Vercel WAF
Overview
The Vercel WAF integration connects the Praetorian Guard Platform (PGP) with your Vercel projects, providing three security capabilities: scanner IP whitelisting through firewall bypass rules, automated discovery of projects, domains, DNS records, and deployment URLs, and auditing of firewall configurations for common misconfigurations.
This integration is valuable for organizations deploying frontend applications on Vercel who need comprehensive attack surface visibility.
What the Integration Does
Scanner IP Whitelisting -- PGP creates firewall bypass rules so Chariot scanners are not blocked by the Vercel WAF. Rules are idempotent.
Asset Discovery -- Enumerates projects, domains, DNS records (A, AAAA, CNAME, ALIAS), and deployment URLs.
Firewall Auditing -- Checks four protection layers: custom WAF rules, IP-based controls (deny/challenge), Core Rule Set (CRS) categories, and managed rulesets (OWASP, bot protection). Flags projects with no active protection.
Discovered Asset Types
Detected Risks
Prerequisites
Vercel account (Pro/Enterprise for WAF)
Vercel API token with read access
Team ID (optional for personal accounts)
Creating an API Token
Log in to Vercel dashboard
Navigate to Settings > Tokens
Click Create Token with Full Account scope
Copy the token (shown only once)
Finding Your Team ID
Found at Settings > General or in the dashboard URL. Starts with team_.
Setup
In PGP, navigate to Integrations > Firewall > Vercel WAF
Click Integrate
Enter fields and click Connect
PGP validates via GET /v10/projects?limit=1.
What Data Is Synced
Per-Project: Domains, DNS records (A, AAAA, CNAME, ALIAS), deployment URLs. Bypass Rules: IP bypass for 66.45.78.0/24 tagged "(Managed by PGP)". Audit: Firewall config inspected across four protection layers for misconfigurations.
Vercel API Endpoints Used
Troubleshooting
Security and Data Handling
Bearer token auth over HTTPS, never logged
Token encrypted at rest and in transit
Only write: bypass rules. All else read-only
No code, env vars, or logs accessed
Query params redacted from logs
Coming Soon
Custom Rule Analysis
Edge Function Discovery
Environment Variable Auditing
Deployment Protection Analysis
Integration category: Firewall. Data direction: Primarily read-only. Authentication: Bearer token.