Overview
RAPTOR’s web scanner provides autonomous security testing for web applications through intelligent crawling, parameter discovery, and LLM-guided fuzzing.Architecture
Current Status: The web scanner is a work-in-progress stub. Core components (crawler, fuzzer) are in active development. The architecture is in place but functionality is limited.
Current Capabilities
WebScanner (Alpha)
Main orchestration class:WebClient
HTTP client with session management:- Session persistence
- Cookie handling
- SSL/TLS verification control
- Custom headers
- Timeout management
WebCrawler (Stub)
Web discovery and crawling:WebFuzzer (Stub)
Parameter fuzzing and vulnerability detection:Planned Features
Phase 1: Discovery (In Progress)
-
Web Crawling
- Link extraction and following
- JavaScript rendering (Playwright/Selenium)
- Depth-limited traversal
- Scope boundary enforcement
- Subdomain enumeration
-
Parameter Discovery
- Form extraction
- Hidden field detection
- API endpoint discovery
- Query parameter enumeration
- JSON/XML parsing
-
Authentication
- Login automation
- Session management
- Multi-step authentication
- OAuth/SAML support
Phase 2: Fuzzing (Planned)
-
SQL Injection
- Error-based detection
- Boolean-based blind
- Time-based blind
- UNION-based extraction
-
XSS Detection
- Reflected XSS
- Stored XSS
- DOM-based XSS
- Context-aware payloads
-
Command Injection
- OS command injection
- Code injection
- Template injection
-
Other Vulnerabilities
- Path traversal
- SSRF
- XXE
- Insecure deserialization
- Open redirect
Phase 3: Analysis (Planned)
-
LLM-Guided Testing
- Context-aware payload generation
- Response analysis
- False positive filtering
- Exploitation path discovery
-
Reporting
- Detailed vulnerability reports
- Reproduction steps
- Severity scoring (CVSS)
- Remediation guidance
CLI Usage
Basic Scan
Custom Output Directory
Crawl Configuration
Skip SSL Verification
Output Structure
Crawl Results
Security Report
Integration with RAPTOR
From Autonomous Mode
Web scanning can be invoked from/agentic:
With Exploitability Validation
Web findings will integrate with the validation pipeline:Development Roadmap
Q1 2026
- ✅ Basic HTTP client (WebClient)
- ✅ Scanner architecture (WebScanner)
- 🔄 Web crawler implementation (WebCrawler)
- 🔄 Parameter discovery
Q2 2026
- ⏳ Fuzzer implementation (WebFuzzer)
- ⏳ SQL injection detection
- ⏳ XSS detection
- ⏳ LLM-guided payload generation
Q3 2026
- ⏳ Authentication handling
- ⏳ Advanced vulnerability types
- ⏳ JavaScript rendering support
- ⏳ API testing capabilities
Q4 2026
- ⏳ Reporting enhancements
- ⏳ Integration with validation pipeline
- ⏳ Performance optimization
- ⏳ Production readiness
Known Limitations
- No Active Scanning: Fuzzer is not functional
- No Vulnerability Detection: Detection logic not implemented
- Limited Crawling: Crawler returns empty results
- No JavaScript Rendering: Static HTML only
- No Authentication: Cannot test authenticated pages
- No API Testing: REST/GraphQL testing not supported
- No Reporting: Minimal reporting capabilities
Contributing
The web scanner needs significant development:-
Crawler Implementation
- Implement link extraction
- Add JavaScript rendering
- Handle forms and parameters
-
Fuzzer Implementation
- Add vulnerability detection logic
- Implement payload generation
- Add response analysis
-
Authentication
- Implement login automation
- Add session management
- Support common auth schemes
-
Testing
- Add unit tests
- Create integration tests
- Build test target applications
Alternative Tools
Until RAPTOR’s web scanner is production-ready, consider:- Burp Suite - Industry-standard web app testing
- OWASP ZAP - Open-source security scanner
- Nuclei - Template-based vulnerability scanner
- Ffuf - Fast web fuzzer
- SQLMap - SQL injection testing
- XSStrike - XSS detection
Experimental Usage
For testing the current implementation:Expect empty or minimal results from current implementation.
See Also
- Static Analysis - Code-level scanning
- CodeQL Analysis - Semantic analysis
- Binary Fuzzing - Binary fuzzing with AFL++
- Exploitability Validation - Finding validation