Author: Perry Mertens (pamsniffer@gmail.com)
Year: 2025 Perry Mertens
Version: 3.01 (Release)
License: GNU Affero General Public License v3.0 (AGPL-v3.0)
APISCAN is an API vulnerability scanner that proactively identifies security risks by testing against the OWASP API Security Top 10 (2023). It uses your OpenAPI/Swagger specification to generate realistic attack payloads and detect issues such as Broken Object Level Authorization (BOLA), Broken Authentication, Excessive Data Exposure, and other critical API vulnerabilities. It understands OpenAPI/Swagger, supports multiple authentication flows, provides a plan/verify workflow, includes a generic sanitizer/rewrites, and writes HTML artifacts.
APISCAN is licensed under the AGPL-v3.0.
If you modify APISCAN and make it available as a hosted service, you must make the complete corresponding source code available under the same license.
APISCAN focuses on API-specific risks instead of generic web scanning.
It is built for testing APIs against the OWASP API Security Top 10 (2023), with one module per risk area and HTML reporting suitable for auditors and developers.
- Generic sanitizer
- Universal header overrides
- ID and sample generation
- Improved planning and verification workflow
- Adaptive retry logic
- SQLite evidence database
- Optional AI-assisted analysis (API11)
python -m venv .venv
source .venv/bin/activate # Linux/macOS
# .venv\Scripts\activate # Windows
pip install -r requirements.txt
python apiscan.py --url https://api.example.com --swagger openapi.json --flow token --token "<ACCESS_TOKEN>" --verify-plan
python apiscan.py --url https://api.example.com --swagger openapi.json --flow token --token "<ACCESS_TOKEN>"
python apiscan.py --url https://api.example.com --swagger openapi.json --flow none --apikey "<KEY>" --apikey-header "X-API-Key"
python apiscan.py --url https://api.example.com --swagger openapi.json --flow client --client-id "<ID>" --client-secret "<SECRET>" --token-url "https://idp/token"
python apiscan.py --url https://api.example.com --swagger openapi.json --flow token --token "<TOKEN>" --proxy 127.0.0.1:8080 --insecure
python apiscan.py --url https://api.example.com --swagger openapi.json --plan-only
--extra-header "x-tenant-id: acc"
--extra-header "x-feature-flag: beta"
--ids-file ids.json
--no-sanitize
--rewrite "/identity/api/v2=>/identity/api/v7/"
--normalize-version
export LLM_PROVIDER=openai_compat
export LLM_MODEL=gpt-4o-mini
export LLM_API_KEY=sk-...
python apiscan.py --url https://api.example.com --swagger openapi.json --api11
- review.html
- combined_report.html
- Per-risk HTML reports
- SQLite database
results.db - Logs
apiscan_*.log
- Only test APIs you are authorized to test.
- Start with
--plan-onlyto avoid accidental traffic. - Use retry options for unstable endpoints.
