Public | Automated Build

Last pushed: a year ago
Short Description
Helps you sort through the results of an OWASP ZAP scan.
Full Description


A cli that helps you sort through the results of an OWASP ZAP scan.

zap-analyzer helps you triage issues to help you focus your time chasing errors by identifying likely false positives. Ideally, the reports generated by zap-analyzer could be tuned to a specific framework or stack (e.g. Jekyll, Rails, and Django).



  • Ruby or Docker

Docker installation

Pull from the Docker Hub

$ docker pull adelevie/zap-analyzer

Build the Docker image locally

Clone this repo and cd into it. Then build the image:

$ docker build -t zap-analyzer .

Ruby installation

Clone this repo and cd into it. Then install the dependencies:

$ bundle install


The data source for zap-analyzer are JSON files of OWASP ZAP output scans.

18F stores these files publicly on An example of one of these files can be found here.

Pipe this JSON into the zap-cli:

Docker usage

Pulling from the Docker Hub

$ curl '' | docker run -i adelevie/zap-analyzer

After building locally

$ curl '' | docker run -i zap-analyzer

If you want to write the report to a file:

$ curl '' | docker run -i zap-analyzer >

Ruby usage

From the root of the zap-analyzer project folder:

$ curl '' | bin/cli



To run tests:

$ ./script/test


To run tests:

$ bundle exec rspec

Public domain

This project is in the worldwide public domain. As stated in CONTRIBUTING:

This project is in the public domain within the United States, and copyright and related rights in the work worldwide are waived through the CC0 1.0 Universal public domain dedication.

All contributions to this project will be released under the CC0 dedication. By submitting a pull request, you are agreeing to comply with this waiver of copyright interest.

Docker Pull Command
Source Repository