Skip to content
Home IAST Tools Invicti Shark (IAST)
Invicti Shark (IAST)

Invicti Shark (IAST)

NEW
Category: IAST
License: Commercial
Suphi Cankurt
Suphi Cankurt
AppSec Enthusiast
Updated February 16, 2026
3 min read
Key Takeaways
  • Invicti Shark is an IAST sensor that pairs with the Invicti DAST scanner to provide code-level vulnerability details for PHP, Java, .NET, and Node.js.
  • Discovers hidden assets — admin panels, undocumented API endpoints, and backup files — that external DAST crawling cannot reach.
  • Feeds runtime observations into Invicti's Proof-Based Scanning, providing both exploitation proof and exact code locations per finding.
  • Detects OWASP API Top 10 issues including BOLA, IDOR, and BFLA that require runtime context to identify.

Invicti Shark is an IAST sensor that pairs with the Invicti DAST scanner. The scanner attacks from outside; Shark watches from inside the runtime and catches vulnerabilities and hidden assets that external-only scanning misses.

The team behind Shark built one of the first commercial IAST implementations (AcuSensor). Shark plugs directly into Invicti’s Proof-Based Scanning, so reported vulnerabilities come with both exploitation proof and exact code locations.

What is Invicti Shark?

Shark sits inside your application while the scanner sends requests. It observes how those requests move through backend code. You get file names, line numbers (for PHP), and stack traces (for Java and .NET) for each finding.

Invicti Shark IAST and SCA scan settings configuration panel

Each Shark Token is generated uniquely per target from the Target configuration panel in Invicti. The default bridge URL is https://iast.invicti.com, which needs to be whitelisted. Bridge URL and port are configurable per target.

Proof-Based Integration
Shark feeds runtime observations into Invicti’s Proof-Based Scanning. Reported vulnerabilities include both exploitation proof and the exact code location where the issue exists.
Hidden Asset Discovery
Finds admin panels, undocumented API endpoints, backup files, and hidden form parameters that the external crawler cannot reach. Shark lists every file in the application directory and intercepts variable access.
API Security Detection
Monitors for OWASP API Top 10 issues including BOLA (Broken Object-Level Authorization), IDOR (Insecure Direct Object Reference), and BFLA (Broken Function-Level Authorization).

Key Features

FeatureDetails
Supported LanguagesPHP, Java, .NET, Node.js
Scanning ApproachIAST sensor paired with DAST scanner
Vulnerability ProofCombined Proof-Based Scanning + runtime observation
Code LocationFile names, line numbers (PHP), stack traces (Java/.NET)
API CoverageOWASP API Top 10 (BOLA, IDOR, BFLA)
Asset DiscoveryHidden endpoints, admin panels, backup files, form parameters
Bridge URLhttps://iast.invicti.com (configurable per target)
DeploymentStaging/test environments only

Hidden asset discovery

DAST crawlers only find pages and endpoints linked from other pages. Shark sees everything inside the application directory:

  • Admin panels with no public navigation links
  • API endpoints missing from documentation
  • Backup files and development artifacts
  • Hidden GET and POST parameters the crawler never encounters

So the attack surface Invicti actually tests goes well beyond what crawling alone covers.

Proof-Based Scanning integration

Invicti Shark scan results showing detected vulnerabilities with details

Invicti’s Proof-Based Scanning confirms vulnerabilities by safely exploiting them and producing evidence. Shark adds the internal view: it confirms that payloads actually reached vulnerable code, provides the call chain showing the attack path, and verifies that input bypassed sanitization.

You end up with vulnerability reports that are both verified as exploitable and pinned to specific code locations.

Same tech as AcuSensor
Shark shares its heritage with AcuSensor, Invicti’s IAST component for the Acunetix scanner. Both use the same bridge infrastructure (iast.invicti.com) and provide similar runtime visibility. Shark is built specifically for Invicti’s scanning engine.

SQL injection tracing

For SQL injection findings, Shark traces the full path from user input to database query. You see which sanitization functions were called (if any), whether they worked, and how the final query was constructed. Instead of a generic “SQL injection found” report, developers get the specific data flow that needs fixing.

API security flaw detection

Shark also monitors for API vulnerabilities that need runtime context to identify:

  • BOLA — detects when user input directly accesses objects without authorization checks
  • IDOR — identifies direct references to internal implementation objects
  • BFLA — finds missing authorization on administrative functions

These are nearly impossible to catch from outside the application.

Getting Started

1
Generate the Shark Token — In Invicti, go to your Target configuration panel and generate a unique Shark Token. Each target gets its own token for security.
2

Deploy the sensor — Install Shark on your staging or test environment. PHP uses an extension, Java uses a JVM agent argument, .NET uses a package. No source code changes needed.

Invicti Shark sensor download interface for deployment

3
Configure the bridge — Whitelist the bridge URL (default: https://iast.invicti.com). The bridge URL and port are configurable per target. Java and Node.js require the bridge configuration.
4
Run your Invicti scan — Start a scan against the instrumented target. Invicti communicates with the Shark sensor during scanning, and results include both external DAST findings and internal IAST code-level details.

When to use Invicti Shark

If you already run Invicti for DAST and want more actionable results, Shark is worth a look. The IAST layer adds code locations and hidden asset discovery without changing your scanning workflow.

Best for
Teams already using Invicti DAST who want code-level vulnerability details, hidden asset discovery, and OWASP API Top 10 detection from within the runtime.

Deploy it on staging servers or in virtual machines as part of CI/CD pipelines. Not recommended for production since active sensors consume resources.

If you need standalone IAST without a paired DAST scanner, consider Contrast Assess or Seeker IAST. If you use Datadog for observability, Datadog IAST integrates directly with APM tracing.

Frequently Asked Questions

What is Invicti Shark?
Invicti Shark is an IAST sensor that works alongside the Invicti DAST scanner to provide deeper vulnerability detection, hidden asset discovery, and code-level remediation details for PHP, Java, .NET, and Node.js applications.
Is Invicti Shark free or commercial?
Invicti Shark is a commercial product available as part of the Invicti web application security scanner platform.
What does Invicti Shark detect?
It detects SQL injection, XSS, OWASP API Top 10 vulnerabilities including BOLA and IDOR, and discovers hidden assets like admin panels, undocumented API endpoints, and hidden form parameters.
How does IAST differ from DAST?
DAST only tests from outside the application, while IAST like Shark places a sensor inside the runtime to observe how requests are processed internally, finding vulnerabilities and assets that external scanning misses.
Does Invicti Shark require code changes?
No. Shark is deployed as a PHP extension, Java agent, or .NET package without modifying application source code. Each Shark Token is generated uniquely per target from the Invicti Target configuration panel.