Static Analysis & Scanning

What is DAST (Dynamic Application Security Testing)?

DAST tests a running application by sending malicious inputs and observing responses — finding runtime vulnerabilities that static analysis cannot detect.

By the Hyrax team·5 min read·May 1, 2026
TL;DR
  1. 1.Definition
  2. 2.How DAST Works
  3. 3.What DAST Detects
  4. 4.DAST in the Security Pipeline
  5. 5.DAST Limitations

Definition

Dynamic Application Security Testing (DAST) is a security testing approach that interacts with a running application to find vulnerabilities. Unlike SAST, which reads source code without executing it, DAST sends inputs to a live application and analyzes its responses — detecting vulnerabilities that only manifest at runtime.

DAST is sometimes called "black-box testing" because it does not require access to source code. The tester interacts with the application through its interfaces — HTTP endpoints, APIs, web forms — just as an attacker would.

How DAST Works

A DAST scanner performs several types of active testing against the running application:

Crawling

The scanner maps the application's attack surface: every endpoint, form, parameter, and entry point it can discover. This map becomes the basis for subsequent testing.

Fuzzing and injection

The scanner sends malicious or malformed inputs — SQL injection payloads, XSS strings, path traversal sequences, oversized inputs — to every discovered entry point and observes whether the application responds in ways that indicate a vulnerability.

Authentication and session testing

The scanner tests authentication mechanisms for weaknesses: brute force susceptibility, weak session tokens, insecure cookie flags, missing HTTPS enforcement.

Response analysis

The scanner analyzes responses for indicators of vulnerability: database error messages that confirm SQL injection, reflected input in HTML that confirms XSS, unexpected file contents that confirm path traversal.

What DAST Detects

DAST is particularly effective at detecting:

  • SQL injection and other injection vulnerabilities
  • Cross-site scripting (XSS) in rendered responses
  • Authentication weaknesses and session management flaws
  • Server-side request forgery (SSRF)
  • Security misconfigurations exposed at runtime
  • Insecure direct object references
PropertySASTDAST
Requires running appNoYes
Requires source codeYesNo
Finds SQL injectionYes (in source)Yes (in behavior)
Finds config errorsLimitedYes
False positive rateHigherLower (confirmed by behavior)
Integration pointCI/CD, dev timeStaging, pre-production
Fix guidanceCode locationBehavioral description

DAST in the Security Pipeline

DAST runs against a deployed application — typically in a staging or pre-production environment:

  • DAST in CI/CD — automated scanning of staging deployments before production releases
  • DAST as scheduled testing — periodic scans of production or staging to catch regressions
  • DAST in penetration testing — as a tool used by security teams to supplement manual testing

DAST Limitations

DAST has complementary limitations to SAST:

  • Requires a running application — cannot run until late in the development cycle
  • Coverage is bounded by what the crawler can discover — endpoints not mapped will not be tested
  • No source-level fix guidance — findings describe the behavior, not the code that produced it
  • Can produce false positives where injections succeed but are not actually exploitable

DAST and Autonomous Code Governance

DAST confirms what SAST suspects. When a DAST scan validates a vulnerability at runtime, that finding carries higher confidence than a SAST detection alone. Autonomous code governance systems can use DAST-validated findings as high-priority remediation targets — the exploitability is confirmed, making autonomous remediation both urgent and justified.

Hydra integrates DAST findings as one input stream into its prioritization layer, treating confirmed runtime vulnerabilities as highest-confidence candidates for autonomous fix generation.

Frequently Asked Questions

Can DAST run against production?

DAST sends active attack payloads to the target application. Running it against production risks disrupting real users and potentially corrupting data. Best practice is to run DAST against a staging environment that mirrors production. Some passive DAST variants can analyze production traffic safely without active injection.

Do I need both SAST and DAST?

Yes. SAST and DAST have complementary coverage: SAST finds vulnerabilities in source code before deployment, DAST finds runtime vulnerabilities after deployment. Using both significantly increases the coverage of your application security program. IAST (Interactive Application Security Testing) is a third approach that combines elements of both.

How long does a DAST scan take?

It depends on application size and scanner configuration. A targeted scan of specific endpoints can complete in minutes. A comprehensive scan of a large application can take hours. Most teams run targeted scans in CI/CD and schedule full scans periodically.

Stop flagging. Start fixing.

Hyrax reviews your pull requests, remediates issues autonomously, and closes the ticket.

Join the waitlist