TotalAppSec Release 2.4 | Web Application Scanning Release 1.24

November 14, 2025

TotalAppSec TotalAppSec

Enhanced Discovery of Web Applications and APIs through Scans

We have enhanced TotalAppSec capabilities to discover potential web applications and APIs within existing web assets through the discovery and vulnerability scans.

This enhancement broadens your security coverage by discovering potential web applications and APIs, adding them to your subscription, and scanning them for vulnerabilities.

Potential APIs Discovery

The discovery and vulnerability scan discovers potential APIs based on the links crawled and XHR requests from the existing web assets in your subscription. 

The discovered potential APIs are displayed in the Discovery > Discovered APIs page. You can search for these API with Sources as WAS and Sub sources as VULNERABILITY SCAN. 

Discovered APIs.

You can add these discovered APIs to subscriptions from the Quick Actions menu and launch a vulnerability and compliance scan. 

Potential Web Applications Discovery 

When a vulnerability scan runs on a web asset in your subscription, it will now discover the potential web applications available in the web asset.

The potential web applications are displayed in the Discovery > Discovered Web Applications page.

The Discovered Web Applications tab displays the number of web applications with the Sources as WAS.

Discover potential web applications.

You can add these discovered web applications to subscriptions from the Quick Actions menu and launch discovery and vulnerability scan. 

End-to-End Logging for Connector Activities

With this release, we have introduced end-to-end logging for connector activities. You can now view these comprehensive logs directly on the Connector screen in the Logs tab.

E2E logging.

These enhanced logs offer greater insight into connector operations, enabling more advanced analysis and effective troubleshooting.

TotalAppSec Web Application Scanning  TotalAppSec and Web Application Scanning

New Scan Settings in the Additional Configurations for Web Application

You can now define key scan parameters directly from the user interface using the new options available in the Additional Configurations section of the create and edit Web Application workflow.

Earlier, these settings were managed through backend settings. This enhancement provides greater flexibility and control while ensuring that default values and safeguards are maintained for optimal scanning performance.

The following settings are now available under Additional Configurations:

  • Reauthentication Setting: Defines automatic login attempts in case of authentication failure. This helps with temporary connection issues, but may trigger account lockouts if the credentials are incorrect.
    • Auto-Retry Failed Authentication: Enables automatic retry after the failed authentication attempts during scanning.
    • Wait Between Retries: Specifies the duration for which the system should wait before retrying the authentication.
    • Maximum Login Attempts: Specifies the maximum number of times the system attempts to connect to the authentication server.
    • URL to Confirm Active Session: Specifies the URL to verify whether the login session with the authentication server is active.
  • Crawling Behavior: Specifies the duration for which the system waits before the start of scanning after the page loads.
  • Browser Setting: Enables or disables the same-origin policy to control content access across domains.
  • Scan Time Optimization: Enables scan time optimization by skipping detailed header and cookie testing for URLs without parameters.

Additional Configuration.

Addition of Debug Scan Option

We have introduced the Debug Scan checkbox under the Scan Settings page in the create and edit vulnerability scan workflow. To troubleshoot scan issues, you can now select the Debug Scan option to collect detailed scan logs.

To enable the Debug Scan mode, navigate to Launch New Scan > Vulnerability > Scan Settings.

Debug scan.

 The Debug Scan option is only available when launching a vulnerability scan.

Issues Addressed

Application Category/Component Description

TAS

API Discovery Scan

We fixed an issue where the user encountered an error while launching an API discovery scan on any web application.

TAS

Azure API Connector Configuration

We fixed multiple issues with the Azure API Connector configuration. The following changes are made:

  • The connector configuration did not accept user-provided tenant ID. The issue is fixed, and now the connector configuration uses the tenant ID provided by the user.
  • Resource names containing space characters resulted in connector failure. The issue is fixed, and resource names containing space are accepted.
  • We have migrated to OAuth token API to version 2.0.
  • We have updated the connector configuration to fetch the APIManagement resources.

TAS and WAS

Scans, user roles, and permissions

An issue was observed where a sub-user could see the scan results for the assets that were out of scope. It was identified that this case was observed for the user with the Auditor role. The issue is fixed.

TAS and WAS

Authentication Configuration

We fixed an issue where authenticated scans were performed on the assets in WAS, even when authentication was disabled in Web Malware Detection (MDS).

TAS and WAS

Proxy Configuration

We fixed an issue where users were entering invalid FQDNs or IP addresses in the Proxy Exception field on the Proxies tab.

TAS and WAS

Certificate authentication

We fixed an issue where users encountered an error while uploading a certificate for authentication under Authentication Record > Server Record > Upload Certificate.

TAS and WAS

Web Application Configuration

An issue was observed where the user disabled the Set up Exclusion Lists option in the Web Application > Additional Configurations. When an allow list is available in the Global Settings, the change is not saved. The Set up Exclusion Lists option is enabled automatically. The issue is fixed.

TAS and WAS

Scheduled scan

We fixed an issue where scan schedules in daylight saving time zones were shifted by one hour. The time zone offset now automatically adjusts to account for daylight saving time.

TAS and WAS

Scan schedules with tags

We fixed an issue where schedule scans created with tags in the Web Applications and APIs tabs were not displayed in the Application Details > Schedules section.

TAS and WAS

Scheduled Scans

We fixed an issue where scheduled scans were being canceled automatically without displaying any error message.

TAS and WAS

Scheduled and On-demand scans

We fixed an issue that caused a discrepancy in the vulnerabilities and links crawled during the on-demand scans and scheduled scans.

TAS and WAS

Detections

We fixed an issue where users could not view scan findings and observed a mismatch in scan dates.