Skip to content

Available CI/CD variables and configuration files

  • changed Changed template name from DAST-API.gitlab-ci.yml to API-Security.gitlab-ci.yml and variable prefixed from DAST_API_ to APISEC_ in GitLab 17.1.

Available CI/CD variables

CI/CD variable Description
SECURE_ANALYZERS_PREFIX Specify the Docker registry base address from which to download the analyzer.
APISEC_DISABLED Set to 'true' or '1' to disable API security testing scanning.
APISEC_DISABLED_FOR_DEFAULT_BRANCH Set to 'true' or '1' to disable API security testing scanning for only the default (production) branch.
APISEC_VERSION Specify API security testing container version. Defaults to 3.
APISEC_IMAGE_SUFFIX Specify a container image suffix. Defaults to none.
APISEC_API_PORT Specify the communication port number used by API security testing engine. Defaults to 5500. Introduced in GitLab 15.5.
APISEC_TARGET_URL Base URL of API testing target.
APISEC_TARGET_CHECK_SKIP Disable waiting for target to become available. Introduced in GitLab 17.1.
APISEC_TARGET_CHECK_STATUS_CODE Provide the expected status code for target availability check. If not provided, any non-500 status code is acceptable. Introduced in GitLab 17.1.
APISEC_CONFIG API security testing configuration file. Defaults to .gitlab-dast-api.yml.
APISEC_PROFILE Configuration profile to use during testing. Defaults to Quick.
APISEC_EXCLUDE_PATHS Exclude API URL paths from testing.
APISEC_EXCLUDE_URLS Exclude API URL from testing.
APISEC_EXCLUDE_PARAMETER_ENV JSON string containing excluded parameters.
APISEC_EXCLUDE_PARAMETER_FILE Path to a JSON file containing excluded parameters.
APISEC_REQUEST_HEADERS A comma-separated (,) list of headers to include on each scan request. Consider using APISEC_REQUEST_HEADERS_BASE64 when storing secret header values in a masked variable, which has character set restrictions.
APISEC_REQUEST_HEADERS_BASE64 A comma-separated (,) list of headers to include on each scan request, Base64-encoded. Introduced in GitLab 15.6.
APISEC_OPENAPI OpenAPI specification file or URL.
APISEC_OPENAPI_RELAXED_VALIDATION Relax document validation. Default is disabled.
APISEC_OPENAPI_ALL_MEDIA_TYPES Use all supported media types instead of one when generating requests. Causes test duration to be longer. Default is disabled.
APISEC_OPENAPI_MEDIA_TYPES Colon (:) separated media types accepted for testing. Default is disabled.
APISEC_HAR HTTP Archive (HAR) file.
APISEC_GRAPHQL Path to GraphQL endpoint, for example /api/graphql. Introduced in GitLab 15.4.
APISEC_GRAPHQL_SCHEMA A URL or filename for a GraphQL schema in JSON format. Introduced in GitLab 15.4.
APISEC_POSTMAN_COLLECTION Postman Collection file.
APISEC_POSTMAN_COLLECTION_VARIABLES Path to a JSON file to extract Postman variable values. The support for comma-separated (,) files was introduced in GitLab 15.1.
APISEC_OVERRIDES_FILE Path to a JSON file containing overrides.
APISEC_OVERRIDES_ENV JSON string containing headers to override.
APISEC_OVERRIDES_CMD Overrides command.
APISEC_OVERRIDES_CMD_VERBOSE When set to any value. It shows overrides command output as part of the job output.
APISEC_PRE_SCRIPT Run user command or script before scan session starts. sudo must be used for privileged operations like installing packages.
APISEC_POST_SCRIPT Run user command or script after scan session has finished. sudo must be used for privileged operations like installing packages.
APISEC_OVERRIDES_INTERVAL How often to run overrides command in seconds. Defaults to 0 (once).
APISEC_HTTP_USERNAME Username for HTTP authentication.
APISEC_HTTP_PASSWORD Password for HTTP authentication. Consider using APISEC_HTTP_PASSWORD_BASE64 instead.
APISEC_HTTP_PASSWORD_BASE64 Password for HTTP authentication, base64-encoded. Introduced in GitLab 15.4.
APISEC_SERVICE_START_TIMEOUT How long to wait for target API to become available in seconds. Default is 300 seconds.
APISEC_TIMEOUT How long to wait for API responses in seconds. Default is 30 seconds.
APISEC_SUCCESS_STATUS_CODES Specify a comma-separated (,) list of HTTP success status codes that determine whether an API security testing scanning job has passed. Introduced in GitLab 17.1. Example: '200, 201, 204'

Configuration files

To get you started quickly, GitLab provides the configuration file gitlab-dast-api-config.yml. This file has several testing profiles that perform various numbers of tests. The run time of each profile increases as the test numbers go up. To use a configuration file, add it to your repository's root as .gitlab/gitlab-dast-api-config.yml.

Profiles

The following profiles are pre-defined in the default configuration file. Profiles can be added, removed, and modified by creating a custom configuration.

Passive

  • Application Information Check
  • Cleartext Authentication Check
  • JSON Hijacking Check
  • Sensitive Information Check
  • Session Cookie Check

Quick

  • Application Information Check
  • Cleartext Authentication Check
  • FrameworkDebugModeCheck
  • HTML Injection Check
  • Insecure Http Methods Check
  • JSON Hijacking Check
  • JSON Injection Check
  • Sensitive Information Check
  • Session Cookie Check
  • SQL Injection Check
  • Token Check
  • XML Injection Check

Full

  • Application Information Check
  • Cleartext AuthenticationCheck
  • CORS Check
  • DNS Rebinding Check
  • Framework Debug Mode Check
  • HTML Injection Check
  • Insecure Http Methods Check
  • JSON Hijacking Check
  • JSON Injection Check
  • Open Redirect Check
  • Sensitive File Check
  • Sensitive Information Check
  • Session Cookie Check
  • SQL Injection Check
  • TLS Configuration Check
  • Token Check
  • XML Injection Check