
Rules Overview
Overview
The Rules Engine in Snapsec WAS enables security teams to:- Build custom detection logic in YAML
- Modify headers, payloads, or request flows
- Match on response codes, body content, or metadata
- Automatically generate vulnerabilities based on findings
- Enable/disable rule execution per project
Rule Editor (YAML)
The left side of the Rules page provides a YAML rule editor where you can create or modify rules.
YAML Rule Editor
- target — which endpoints the rule applies to
- transform — modify or remove headers / payload content
- match_on — response indicators (status, string, header, etc.)
- report — vulnerability metadata generated when the rule triggers