-
-
Notifications
You must be signed in to change notification settings - Fork 152
Security
thc202 edited this page Jan 19, 2021
·
5 revisions
The HUD is still in alpha, and so you are recommended not to use it on sites you do not trust at this stage.
However we do aim to make the HUD suitably secure and it therefore is in scope for the ZAP bug bounty on BugCrowd
The HUD has the following security features to ensure that malicious sites cannot attack the user via the HUD:
- The ZAP API is only accessed via WebSockets
- The WebSockets endpoint only accepts connections from the https://zap domain
- All postMessage listeners check the message origin
- All displayed data is suitably escaped
Messages sent from the target domain to the ZAP domain:
- Require shared secrets that are protected by closures
- Are not trusted and strictly parsed
- Can be completely disabled if the HUD is to be used with untrusted sites
Note that when using the HUD you should not allow ZAP to be accessed by arbitrary IP addresses or disable any of the ZAP API security features. The default settings are safe but can be changed via the API Options screen.
For even more security you might want to run ZAP in a container like Docker.