Invicti
Overview
The Invicti integration connects the Praetorian Guard Platform (PGP) with Invicti (formerly Netsparker) to import web application scan results, discovered vulnerabilities, and target assets from your Invicti environment. By syncing vulnerability findings from Invicti, PGP consolidates your DAST results alongside other security data sources for unified risk management.
Organizations using Invicti for dynamic application security testing generate detailed vulnerability reports across their web application portfolio. This integration automatically imports scan results, extracts target URLs and hostnames as assets, and maps discovered vulnerabilities to risks within PGP. Each vulnerability includes severity, CVSS score, CWE classification, OWASP category, and remediation guidance, providing your security team with actionable context for prioritization.
This integration uses the Invicti REST API in a read-only capacity. PGP does not initiate scans, modify scan configurations, or alter any vulnerability states in your Invicti account.
What the Integration Does
The Invicti integration queries the Invicti REST API to retrieve scan results and their associated vulnerabilities. For each scan, it fetches the detailed results and processes vulnerabilities that are in a "new" or "confirmed" state. Target URLs from scans are resolved to hostnames, which are imported as assets into PGP. Each vulnerability is mapped to a risk associated with the corresponding asset.
The integration extracts vulnerability details including name, severity, description, impact, remedial actions, external references, CVSS score, CWE identifier, and OWASP classification. Severity levels from Invicti (Critical, High, Medium, Low) are mapped directly to PGP severity levels. Vulnerabilities with states other than "new" or "confirmed" (such as "fixed" or "ignored") are excluded from import.
All operations are strictly read-only. PGP does not create scans, modify vulnerability states, or alter any configurations in your Invicti account.
Prerequisites
Before setting up the Invicti integration, ensure you have:
An Invicti account (Standard, Enterprise, or On-Premises) with completed scans
A User ID and API Token from your Invicti account
API Base URL: The URL of your Invicti instance API endpoint (e.g.,
https://your-instance.invicti.com/api/1.0)Account permissions: The API credentials must have at least read access to scans and scan results
Creating API Credentials
Sign in to your Invicti instance.
Navigate to Settings > API (or your user profile's API settings).
Locate or generate your User ID and API Token.
Copy both values and store them securely.
Note your API Base URL, which follows the format
https://your-instance.invicti.com/api/1.0for cloud-hosted instances, or your custom domain for on-premises deployments.
Setup
In PGP, navigate to the Integrations page.
Select Invicti from the list of available integrations.
Enter your Invicti credentials and API Base URL in the configuration form.
Save the integration. PGP will validate connectivity to the Invicti API automatically.
Field Reference
What Data Is Synced
Web Application Assets
The integration discovers target web applications from your Invicti scans and imports the hostnames as assets in PGP.
Vulnerabilities (Risks)
Vulnerabilities from completed scans are imported as risks in PGP. Only vulnerabilities with a state of "new" or "confirmed" are imported.
Severity Mapping
API Endpoints Used
Authentication is performed using HTTP Basic authentication with the User ID and API Token encoded as a Base64 credential pair.
Required API Permissions
Troubleshooting
Security and Data Handling
The Invicti integration operates in a strictly read-only mode. It queries the Invicti REST API to read scan results and vulnerability data, and does not initiate scans, modify vulnerability states, or change any configurations in your Invicti account.
Credentials are handled securely within PGP. The Invicti User ID and API Token are encrypted at rest and used exclusively for API authentication via HTTP Basic auth during sync operations. The credentials are not persisted outside of PGP's encrypted credential store.
PGP does not access or store raw HTTP request/response data from Invicti scans. Only vulnerability metadata (names, severities, descriptions, and classifications) and target URL information are read and processed.