-
-
Notifications
You must be signed in to change notification settings - Fork 152
Security
Simon Bennetts edited this page Feb 18, 2019
·
5 revisions
The HUD is still in alpha, and so you are recommended not to use it on sites you do not trust at this stage.
However we do aim to make the HUD suitably secure and it therefore is in scope for the ZAP bug bounty on BugCrowd
The HUD has the following security features to ensure that malicious sites cannot attack the user via the HUD:
- The ZAP API is only accessed via WebSockets
- The WebSockets endpoint only accepts connections from the https://zap domain
- All postMessage listeners check the message origin
- All displayed data is suitably escaped
Messages sent from the target domain to the ZAP domain:
- Require shared secrets that are protected by closures
- Are not trusted and strictly parsed
- Can be completely disabled if the HUD is to be used with untrusted sites
Note that if you are using ZAP with potentially malicious web sites then you should not allow ZAP to be accessed by arbitrary IP addresses or disable any of the ZAP API security features.
For even more security you might want to run ZAP in a container like Docker.