Getting Started
This guide walks you through running your first scan with API Scanning. The entire process takes about 10 minutes.
Prerequisites
Before you begin, you need:
- A Detectify account with API Scanning enabled
- An OpenAPI specification for your API in
.json,.yaml, or.ymlformat (OpenAPI v2, v3, or v3.1) - Authentication credentials for your API (if applicable)
- Permission to scan the target API
Step 1: Prepare Your OpenAPI Spec
Ensure your spec is ready to upload. See OpenAPI Specs for supported formats, requirements, and best practices.
If you do not have an OpenAPI spec, many API frameworks can generate one automatically (for example, FastAPI, Spring Boot with Springdoc, or Express with swagger-jsdoc).
Step 2: Upload Your Spec
- Navigate to API Scanning in the Detectify dashboard.
- Click Create Scan Profile.
- Upload your spec file.
- Detectify parses and validates the spec. If there are parsing errors, you will see a summary of issues to address.
Step 3: Configure Authentication
If your API requires authentication, configure it so the scanner can access protected endpoints. Detectify supports OAuth 2.0, Basic Auth, and API key authentication. See Configuration for setup details.
Without valid authentication, the scanner can only test unauthenticated endpoints and will miss vulnerabilities in protected areas of your API.
Step 4: Run Your First Scan
- Review the scan configuration summary, which shows the number of endpoints detected and the authentication method configured.
- Click Start Scan.
- The scan begins sending payloads to your API endpoints. See Configuration for factors that affect scan duration.
You can monitor scan progress in the dashboard. Findings appear in real time as vulnerabilities are confirmed.
Step 5: Review Results
Once the scan completes, navigate to the Results tab to review findings. For each vulnerability, Detectify provides:
- The affected endpoint and parameter
- Severity level (Critical, High, Medium, or Low)
- A description of the vulnerability
- The exact request and response that confirmed the issue
- Remediation guidance
See Results for a detailed guide on interpreting your findings.
Next Steps
- Configure scheduling to run scans automatically
- Review coverage to understand what vulnerability types are tested
- Set up integrations to route findings to Jira, Slack, or your CI/CD pipeline