Active AI Scanner
The Active AI Scanner performs dynamic, targeted tests against the application. Unlike the Passive Scanner, which only observes, the Active Scanner sends new HTTP requests to probe for vulnerabilities.
WARNING: DANGEROUS OPERATIONS
The Active Scanner sends traffic that can modify data, trigger actions, or disrupt services.
Do not use on production systems unless authorized.
Do not use "DANGEROUS" risk level without explicit permission.
Always ensure the target is within your Scope.
How It Works
The scanner receives a target request (from the passive scanner queue, context menu, or manual selection).
Injection points are automatically extracted from the request (URL params, body params, headers, cookies, JSON fields, XML elements, path segments).
For each injection point, the AI selects appropriate payloads based on the vulnerability class, risk level, and scan mode.
Payloads are sent and responses are analyzed using multiple detection methods.
Confirmed findings are reported as Burp issues with an
[AI Active]prefix.
Risk Levels
The scanner operates in three risk modes. You must select the appropriate level for your engagement.
SAFE
Read-only payloads. Unlikely to modify state.
sleep(5) (SQLi time-based), {{7*7}} (SSTI), probing for hidden headers.
MODERATE
May read sensitive data or bypass auth.
UNION SELECT queries, accessing /etc/passwd, auth bypass attempts.
DANGEROUS
Destructive. May delete data, drop tables, or create users.
DROP TABLE, rm -rf, INSERT INTO users.

Scan Modes
The scan mode determines which vulnerability classes are tested. Choose based on your engagement type.
BUG_BOUNTY
Curated subset of high-impact vulnerability classes. Minimizes noise and focuses on reportable findings.
Bug bounty programs, time-limited assessments.
PENTEST
More exhaustive testing. Includes information disclosure and lower-severity checks.
Professional penetration tests, compliance audits.
FULL
All 62 vulnerability classes are tested. Maximum coverage.
Comprehensive security assessments, internal applications.
Configuration
Max Concurrent Scans: Number of parallel scans (range: 1–10, default: 3). Keep low to avoid WAF blocking or DoS.
Max Payloads per Point: Maximum payload variations per injection point (range: 1–50, default: 10).
Timeout: Seconds to wait for each scan request (range: 5–120, default: 30).
Request Delay: Milliseconds between requests (range: 0–5000, default: 100). Increase to avoid rate limiting.
Max Risk Level: Maximum allowed risk level for payloads (
SAFE,MODERATE,DANGEROUS).Scope Only: CRITICAL. Ensure this is checked to prevent scanning out-of-scope assets (e.g., Google Analytics, CDNs).
Scan Mode: Select
BUG_BOUNTY,PENTEST, orFULL.Use Collaborator (OAST): Enable out-of-band checks. The scanner generates Burp Collaborator payloads and polls for DNS/HTTP interactions.
Vulnerability Classes
The Active Scanner tests for 62 vulnerability classes organized by category.
Injection (17 classes)
SQLI
SQL Injection (error-based, blind boolean, blind time-based)
XSS_REFLECTED
Reflected Cross-Site Scripting
XSS_STORED
Stored Cross-Site Scripting
XSS_DOM
DOM-based Cross-Site Scripting
CMDI
OS Command Injection
SSTI
Server-Side Template Injection
XXE
XML External Entity Injection
LDAP_INJECTION
LDAP Injection
XPATH_INJECTION
XPath Injection
NOSQL_INJECTION
NoSQL Injection (MongoDB, etc.)
GRAPHQL_INJECTION
GraphQL Injection
LOG_INJECTION
Log Injection / Log Forging
LFI
Local File Inclusion
RFI
Remote File Inclusion
PATH_TRAVERSAL
Path Traversal / Directory Traversal
HOST_HEADER_INJECTION
Host Header Injection
EMAIL_HEADER_INJECTION
Email Header Injection
Access Control (9 classes)
IDOR
Insecure Direct Object Reference
BOLA
Broken Object Level Authorization
BFLA
Broken Function Level Authorization
BAC_HORIZONTAL
Horizontal Broken Access Control
BAC_VERTICAL
Vertical Broken Access Control
MASS_ASSIGNMENT
Mass Assignment / Auto-binding
SSRF
Server-Side Request Forgery
CORS_MISCONFIGURATION
CORS Misconfiguration (passive-only)
DIRECTORY_LISTING
Directory Listing Enabled
Authentication Failures (7 classes)
JWT_WEAKNESS
JWT Algorithm Confusion, None Algorithm, Weak Signing
AUTH_BYPASS
Authentication Bypass
SESSION_FIXATION
Session Fixation
WEAK_SESSION_TOKEN
Weak or Predictable Session Tokens
ACCOUNT_TAKEOVER
Account Takeover vectors
OAUTH_MISCONFIGURATION
OAuth/OIDC Misconfiguration
MFA_BYPASS
Multi-Factor Authentication Bypass
Security Misconfiguration (5 classes)
DEBUG_ENDPOINT
Exposed Debug Endpoints
STACK_TRACE_EXPOSURE
Stack Trace / Error Disclosure
VERSION_DISCLOSURE
Server/Framework Version Disclosure (passive-only)
MISSING_SECURITY_HEADERS
Missing Security Headers (passive-only)
VERBOSE_ERROR
Verbose Error Messages
Integrity Failures (4 classes)
DESERIALIZATION
Insecure Deserialization (passive-only)
REQUEST_SMUGGLING
HTTP Request Smuggling (passive-only)
CSRF
Cross-Site Request Forgery (passive-only)
UNRESTRICTED_FILE_UPLOAD
Unrestricted File Upload (passive-only)
Insecure Design (4 classes)
BUSINESS_LOGIC
Business Logic Flaws
RATE_LIMIT_BYPASS
Rate Limiting Bypass
PRICE_MANIPULATION
Price / Quantity Manipulation
RACE_CONDITION_TOCTOU
Race Condition (TOCTOU)
Cryptographic Failures (3 classes)
INSECURE_COOKIE
Insecure Cookie Flags (passive-only)
SENSITIVE_DATA_URL
Sensitive Data in URL
WEAK_CRYPTO
Weak Cryptographic Algorithms
Cache Attacks (2 classes)
CACHE_POISONING
Web Cache Poisoning
CACHE_DECEPTION
Web Cache Deception
Information Disclosure (4 classes)
SOURCEMAP_DISCLOSURE
Source Map File Exposure (passive-only)
GIT_EXPOSURE
Git Repository Exposure (passive-only)
BACKUP_DISCLOSURE
Backup File Disclosure (passive-only)
DEBUG_EXPOSURE
Debug Information Exposure (passive-only)
Cloud / Infrastructure (2 classes)
S3_MISCONFIGURATION
S3 Bucket Misconfiguration (passive-only)
SUBDOMAIN_TAKEOVER
Subdomain Takeover (passive-only)
API Security (1 class)
API_VERSION_BYPASS
Deprecated/legacy API version access
Other (4 classes)
OPEN_REDIRECT
Open Redirect
HEADER_INJECTION
Header Injection
CRLF_INJECTION
CRLF Injection
RACE_CONDITION
Race Condition
Note: Classes marked (passive-only) are detected through response analysis and cannot be actively tested with payloads.
Injection Points
The scanner automatically identifies the following injection point types in each request:
URL_PARAM
Query string parameters
?id=123
BODY_PARAM
Form body parameters
username=admin
HEADER
HTTP headers (from allowlist)
Host, Referer, X-Forwarded-Host
PATH_SEGMENT
Numeric/UUID/ObjectId path segments
/api/users/42
COOKIE
Cookie values
session=abc123
JSON_FIELD
JSON request body fields
{"user_id": 1}
XML_ELEMENT
XML request body elements
<id>1</id>
Detection Methods
ERROR_BASED
Look for database/framework error messages in responses.
BLIND_BOOLEAN
Compare response differences when injecting true/false conditions.
BLIND_TIME
Measure response time delays (e.g., sleep(5) causing 5s delay).
REFLECTION
Check if the payload is reflected in the response body.
OUT_OF_BAND
DNS/HTTP callback detection via Burp Collaborator.
CONTENT_BASED
Check for specific content patterns indicating successful exploitation.
Deduplication
The scanner prevents duplicate scanning of the same target. If a URL has been scanned within the last 1 hour, it is skipped automatically. This applies to both manual and auto-queued scans.
Auto-Queue from Passive
When Auto-Queue to Active is enabled in the passive scanner settings, high-confidence passive findings are automatically forwarded to the active scanner queue. This creates a pipeline:
Passive scanner identifies a potential vulnerability.
Finding is automatically queued for active verification.
Active scanner sends targeted payloads to confirm the finding.
Confirmed findings are promoted to Burp issues.
Burp Pro Integration
On Burp Suite Professional, the Active AI Scanner integrates with the native scan engine via ScanCheck. This means AI-generated scan checks run alongside Burp's built-in scanner. On Burp Community Edition, the scanner operates independently using manual queue management.
Best Practices
Start Passive: Let the Passive Scanner find interesting endpoints first.
Verify First: Use
SAFEmode to confirm potential injection points without risk.Escalate Carefully: Move to
MODERATEonly for confirmed injection points on authorized targets.Human in the Loop: Use the
[AI Active]findings as leads. Always verify them manually using Repeater before reporting.Monitor Rate Limits: If the target has WAF or rate limiting, increase the Request Delay and reduce Max Concurrent Scans.
Use Scope: Always enable Scope Only to prevent accidental scanning of third-party assets.
Last updated
