Skip to Content
Internal ScanningHow It Works

How Internal Scanning Works

Internal Scanning uses the same DAST engine as Detectify’s external scanning products, deployed as an agent inside your infrastructure. The agent communicates outbound to the Detectify cloud platform — no inbound firewall rules required.

Architecture Overview

The Internal Scanning Agent is a self-contained scanning engine, not a thin proxy. It runs the full DAST engine locally in your environment, including the same Crowdsource modules used by Application Scanning and API Scanning.

The agent sits in your private network, scans your internal applications locally, and sends only vulnerability findings outbound to the Detectify platform over HTTPS (port 443).

Step-by-Step Flow

  1. Agent deployment — Install the agent via Docker, standalone binary, or Terraform module. Pre-configured Terraform modules are available for AWS, Azure, and Google Cloud
  2. Outbound connection — The agent establishes an outbound-only HTTPS connection to Detectify’s cloud platform. No inbound firewall rules needed
  3. Scan orchestration — Scan scheduling and orchestration happens in the cloud, with instructions sent to the agent through the outbound connection
  4. Local scanning — The agent uses local compute to run parallel payload-based tests against your internal applications using the full scanning engine
  5. Results normalization — Findings are assigned standard ScanIDs (the same format used by external scans) and sent to Detectify
  6. Unified reporting — Results appear in the same dashboard, API, and integrations as your Surface Monitoring, Application Scanning, and API Scanning findings

What Data Leaves Your Network

Only scan metadata and vulnerability findings are transmitted to Detectify:

Sent to DetectifyNever leaves your network
Vulnerability type and severityApplication source code
Affected URL pathFull HTTP request/response bodies
CVE/CWE identifiersAuthentication tokens and cookies
Remediation guidanceDatabase query results
Scan progress statusEnvironment variables and secrets

Module Coverage

The Internal Scanning Agent currently supports approximately 80% of external scanning modules. The scanning engine is identical to what powers Application Scanning and API Scanning externally — modules from Detectify’s internal research team and ~400 Crowdsource ethical hackers.

Vulnerability types covered include:

  • SQL injection and NoSQL injection
  • Cross-Site Scripting (XSS)
  • Server-Side Request Forgery (SSRF)
  • Remote Code Execution (RCE)
  • SSL/TLS misconfigurations
  • Command injection
  • Path traversal
  • And many more — extending beyond the OWASP Top 10

Agent Update Model

The agent is updated through the Docker registry. When Detectify releases new modules or engine updates, they are delivered through container image updates managed via your existing deployment tooling (Terraform, Helm).

Deployment Options

MethodBest forGuide
Terraform module (AWS, Azure, GCP)New deployments on supported cloud providersDeploy
Helm chartExisting Kubernetes clusters, on-premisesSelf-Managed Kubernetes
DockerStandalone deploymentsContact Detectify

Next Steps

Last updated on