New ZAP PTK add-on sends browser security findings straight into ZAP alerts


OWASP ZAP has released version 0.3.0 of its OWASP PTK add-on, and the main change is a practical one: findings from the browser can now show up directly as native ZAP alerts. The ZAP team says this works with OWASP PTK 9.8.0 and lets testers review browser-side findings inside ZAP’s normal alert workflow instead of treating them as separate output.

That matters because modern web apps keep more logic in the browser than older apps did. ZAP already sees proxy-layer activity well, but the ZAP team says risks tied to SPA routing, DOM updates, client-side rendering, and JavaScript behavior often happen inside the browser runtime where a proxy alone cannot fully observe them.

The new add-on closes that gap by making PTK findings visible where ZAP users already work. Instead of checking one tool for traffic and another for browser-side issues, security teams can now review both in one interface and use ZAP’s existing alert triage flow.

What changed in ZAP PTK add-on 0.3.0

The ZAP blog says version 0.3.0 keeps the earlier browser integration and adds three notable upgrades. First, PTK findings can now surface as ZAP alerts. Second, users can choose which PTK rule packs to run. Third, teams can enable an auto-start option so PTK scanning begins when a ZAP-launched browser opens.

The rule selection piece covers SAST, IAST, and DAST. In the ZAP walkthrough, the team says users can choose which of those PTK rule packs to run before starting a browser session. That gives testers more control over whether they want source-oriented JavaScript findings, runtime browser findings, or browser-driven dynamic testing.

ZAP also continues to pre-install the OWASP PTK extension into Chrome, Firefox, and Edge when those browsers launch from ZAP. That part arrived earlier, but it remains the base workflow that makes the new alert mapping possible.

Launch a browser from ZAP straight into Juice Shop  (Source: Zaproxy)

Why this matters for modern app testing

The release is useful because many important frontend issues do not show up clearly at the proxy layer. The ZAP team specifically points to client-side rendering, SPA navigation, minified JavaScript bundles, and DOM-driven behavior as examples of things that can carry risk without producing obvious server-side clues.

 Review results in ZAP Alerts (Source: Zaproxy)

By pushing those findings into native alerts, ZAP lets teams keep their normal workflow. The blog says users can still filter by severity, review alerts in the usual place, and work through findings inside the same central interface instead of splitting client-side results into a separate review queue.

This is especially relevant for JavaScript-heavy applications. PTK runs in the browser context, while ZAP remains the hub for traffic and context. That pairing gives AppSec teams a more realistic view of how the application behaves during real authenticated sessions and UI flows.

What testers can do with it

FeatureWhat it does
PTK → ZAP AlertsSends PTK browser findings into ZAP as native alerts
Rule selectionLets users choose SAST, IAST, and DAST rule packs
Auto-start scansStarts PTK scanning automatically on browser launch if enabled
Browser integrationPre-installs PTK into Chrome, Firefox, and Edge launched from ZAP

How the workflow looks now

The ZAP team’s walkthrough says users should install or update the OWASP PTK add-on through the ZAP Marketplace, configure PTK scan options, then launch a browser from ZAP into the target app. From there, testers can navigate realistic flows such as login and other user actions while PTK scans in the browser and reports findings back into ZAP.

The same post says this is an early step toward more automation. Future work is expected to include auto-launched browsers, scripted journeys, and more continuous streaming of client-side findings into ZAP.

So the immediate gain is not just more findings. It is a cleaner testing loop where browser-native issues stop living outside the main AppSec workflow.

Quick facts

  • ZAP add-on version: 0.3.0.
  • PTK version mentioned by ZAP: 9.8.0.
  • Supported ZAP-launched browsers: Chrome, Firefox, Edge.
  • New core workflow: browser findings appear as native ZAP alerts.
  • Selectable scan rule packs: SAST, IAST, DAST.

FAQ

What is new in the ZAP PTK add-on 0.3.0?

The biggest change is that OWASP PTK findings can now appear directly as ZAP alerts. The release also adds selectable rule packs and an optional auto-start scan setting for ZAP-launched browsers.

Does ZAP still pre-install PTK in launched browsers?

Yes. The add-on still installs the PTK extension automatically in Chrome, Firefox, and Edge when those browsers launch from ZAP.

Why does this help with SPA and frontend-heavy apps?

Because many risks in modern apps happen inside the browser runtime through DOM changes, client-side rendering, and JavaScript behavior that a proxy does not fully see on its own. The ZAP team calls this out directly in its release walkthrough.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages