Intruder Overview
The cloud-based platform allows you to run custom security checks to identify vulnerabilities and misconfigurations – it uses the OWASP Top 10 API security list as a reference for this. Scans can be automated to run regularly and consistently, and the intelligence that’s gathered is prioritized to highlight the most urgent findings, as well as detailing relevant remediation advice.