Passive AI Scanner
The passive scanner analyzes proxy traffic in the background and can create issues automatically. It observes HTTP responses as they pass through the Burp proxy without sending any additional requests.
How It Works
As you browse the target application, all proxy traffic passes through the passive scanner.
Responses are filtered by MIME type, scope, and size limits.
Qualifying responses are queued for AI analysis.
The AI analyzes the request/response pair for security issues using pattern matching and contextual reasoning.
Findings with confidence >= 85% are automatically promoted to Burp issues with an
[AI Passive]prefix.
Configuration
Enabled
Off
Toggle in the top bar or settings panel.
Rate Limit
5 seconds
Minimum time between analysis requests (range: 1–60s). Prevents overwhelming the AI backend.
Scope Only
On
Only analyze requests to targets in Burp's scope.
Max Size (KB)
96 KB
Maximum response size for analysis (range: 16–1024 KB).
Min Severity
LOW
Ignore findings below this severity level (LOW, MEDIUM, HIGH, CRITICAL).
Trade-off: Higher Max Size values (e.g., 500 KB) allow analysis of large JSON responses but significantly increase token costs for cloud backends or slow down local inference. The default of 96 KB covers most API endpoints.

MIME Type Filtering
The scanner only processes responses with the following content types:
text/htmlapplication/jsonapplication/javascript/text/javascriptapplication/xml/text/xmltext/plainunknown(unrecognized content types)
Binary content (images, fonts, video, etc.) is automatically skipped.
Detection Rules
The passive scanner uses pattern-based detection for common security issues before sending context to the AI:
CSRF Token Detection
Identifies missing or weak CSRF tokens by searching for patterns: csrf, xsrf, anti_csrf, csrfmiddlewaretoken, __requestverificationtoken, token
Dangerous File Upload Extensions
Flags upload endpoints accepting dangerous extensions: php, phtml, php5, asp, aspx, jsp, jspx, cgi, pl, py, rb, jar, war, ear, exe, dll
Authentication Header Detection
Identifies endpoints using authentication headers: Authorization, X-API-Key, X-Auth-Token, X-Access-Token
Session Cookie Detection
Identifies session-related cookies by pattern matching: session, auth, token, sid, jwt, remember
Header Injection Points
The scanner checks for injectable headers from a curated allowlist: Host, Origin, Referer, X-Forwarded-Host, X-Forwarded-For, X-Host, X-Original-Host
Output
Findings View
All passive analysis results are available via Settings → Passive AI Scanner → View findings. Each finding includes:
Timestamp: When the analysis occurred.
URL: The analyzed endpoint.
Title: Short description of the finding.
Severity:
INFORMATION,LOW,MEDIUM,HIGH, orCRITICAL.Detail: Full AI analysis with evidence.
Confidence: Percentage score (0–100%).
Issue Creation
Findings are automatically promoted to Burp issues when:
Confidence score >= 85%
Severity meets or exceeds the configured minimum.
Issues are prefixed with
[AI Passive]for easy identification in the Issues panel.
Status Tracking
The scanner tracks operational metrics:
Requests Analyzed: Total number of request/response pairs processed.
Issues Found: Total findings created.
Last Analysis Time: Timestamp of the most recent analysis.
Queue Size: Number of requests waiting for analysis.
Passive-to-Active Pipeline
When Auto-Queue from Passive is enabled in the Active AI Scanner settings, the passive scanner feeds confirmed findings into the active scanner:
Passive scanner identifies a potential injection point or vulnerability pattern.
The finding is automatically queued for active testing.
The Active AI Scanner sends targeted payloads to verify the finding.
Confirmed vulnerabilities are reported as separate Burp issues.
This two-stage pipeline maximizes coverage while minimizing unnecessary active traffic.
Last updated
