Skip to content
Home IAST Tools Acunetix AcuSensor
Acunetix AcuSensor

Acunetix AcuSensor

Category: IAST
License: Commercial
Suphi Cankurt
Suphi Cankurt
AppSec Enthusiast
Updated February 14, 2026
3 min read
Key Takeaways
  • AcuSensor is an IAST agent bundled with Acunetix DAST that provides exact file names and line numbers for PHP vulnerabilities, and full stack traces for Java and .NET.
  • Supports PHP, Java (including Spring), .NET (including .NET Core), and Node.js with less than 1% performance overhead in standard scenarios.
  • Eliminates false positives by confirming whether attack payloads actually reach vulnerable code paths at runtime, dropping findings when input is properly sanitized.
  • Discovers hidden assets the external crawler misses: admin panels, undocumented API endpoints, backup files, and hidden form parameters.

Acunetix AcuSensor is an IAST agent that pairs with the Acunetix DAST scanner to give you code-level vulnerability details. It supports PHP, Java, .NET, and Node.js.

Acunetix vulnerability trends dashboard showing issues over time

The agent runs inside your application runtime. While the DAST scanner throws attack payloads from outside, AcuSensor watches how those payloads travel through backend code. For PHP, that means exact file names and line numbers. For Java and .NET, you get full stack traces.

Acunetix detects over 7,000 vulnerability types including zero-days. AcuSensor adds internal visibility to that scanning by confirming whether attacks actually reach vulnerable code paths. Over 2,300 companies use the scanner, including NASA, American Express, and the U.S. Air Force.

What is Acunetix AcuSensor?

AcuSensor turns the Acunetix black-box DAST scanner into a grey-box IAST solution. You don’t need to modify your source code. The agent intercepts code execution at runtime and feeds intelligence back to the scanner as it runs.

Code-Level Precision
Pinpoints vulnerabilities to exact file names and line numbers for PHP. Java and .NET get full stack traces showing the call chain from HTTP request to vulnerable code.
Hidden Asset Discovery
Builds a full file listing of the application directory and intercepts variable access to surface hidden GET/POST parameters, unlinked admin panels, and undocumented API endpoints.
False Positive Elimination
Confirms whether attack payloads actually reach vulnerable code paths at runtime. If input is properly sanitized before hitting the database, AcuSensor drops the finding.

Key Features

FeatureDetails
Supported LanguagesPHP, Java (including Spring), .NET (including .NET Core), Node.js
Operating SystemsLinux/UNIX and Windows servers
Vulnerability Coverage7,000+ vulnerability types including zero-days
API SupportREST, SOAP, and GraphQL
Performance OverheadLess than 1% in standard scenarios
Agent GenerationUnique per target for security
Bridge URLhttps://iast.invicti.com (default, configurable per target)
DeploymentStaging servers and CI/CD VMs only

SQL Injection Trace Analysis

When a SQL injection turns up, AcuSensor shows the full data flow from user input through business logic to the database query. You see whether sanitization functions were called, whether they worked, and how the final query was constructed.

For PHP applications, AcuSensor parses source code to map every input point. For Java and .NET, it captures stack traces showing the complete call chain.

Hidden Asset Discovery

AcuSensor finds assets the external crawler misses. It builds a full file listing of the application directory and intercepts variable access (like PHP’s $_GET and $_POST arrays) to surface hidden parameters.

Acunetix discovery dashboard showing targets with risk scores

What this catches:

  • Admin panels with no public links
  • Undocumented API endpoints
  • Backup files and development artifacts
  • Unlinked JavaScript files
  • Hidden form fields and parameters
API Coverage
AcuSensor works with REST, SOAP, and GraphQL APIs. The agent identifies API endpoints used by web applications during scanning, expanding the attack surface beyond what the crawler alone can reach.

False Positive Reduction

By observing the application from inside, AcuSensor confirms whether a potential vulnerability flagged by the DAST scanner is real. If the scanner suspects a SQL injection but AcuSensor sees that the input gets sanitized before reaching the database, it drops the finding.

This is particularly useful for applications with complex input validation that a black-box scanner cannot observe.

Acunetix scan progress showing threat level and scan metrics

Getting Started

1
Enable AcuSensor for your target — In the Acunetix Target configuration panel, click the AcuSensor toggle (purple when enabled). Each agent is generated uniquely per target for security.
2
Download and deploy the agent — Select your server platform (PHP, Java, .NET, or Node.js) and download the sensor files. Deploy to your staging environment following the platform-specific guide. No source code changes needed.
3
Configure the bridge — Whitelist the default bridge URL https://iast.invicti.com. Bridge URL and port are configurable per target. Java and Node.js require the bridge configuration to be set before scanning.
4
Run your scan — Start a scan against the instrumented application. AcuSensor feeds real-time intelligence back to the scanner, and results include code-level details alongside the standard DAST findings.

When to Use Acunetix AcuSensor

AcuSensor makes sense when you already run Acunetix DAST and want more actionable results. The code-level detail turns generic HTTP-level findings into specific file-and-line remediation guidance.

Best For
Teams already using Acunetix DAST who want code-level precision, hidden asset discovery, and fewer false positives from their existing scans.

Deploy it on staging servers or in VMs as part of CI/CD pipelines. Not recommended for production since active sensors consume resources. Overhead is under 1% in standard scenarios, though SQL-heavy or ORM-heavy applications may see more.

If your application uses a language AcuSensor doesn’t support, or you cannot deploy agents to your test environment, you’ll need to rely on DAST-only scanning or consider a standalone IAST tool like Contrast Assess or Datadog IAST.

Frequently Asked Questions

What is Acunetix AcuSensor?
AcuSensor is an IAST agent that runs inside your application alongside the Acunetix DAST scanner. It provides code-level vulnerability details including exact file names, line numbers for PHP, and stack traces for Java and .NET.
Is Acunetix AcuSensor free or commercial?
AcuSensor is a commercial product included with Acunetix vulnerability scanner licenses. There is no separate purchase required.
What languages does AcuSensor support?
AcuSensor supports PHP, Java (including Spring), .NET (including .NET Core), and Node.js applications running on Linux/UNIX and Windows servers.
How much performance overhead does AcuSensor add?
According to Acunetix, overhead is typically less than 1% in standard scenarios. Applications heavy on SQL or ORM operations may see more impact.
Can AcuSensor run in production?
No. Acunetix recommends deploying AcuSensor only on staging servers or in virtual machines as part of CI/CD pipelines. Active sensors consume resources and are not intended for production use.