Actions
Activity #1658
openMaster Training Track Day 5 (ZAP)
Start date:
03/20/2026
Due date:
% Done:
100%
Estimated time:
3:00 h
End Date:
03/20/2026
Description
Pulled and ran ZAP in daemon mode (headless) on port 8080
Spidered Flask app — discovered 3 URLs
Ran active scan — completed 100%
Found 4 Low severity alerts: missing security headers + server version leak
No SQL injection, XSS or auth issues found
Fixed X-Content-Type-Options header in main.py
Hidden Werkzeug version from Server header
Rescanned — alerts reduced from 4 to 3
Generated HTML reports saved to ~/devsecops/zap/reports/
Created ZAP GitHub Actions workflow for CI pipeline
No data to display
Actions