optimize Crawling
Select AI-powered crawling for large or dynamic applications.
Improve Findings Quality
Use transformed requests to enhance attack coverage.
Automate Workflows
Integrate with Postman, Swagger, or VM for unified risk visibility.
Next Steps
Run a Scan
Launch a new scan for this project.
View Vulnerabilities
Explore all findings, remediation advice, and status workflows.