Snyk DAST
Snyk DAST
Overview
The Snyk DAST integration connects the Praetorian Guard Platform (PGP) with Snyk API & Web (powered by Probely), importing DAST (Dynamic Application Security Testing) findings to track web application and API security vulnerabilities. PGP queries the Probely API to discover verified domains, web and API targets, and their associated vulnerability findings, mapping them as risks and assets in your attack surface inventory.
This integration is read-only — PGP never modifies targets, findings, or configurations in Snyk API & Web.
What the Integration Does
Domain discovery — PGP fetches verified domains from the
/domains/endpoint and imports them as domain-level assets.Asset discovery — Discovered web applications and APIs from the
/discovery/assets/endpoint are imported as assets, providing visibility into your web attack surface.Target enumeration — PGP retrieves all scanning targets from
/targets/and imports their hostnames as assets. Web targets are additionally imported as web application assets.Finding import — For each target, PGP fetches vulnerability findings from
/targets/{id}/findings/and maps them to PGP risks with severity, CWE classifications, CVSS scores, and request/response evidence.
Severity Mapping
Filtering
The following findings are automatically excluded from import:
Findings with state fixed
Findings with state accepted (risk accepted)
Findings marked as false positive
Prerequisites
A Snyk API & Web account (powered by Probely)
A JWT API token with sufficient permissions
Access to your PGP account
Required Permissions
The Snyk API & Web platform uses a role-based permission model. The API token must belong to an account with permissions to read targets, findings, domains, and discovered assets.
The following roles and permissions are required for the integration to work correctly:
For detailed information about Snyk API & Web roles and how permissions map to API endpoints, refer to the Snyk API & Web Permissions Documentation.
Creating an API Token
Log in to your Snyk API & Web (Probely) account
Navigate to your profile settings
Generate a new API token
Copy the token — store it securely as it will be needed for the PGP configuration
Setup
In PGP, navigate to Integrations and locate Snyk DAST under the Application Security Testing category.
Click Integrate.
Enter the following fields and click Connect.
PGP validates credentials by calling GET /profile/ to confirm the token is valid and has access to the account.
What Data Is Synced
Domains to PGP Assets
Verified domains are imported as domain-level assets
Unverified domains are skipped
Discovered Assets to PGP Assets
Web applications are imported as web application assets with their full URL
API targets are imported as domain-level assets
Assets with state
ARCHIVEDorHIDDENare excluded
Targets and Findings to PGP Assets and Risks
Each target's hostname is imported as a domain asset; web targets are additionally imported as web application assets
Vulnerability findings are imported as risks with:
CWE classifications and references
CVSS scores and vectors
Affected URL, method, parameter, and insertion point
Request/response evidence for proof of exploitation
First-found and last-found timestamps
Probely API Endpoints Used
Base URL: https://api.probely.com
All requests are authenticated using an Authorization: JWT {token} header over HTTPS. The integration includes automatic retry with exponential backoff for rate limiting (HTTP 429) and transient server errors (5xx).
Troubleshooting
Security and Data Handling
Read-only access — PGP never creates, modifies, or deletes targets, findings, domains, or configurations in Snyk API & Web
Credential handling — Your API token is stored as an encrypted credential within PGP and is never exposed in logs or the UI after initial entry
Authentication — JWT-based authentication over HTTPS for every request
Retry safety — Only GET requests are made; retries on transient failures are safe and idempotent
Rate limiting — Built-in exponential backoff with jitter prevents API overload
Integration category: Application Security Testing. Data direction: Read-only (Snyk API & Web to PGP). Authentication: JWT token.
Need help? Contact our support team for assistance.