Black Duck Web Scanner

Black Duck Web Scanner

Category: DAST
License: Commercial

Black Duck Web Scanner (formerly Synopsys Web Scanner) is an enterprise-grade dynamic application security testing (DAST) solution that identifies vulnerabilities in running web applications.

Part of the Polaris Software Integrity Platform, the scanner uses advanced techniques to discover security weaknesses that could be exploited by attackers.

What is Black Duck Web Scanner?

Black Duck Web Scanner performs automated security testing of web applications by simulating attacks against live or staging environments.

The tool crawls applications using a headless browser engine capable of executing JavaScript and handling modern single-page applications (SPAs), then executes attack payloads to identify vulnerabilities.

The scanner operates as part of the broader Polaris platform, which provides unified application security testing across SAST, SCA, and DAST capabilities.

This integration enables organizations to correlate findings across testing methodologies and maintain comprehensive security visibility throughout the software development lifecycle.

Key Features

Proof-Based Vulnerability Detection

Unlike traditional DAST tools that rely solely on signature matching, Black Duck Web Scanner provides proof of exploitability for discovered vulnerabilities.

When the scanner identifies a potential issue, it attempts to confirm the vulnerability is genuine and demonstrates how it could be exploited.

This approach significantly reduces false positives and helps teams prioritize remediation efforts.

Modern Application Support

The scanner’s headless browser engine handles modern web technologies effectively:

  • JavaScript Execution: Full JavaScript rendering for SPAs and dynamic content
  • AJAX Analysis: Intercepts and tests asynchronous API calls
  • Authentication Handling: Supports form-based login, OAuth, SSO, and custom authentication
  • Session Management: Maintains authentication state throughout scans

Comprehensive Vulnerability Coverage

Black Duck Web Scanner tests for a wide range of security weaknesses:

  • OWASP Top 10 web application risks
  • SQL injection (error-based, blind, time-based)
  • Cross-site scripting (reflected, stored, DOM-based)
  • XML external entity (XXE) injection
  • Server-side request forgery (SSRF)
  • Insecure deserialization
  • Security misconfiguration
  • Sensitive data exposure

API Security Testing

The scanner includes dedicated capabilities for API security:

  • REST API endpoint discovery and testing
  • GraphQL query analysis
  • OpenAPI/Swagger specification import
  • API authentication testing
  • Rate limiting and access control verification

Polaris Platform Integration

Black Duck Web Scanner integrates with the Polaris Software Integrity Platform, providing:

Unified Dashboard

All security findings from SAST, SCA, and DAST appear in a single dashboard.

Security teams can track vulnerabilities across the entire application portfolio and development lifecycle.

Correlated Findings

The platform correlates findings across testing methodologies.

When SAST identifies a potential vulnerability pattern and DAST confirms it’s exploitable, teams gain higher confidence in prioritization.

Policy Enforcement

Organizations can define security policies that span testing types.

For example, requiring no high-severity DAST findings before production deployment while allowing medium-severity issues with mitigation plans.

Installation and Configuration

Black Duck Web Scanner is deployed as part of the Polaris platform or as a standalone scanner.

Polaris Cloud

For cloud deployments, access the scanner through the Polaris web interface:

  1. Log in to your Polaris organization
  2. Navigate to Projects and select your application
  3. Configure DAST scanning settings
  4. Provide target URL and authentication details
  5. Run scans on-demand or schedule recurring assessments

On-Premises Deployment

For on-premises installations:

# Download and extract the scanner package
tar -xzf blackduck-webscanner-<version>.tar.gz

# Configure the scanner
./configure --polaris-url=https://polaris.yourcompany.com \
            --polaris-token=$POLARIS_TOKEN

# Start the scanning service
./start-scanner.sh

CLI Usage

The scanner provides command-line capabilities for automation:

# Run a basic scan
polaris-scan dast \
  --project-name "my-application" \
  --target-url "https://staging.example.com" \
  --auth-type form \
  --login-url "https://staging.example.com/login" \
  --username "testuser" \
  --password "testpass"

# Scan with API specification
polaris-scan dast \
  --project-name "my-api" \
  --target-url "https://api.example.com" \
  --openapi-spec "./openapi.yaml"

# Generate report
polaris-scan report \
  --project-name "my-application" \
  --format pdf \
  --output ./dast-report.pdf

CI/CD Integration

GitHub Actions

name: Black Duck DAST Scan
on:
  push:
    branches: [main]
  workflow_dispatch:

jobs:
  dast-scan:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4

      - name: Deploy to Staging
        run: |
          # Your deployment steps here
          echo "Deploying to staging environment..."

      - name: Run Black Duck Web Scanner
        uses: blackducksoftware/polaris-action@v1
        with:
          polaris-url: ${{ secrets.POLARIS_URL }}
          polaris-token: ${{ secrets.POLARIS_TOKEN }}
          scan-type: dast
          target-url: ${{ vars.STAGING_URL }}

      - name: Check for Critical Findings
        run: |
          polaris-cli findings \
            --project-name ${{ github.repository }} \
            --severity critical,high \
            --fail-on-findings

GitLab CI

blackduck-dast:
  stage: security
  image: blackducksoftware/polaris-cli:latest
  variables:
    POLARIS_URL: $POLARIS_URL
    POLARIS_TOKEN: $POLARIS_TOKEN
  script:
    - polaris-scan dast
        --project-name $CI_PROJECT_NAME
        --target-url $STAGING_URL
        --wait-for-completion
    - polaris-cli findings
        --project-name $CI_PROJECT_NAME
        --format json > gl-dast-report.json
  artifacts:
    reports:
      dast: gl-dast-report.json
  rules:
    - if: $CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH

Azure DevOps

trigger:
  - main

pool:
  vmImage: 'ubuntu-latest'

variables:
  - group: polaris-credentials

steps:
  - task: DownloadPolarisScanner@1
    inputs:
      polarisUrl: $(POLARIS_URL)
      polarisToken: $(POLARIS_TOKEN)

  - script: |
      polaris-scan dast \
        --project-name $(Build.Repository.Name) \
        --target-url $(STAGING_URL) \
        --wait-for-completion
    displayName: 'Run DAST Scan'

  - task: PublishSecurityAnalysisLogs@3
    inputs:
      ArtifactName: 'DASTResults'

When to Use Black Duck Web Scanner

Black Duck Web Scanner is well-suited for:

  • Enterprise environments: Organizations with large application portfolios benefit from centralized management and consistent policies
  • Unified security programs: Teams already using Polaris for SAST or SCA get seamless DAST integration
  • Compliance requirements: The scanner supports compliance mapping and audit-ready reporting
  • Modern web applications: Strong support for JavaScript-heavy SPAs and API-based architectures

Consider alternatives if you need:

  • Open-source solution: OWASP ZAP provides capable free DAST
  • Quick deployment: Cloud-native competitors may offer faster time-to-value
  • Standalone DAST: Single-purpose tools may be simpler for focused use cases

History

The web scanner was originally developed by Synopsys as part of their Software Integrity Group.

In 2024, Synopsys divested the Software Integrity Group to private equity firms Clearlake Capital and Francisco Partners, with the products rebranded under Black Duck Software.

The scanner continues to receive updates and support under the new ownership.

Note: Formerly Synopsys Web Scanner. Synopsys sold Software Integrity Group to Clearlake Capital and Francisco Partners in 2024, now operating as Black Duck Software.