curl --request POST \
--url http://localhost:3333/v1/security-penetration-tests \
--header 'Content-Type: application/json' \
--header 'X-API-Key: <api-key>' \
--data '
{
"targetUrl": "https://app.example.com",
"repoUrl": "https://github.com/org/repo",
"githubToken": "<string>",
"configYaml": "<string>",
"pipelineTesting": false,
"workspace": "<string>",
"mockCheckout": true,
"webhookUrl": "<string>",
"testMode": false
}
'Creates a new penetration test run and returns the run metadata.
curl --request POST \
--url http://localhost:3333/v1/security-penetration-tests \
--header 'Content-Type: application/json' \
--header 'X-API-Key: <api-key>' \
--data '
{
"targetUrl": "https://app.example.com",
"repoUrl": "https://github.com/org/repo",
"githubToken": "<string>",
"configYaml": "<string>",
"pipelineTesting": false,
"workspace": "<string>",
"mockCheckout": true,
"webhookUrl": "<string>",
"testMode": false
}
'API key for authentication
Organization ID (required for session auth, optional for API key auth)
Target URL for the penetration test scan
"https://app.example.com"
Repository URL containing the target application code
"https://github.com/org/repo"
GitHub token used for cloning private repositories
Optional YAML configuration for the pentest run
Whether to enable pipeline testing mode
Workspace identifier used by the pentest engine
Set false to reject non-mocked checkout flows for strict behavior
Optional webhook URL to notify when report generation completes
Whether to run the pentest in simulation mode
Penetration test created
Was this page helpful?