Acunetix AcuSensor is an IAST agent that pairs with the Acunetix DAST scanner to give you code-level vulnerability details. It supports PHP, Java, .NET, and Node.js.

The agent runs inside your application runtime. While the DAST scanner throws attack payloads from outside, AcuSensor watches how those payloads travel through backend code. For PHP, that means exact file names and line numbers. For Java and .NET, you get full stack traces.
Acunetix detects over 7,000 vulnerability types including zero-days. AcuSensor adds internal visibility to that scanning by confirming whether attacks actually reach vulnerable code paths. Over 2,300 companies use the scanner, including NASA, American Express, and the U.S. Air Force.
What is Acunetix AcuSensor?
AcuSensor turns the Acunetix black-box DAST scanner into a grey-box IAST solution. You don’t need to modify your source code. The agent intercepts code execution at runtime and feeds intelligence back to the scanner as it runs.
Key Features
| Feature | Details |
|---|---|
| Supported Languages | PHP, Java (including Spring), .NET (including .NET Core), Node.js |
| Operating Systems | Linux/UNIX and Windows servers |
| Vulnerability Coverage | 7,000+ vulnerability types including zero-days |
| API Support | REST, SOAP, and GraphQL |
| Performance Overhead | Less than 1% in standard scenarios |
| Agent Generation | Unique per target for security |
| Bridge URL | https://iast.invicti.com (default, configurable per target) |
| Deployment | Staging servers and CI/CD VMs only |
SQL Injection Trace Analysis
When a SQL injection turns up, AcuSensor shows the full data flow from user input through business logic to the database query. You see whether sanitization functions were called, whether they worked, and how the final query was constructed.
For PHP applications, AcuSensor parses source code to map every input point. For Java and .NET, it captures stack traces showing the complete call chain.
Hidden Asset Discovery
AcuSensor finds assets the external crawler misses. It builds a full file listing of the application directory and intercepts variable access (like PHP’s $_GET and $_POST arrays) to surface hidden parameters.

What this catches:
- Admin panels with no public links
- Undocumented API endpoints
- Backup files and development artifacts
- Unlinked JavaScript files
- Hidden form fields and parameters
False Positive Reduction
By observing the application from inside, AcuSensor confirms whether a potential vulnerability flagged by the DAST scanner is real. If the scanner suspects a SQL injection but AcuSensor sees that the input gets sanitized before reaching the database, it drops the finding.
This is particularly useful for applications with complex input validation that a black-box scanner cannot observe.

Getting Started
https://iast.invicti.com. Bridge URL and port are configurable per target. Java and Node.js require the bridge configuration to be set before scanning.When to Use Acunetix AcuSensor
AcuSensor makes sense when you already run Acunetix DAST and want more actionable results. The code-level detail turns generic HTTP-level findings into specific file-and-line remediation guidance.
Deploy it on staging servers or in VMs as part of CI/CD pipelines. Not recommended for production since active sensors consume resources. Overhead is under 1% in standard scenarios, though SQL-heavy or ORM-heavy applications may see more.
If your application uses a language AcuSensor doesn’t support, or you cannot deploy agents to your test environment, you’ll need to rely on DAST-only scanning or consider a standalone IAST tool like Contrast Assess or Datadog IAST.
