Categories

Dynamic Application Security Testing (DAST)

Import Options

API Import

UI Import

Universal Importer (Pro)

File Types

XML

Integrations

AppSpider (Rapid7)

AppSpider is a dynamic application security testing (DAST) solution by Rapid7 that automatically crawls and scans web applications to identify security vulnerabilities including SQL injection, cross-site scripting, and other OWASP Top 10 risks. The tool provides comprehensive security assessment capabilities for modern web applications and APIs, simulating real-world attack scenarios to discover exploitable vulnerabilities before malicious actors can compromise application security. 

AppSpider Integration with DefectDojo


If your team is running AppSpider against web applications and APIs, you're generating some of the most actionable DAST findings available — authenticated scan coverage, attack replay data, and request/response pairs that make triage far less ambiguous than most scanners produce. The gap is what happens after the scan. AppSpider's native reporting is useful for point-in-time reviews, but it doesn't give you a persistent vulnerability lifecycle. Integrating AppSpider with DefectDojo closes that gap: findings move from scan artifacts into a managed workflow where you can deduplicate across scans, track remediation progress, enforce SLAs, and report on posture over time across your entire application portfolio.

Why AppSpider Matters

AppSpider (now part of Rapid7's application security portfolio) is a commercial DAST scanner built for coverage and depth on modern web applications — including JavaScript-heavy SPAs, authenticated workflows, and REST/SOAP APIs.


  • AppSpider's traffic-based attack engine replays actual HTTP transactions, which means findings come with the exact request that triggered the vulnerability — critical for developer triage and false positive validation
  • Authenticated scanning support allows coverage behind login flows, including multi-step authentication sequences that simpler scanners can't navigate
  • It handles a broad attack surface: reflected and stored XSS, SQL injection, XXE, SSRF, authentication flaws, session management issues, and more, mapped to CWE identifiers
  • Findings include attack traffic (request/response) and remediation guidance, reducing the back-and-forth between security and engineering teams
  • AppSpider produces XML-based scan results (VulnSummary.xml) that DefectDojo's parser consumes directly, making import straightforward without preprocessing

Advantages of This Integration

AppSpider gives you findings. DefectDojo gives those findings a lifecycle. The combination is where operational value accumulates.


  • Persistent finding records across scans: Each time you run AppSpider against an application, reimporting into DefectDojo updates existing findings rather than creating a new pile of duplicates. You can see whether a finding was resolved, regressed, or has been open for 60 days without action.
  • Cross-application portfolio visibility: AppSpider is typically run against many applications. DefectDojo aggregates findings across your entire product catalog, giving security leadership a single view of DAST posture rather than application-by-application scan reports.
  • SLA tracking with breach alerting: DefectDojo applies configurable SLA policies by severity. A Critical finding from AppSpider gets a remediation deadline; DefectDojo tracks it and surfaces breaches in dashboards and reports — something AppSpider's native reporting doesn't do between scan cycles.
  • False positive management with audit trail: DAST scanners produce false positives. DefectDojo lets you mark findings as false positives with a documented rationale, so the next scan reimport doesn't re-open them. The record is retained for compliance review.
  • Developer-facing ticket creation: Once a finding is triaged in DefectDojo, it can be pushed directly to Jira, GitHub Issues, or ServiceNow with the relevant request/response context included — giving developers what they need without requiring access to the AppSpider console.
  • Engagement-level trend reporting: Over time, DefectDojo's metrics show whether DAST findings for a given application are trending down (remediation is working) or flat-lining (findings are being accepted or ignored). This is useful data for both team leads and executive reporting.

How This Integration Works

AppSpider produces scan output in XML format. DefectDojo's AppSpider parser reads this file directly.


Step 1 — Run the AppSpider scan and export results


AppSpider generates a VulnSummary.xml file as part of its standard scan output. This is the file DefectDojo consumes. You can locate it in the scan results directory after a completed scan, or export it via the AppSpider REST API if you're running AppSpider Enterprise:


# AppSpider Enterprise API — retrieve scan results XML

curl -X GET "https://<appspider-host>/AppSpiderEnterprise/rest/v1/Scan/GetVulnSummaryXml?scanId=<scan-id>" \

-H "Authorization: Bearer <your-token>" \

-o VulnSummary.xml


Step 2 — Import into DefectDojo


Import via the DefectDojo UI by selecting AppSpider Scan as the scan type and uploading the XML file, or use the API for pipeline integration:


curl -X POST https://<defectdojo-host>/api/v2/import-scan/ \

-H "Authorization: Token <your-api-token>" \

-F "scan_type=AppSpider Scan" \

-F "file=@VulnSummary.xml" \

-F "engagement=<engagement-id>" \

-F "product=<product-id>" \

-F "active=true" \

-F "verified=false"


Step 3 — Reimport for recurring scans


For applications scanned on a regular cadence, use the reimport endpoint to update existing findings rather than stack duplicate test records:


curl -X POST https://<defectdojo-host>/api/v2/reimport-scan/ \

-H "Authorization: Token <your-api-token>" \

-F "scan_type=AppSpider Scan" \

-F "file=@VulnSummary.xml" \

-F "test=<test-id>"


DefectDojo will mark findings that no longer appear in the new scan as resolved, and surface any new findings introduced since the last import.

Data Granularity: What Gets Imported

Field

Source in AppSpider Output

Notes

Title

AttackType + VulnType

Descriptive finding name based on attack class

Severity

Severity

Critical, High, Medium, Low, Informational

CWE ID

CWEId

Mapped to CWE where AppSpider provides it

Description

Description

Vulnerability explanation from AppSpider's knowledge base

URL

AttackedURL

The specific endpoint where the vulnerability was found

Attack Value

AttackValue

The payload used to trigger the vulnerability

Request

RequestHeaders + RequestBody

Full HTTP request used in the attack — key for developer triage

Response

ResponseHeaders + ResponseBody

Server response that confirmed the vulnerability

Remediation

Recommendation

AppSpider's remediation guidance

References

Reference

Links to CVE, OWASP, or vendor documentation

CVSS Score

CVSSScore

Where populated by AppSpider

Confidence

AttackType context

Inferred from attack class; not all findings carry explicit confidence scores

Use Cases

During a pre-release security review: AppSpider scans run against a staging environment as part of a release gate. Results are imported into a DefectDojo engagement tied to the release version. Security and engineering teams triage findings in DefectDojo, accept or remediate before go-live, and the engagement record serves as documented evidence of the pre-release review — useful for compliance and audit purposes.


For applications with recurring scan schedules: Production-facing applications are scanned monthly or quarterly. Each scan reimports into the same DefectDojo engagement, updating finding status automatically. Security teams can immediately see what's new, what regressed, and what has been open longest — without manually diffing XML files between scan cycles.


When managing a large application portfolio: An organization running AppSpider across 30+ applications consolidates all results in DefectDojo under a product-per-application structure. Security leadership gets a portfolio-level dashboard showing total open High/Critical DAST findings, SLA compliance rates, and which applications have the most unresolved debt — enabling prioritized resource allocation.


For compliance evidence collection: Regulatory frameworks (PCI DSS, SOC 2, FedRAMP) require documented evidence of application security testing. DefectDojo's engagement records, imported AppSpider findings, and remediation history provide a structured audit trail that's far cleaner to present than raw scan XML files.

Operational Tips

  • Create one engagement per application per scan cycle: A clear engagement naming convention (e.g., AppSpider - Q2 2025 - <App Name>) keeps your history organized and makes it easy to compare posture across quarters.
  • Use reimport for the same application over time: Don't create a new test record for every scan of the same application. Reimport into the existing test so DefectDojo can track resolved and regressed findings accurately.
  • Mark Informational findings inactive on import: AppSpider includes Informational findings that are rarely actionable as vulnerabilities. Setting these to inactive on import keeps your active queue focused on real risk without discarding the data.
  • Document false positives immediately after triage: DAST findings are inherently noisier than SAST. Building a habit of marking false positives in DefectDojo during triage — rather than just ignoring them — pays dividends on the next scan when reimport would otherwise re-open them.
  • Attach the full VulnSummary.xml as a test artifact: DefectDojo allows file attachments on test records. Storing the original scan file alongside the imported findings gives you a complete record if you ever need to re-examine raw output or re-import with an updated parser.
  • Leverage request/response data in Jira tickets: When pushing findings to Jira from DefectDojo, include the attack request and response in the ticket description. Developers can reproduce the issue immediately rather than needing to access the AppSpider console or ask the security team for context.
Align engagements with application risk tiers: If your organization categorizes applications by risk tier (Tier 1 public-facing, Tier 2 internal, etc.), reflect that in DefectDojo's product metadata. SLA policies can then be configured per tier, applying stricter deadlines to your highest-risk applications automatically.

Start Your Free

Trial Today

Unify your security pipeline and orchestrate peace of mind with DefectDojo. We are security experts and here to help.