Skip to content
Escape

Escape

NEW
Category: DAST
License: Commercial
Suphi Cankurt
Suphi Cankurt
AppSec Enthusiast
Updated February 21, 2026
4 min read
Key Takeaways
  • Escape specializes in API-native DAST with Business Logic Security Testing for BOLA and IDOR vulnerabilities.
  • Runs 140+ attack scenarios against REST and GraphQL APIs, using AI to generate realistic authorization-probing payloads.
  • Native GraphQL support and the open-source GraphQL Armor middleware (100,000+ weekly npm downloads) are free.
  • Y Combinator-backed with SOC 2 Type II compliance and CI/CD integration for automated API security testing.

Escape is an API-native DAST platform built for teams that ship REST and GraphQL APIs. It runs 140+ security tests with a focus on business logic flaws — the BOLA, IDOR, and access control bugs that traditional web scanners were never designed to catch.

Escape API security dashboard showing discovered APIs and vulnerability context

The platform is agentless. No traffic monitoring, no proxy setup. Point it at your API schema or let it crawl, and it generates intelligent attack payloads using AI.

Founded in 2020, Y Combinator backed, SOC 2 Type II compliant. Used by 2,000+ security teams.

Key features at a glance

FeatureDetail
Attack Scenarios140+ covering injection, auth, access control, data exposure
API SupportREST, GraphQL (native), gRPC
AuthenticationOAuth 2.0, AWS Cognito, Basic, Digest, JWT, browser-based, MFA
CI/CD IntegrationsGitHub Actions, GitLab CI, Jenkins, Azure DevOps, Bitbucket, CircleCI
Scan ModeAgentless — no agents, no traffic monitoring
Compliance ReportsOWASP Top 10, SOC 2, PCI-DSS
Open SourceGraphQL Armor (100,000+ weekly npm downloads)
DeploymentCloud SaaS, private locations with mTLS support
Incremental ScanningYes — tests only changed endpoints in CI/CD

What is Escape?

Most DAST tools started as web crawlers that send payloads to HTML forms. Escape took a different path — it was built from day one for APIs.

The scanner reads your OpenAPI spec or GraphQL schema and generates test cases that understand your API’s data model. Instead of blindly fuzzing parameters, it reasons about what should and shouldn’t be allowed, then crafts requests to check those assumptions.

This matters most for authorization testing. BOLA (Broken Object Level Authorization) sits at #1 on OWASP’s API Security Top 10, and it’s the kind of bug that generic scanners consistently fail to find. Escape creates multiple user sessions, generates resources as one user, and tries to access them as another.

Business Logic Security Testing
Escape’s BLST engine goes beyond signature-based detection. It identifies resources that should be isolated between users, operations that should require elevated privileges, and data that should be filtered by ownership. These tests need context about how the API works, which Escape builds from schemas and observed behavior.
BOLA & IDOR Detection
Creates resources as one user, attempts access as another. Catches the authorization flaws that top OWASP’s API Security Top 10 and that traditional scanners consistently miss.
Native GraphQL Testing
Introspects schemas, generates type-aware payloads, tests nested resolver authorization. Detects batching attacks, query complexity abuse, and introspection leaks.
AI-Powered Payloads
Uses AI to generate realistic test inputs based on field types, schema constraints, and observed response patterns. Finds edge cases that template-based fuzzing overlooks.

GraphQL security

Escape API inventory screen showing discovered endpoints and security status

Escape has the strongest GraphQL support in the DAST market. Rather than wrapping GraphQL requests in HTTP-level tests, the scanner understands the query language natively.

It introspects schemas to discover all queries and mutations. It generates type-aware test payloads. It tests nested resolver authorization, where permissions on a parent object don’t always cascade to child resolvers. It detects batching attacks and query complexity issues that can lead to denial of service.

The open-source GraphQL Armor middleware (100,000+ weekly npm downloads) protects GraphQL APIs against these same attack classes in production.

Authentication handling

Modern APIs use complex auth flows. Escape handles OAuth 2.0 (authorization code, client credentials, ROPC), AWS Cognito, JWT refresh and rotation, Basic and Digest auth, browser-based flows, and even MFA/captcha scenarios. The OWASP API Security Top 10 lists Broken Authentication (API2) alongside Broken Object Level Authorization (API1) as the two most critical API risks, and Escape’s multi-user session testing directly targets both.

Multi-user testing is built in. Define two or more user roles with different permission levels and Escape automatically tests authorization boundaries between them.

Agentic crawling
For SPAs and web applications without a schema file, Escape’s agentic crawling mode navigates the app in a real browser, discovers API calls, and builds a test plan from observed traffic. You don’t need an OpenAPI spec to get started.

How to use Escape

1
Set up credentials — Sign up at escape.tech, get your API key, and set it as ESCAPE_API_KEY environment variable.
2
Connect your API — Provide an OpenAPI/GraphQL schema URL, or let Escape’s agentic crawler discover endpoints automatically.
3
Define user roles — Set up at least two user sessions with different permission levels for BOLA/IDOR testing.
4
Run your first scan — Trigger a scan from the Escape dashboard or via the CI/CD integration, then review findings in the dashboard.

CI/CD integration

# GitHub Actions
name: API Security
on: [push, pull_request]

jobs:
  security-scan:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4
      - name: Run Escape scan
        uses: Escape-Technologies/action@v0
        with:
          api_key: ${{ secrets.ESCAPE_API_KEY }}
          profile_id: ${{ secrets.ESCAPE_PROFILE_ID }}

Escape also supports incremental scanning in CI — it tests only endpoints that changed in the PR, which keeps scan times short without sacrificing coverage.

Integrations

CI/CD
GitHub Actions GitHub Actions
GitLab CI GitLab CI
Bitbucket Bitbucket
Jenkins Jenkins
Azure DevOps Azure DevOps
CircleCI CircleCI
Ticketing & Alerts
Jira Jira
Slack Slack
Datadog Datadog

When to use Escape

Escape is the right pick for teams building API-first applications — especially if you run GraphQL. The BOLA/IDOR detection is a genuine differentiator over traditional DAST tools that focus on injection and XSS.

Good fit when you need:

  • Authorization and business logic testing for REST or GraphQL APIs
  • Native GraphQL scanning (not HTTP-level proxying)
  • BOLA/IDOR detection with multi-user session testing
  • Fast CI/CD scanning with incremental mode
  • Agentless deployment with no traffic monitoring required

If your stack is mostly traditional server-rendered web apps, a general-purpose DAST like Burp Suite or Invicti will cover more ground. For teams that want free CI/CD scanning as a baseline, Dastardly pairs well alongside Escape. Our what is DAST guide explains how dynamic testing fits into a broader AppSec strategy. Escape fills a gap for API-heavy architectures where traditional scanners come up short.

Frequently Asked Questions

What is Escape?
Escape is an API-native DAST platform that specializes in business logic vulnerabilities like BOLA and IDOR. It runs 140+ security tests against REST and GraphQL APIs, using AI to generate realistic attack payloads that probe authorization boundaries.
Is Escape free or commercial?
Escape is commercial, backed by Y Combinator. The open-source GraphQL Armor middleware (100,000+ weekly npm downloads) is free. The full platform requires a paid subscription with pricing based on number of applications.
What vulnerabilities does Escape detect?
Escape runs 140+ attack scenarios covering BOLA, IDOR, SQL injection, XSS, SSRF, XXE, SSTI, command injection, CSRF, default credentials, and sensitive data exposure. Its Business Logic Security Testing engine catches access control flaws that traditional DAST tools miss.
How does Escape compare to traditional DAST tools?
Escape was built from scratch for APIs, not adapted from an HTML crawler. It claims 4000% code coverage improvement and 87% fewer false negatives compared to legacy DAST tools. Native GraphQL support is a significant differentiator.
Does Escape support CI/CD integration?
Yes. Escape has official integrations for GitHub Actions, GitLab CI, Bitbucket, Jenkins, Azure DevOps, CircleCI, Travis CI, and Harness. It supports incremental scanning to test only changed endpoints.