Skip to content

Commit 15fbd6b

Browse files
zapbotkingthorin
authored andcommitted
blog: Add monthly updates post
Signed-off-by: zapbot <12745184+zapbot@users.noreply.github.com> Signed-off-by: kingthorin <kingthorin@users.noreply.github.com>
1 parent 93849d0 commit 15fbd6b

File tree

4 files changed

+236
-2
lines changed

4 files changed

+236
-2
lines changed
27.3 KB
Loading
54.5 KB
Loading
Lines changed: 234 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,234 @@
1+
---
2+
title: "ZAP Updates - October 2025"
3+
summary: >
4+
Systemic alerts, check for updates bug, auth improvements, project pulse, etc See what the ZAP team has been up to.
5+
images:
6+
- https://www.zaproxy.org/blog/2025-11-06-zap-updates-october-2025/images/zapbot-monthly-updates.png
7+
type: post
8+
tags:
9+
- blog
10+
- update
11+
date: "2025-11-06"
12+
authors:
13+
- thorin
14+
---
15+
16+
## Highlights
17+
18+
There's always something going on, here are some of the bigger or notable improvements and additions from the last month:
19+
20+
### Arbitrary Automation Framework Configuration Values
21+
22+
For a long time it has been possible to set various ZAP [config options via the command line](/faq/how-do-you-find-out-what-key-to-use-to-set-a-config-value-on-the-command-line/).
23+
This means that all of the configs are in one file. If telemetry is on then the ZAP team can figure out which options people are using and maybe add full support.
24+
It is now possible to set these directly inside your Automation Framework plan, either via the GUI, or manually editing the yaml. For example, if there was a need to set the number of passive scan threads:
25+
26+
```yaml
27+
configs:
28+
pscans.threads: 8
29+
```
30+
31+
### Systemic Alerts
32+
33+
Building further from the previously announced [Alert De-duplication](/blog/2025-09-30-alert-de-duplication/) changes. A set of changes have been implemented across the core, scan rules, and reports components. This means fewer duplicate Alerts, less noise, and more actionable results.
34+
While not currently configured by default (in weeklies) the intent is that for Alerts which are tagged `SYSTEMIC` (such as passive scan results related to missing or incorrect headers) after a user configurable threshold (count) the Alerts Tree (in the GUI) will change the count to simply read "Systemic" and reports will include only limited examples.
35+
36+
### Check for Updates Bug
37+
38+
Back in July we implemented a passive scan rule to raise Alerts when people are running [out of date versions of ZAP](/blog/2025-07-25-the-new-zap-is-out-of-date-rule/).
39+
In October a user pointed out that the rule was not adhering to ZAP's `-silent` [command line switch](/docs/desktop/cmdline/#options).
40+
The issue has been addressed and we published a [blog post about it](/blog/2025-10-21-zap-was-not-so-silent/).
41+
42+
## Ongoing Work
43+
44+
- Authentication Improvements &gt;
45+
- Handle auth forms that do not respond to keyboard return input and that use non-standard password fields.
46+
- The script credential parameter names were normalized and they are now always read as lower case for all types of credentials. This means that the credentials can be used the same way for all types of authentication methods. The old title case credentials are still supported but deprecated with a warning.
47+
- Script errors during authentication are no longer reported as warnings in the Automation Framework for consistent behavior with all authentication methods, which handle authentication failures as errors. Users can leverage [statistics checks](/docs/desktop/addons/automation-framework/test-stats/) to ensure that the authentication is being performed as expected.
48+
- An issue was fixed that prevented the import of contexts that used an authentication script without additional parameters.
49+
- Scan Rules &gt; Address false positives in various rules.
50+
- Documentation Improvements &gt;
51+
- Efforts continue to ensure all scan rules have example alerts for documentation generation purposes.
52+
- We continue to document and update details with regard to using ZAP against various [test apps](/docs/testapps/).
53+
54+
## New Contributors
55+
A very warm welcome to the people who started to contribute to ZAP this month!
56+
57+
- [Brandosp](https://github.com/Brandosp)
58+
- [W0lfbane](https://github.com/W0lfbane)
59+
- [Umoxfo](https://github.com/Umoxfo)
60+
- [cepix1234](https://github.com/cepix1234)
61+
- [snuyanzin](https://github.com/snuyanzin)
62+
63+
## GitHub Pulse
64+
Here are some statistics for the two main ZAP repositories:
65+
66+
[zaproxy](https://github.com/zaproxy/zaproxy/pulse/monthly)
67+
Excluding merges, 5 authors have pushed 21 commits to main and 21 commits to all branches. On main, 54 files have changed and there have been 2,164 additions and 366 deletions.
68+
69+
[zap-extensions](https://github.com/zaproxy/zap-extensions/pulse/monthly)
70+
Excluding merges, 8 authors have pushed 92 commits to main and 92 commits to all branches. On main, 1,335 files have changed and there have been 15,961 additions and 12,178 deletions.
71+
72+
A total of [98 human PRs were merged](https://github.com/search?q=org%3Azaproxy+type%3Apr+-author%3Azapbot+-author%3Aapp%2Fdependabot+sort%3Aupdated-asc+closed%3A2025-10+is%3Amerged&type=pullrequests) on the ZAP repos.
73+
74+
## Released Add-ons - Full Changelog
75+
In October 2025, we released updated versions of 12 add-ons:
76+
77+
##### Active scanner rules (alpha)
78+
**v52**
79+
Added
80+
- Suspicious Input Transformation Script Scan Rule.
81+
82+
Removed
83+
- The two example active scan rules were removed from this add-on and are now part of: https://github.com/zaproxy/addon-java
84+
85+
##### Automation Framework
86+
**v0.54.0**
87+
Added
88+
- Setting arbitrary config values
89+
90+
Changed
91+
- Reinstate the validation of the Scan Policy in the `activeScan` job.
92+
- Adjust the text for the plan load warning/error dialog text to be clear which output panel it's referring to.
93+
- Maintenance changes.
94+
- Depend on newer version of Common Library add-on.
95+
96+
##### Call Home
97+
**v0.16.0**
98+
Added
99+
- Add statistics for the number of fatal/warn/error logged.
100+
101+
##### Common Library
102+
**v1.38.0**
103+
Added
104+
- SYSTEMIC tag.
105+
106+
Changed
107+
- Update dependencies.
108+
109+
**v1.37.0**
110+
Added
111+
- Support for alert reference overrides in script scan rule metadata.
112+
113+
##### GraalVM JavaScript
114+
**v0.10.0**
115+
Changed
116+
- Update Graal JavaScript engine to version 25 (Issues 8477 and 9010).
117+
- Use example links in Active/Passive Rule templates' references.
118+
- Update scan rule templates to use alertRefOverrides.
119+
120+
##### Linux WebDrivers
121+
**v164**
122+
Changed
123+
- Update ChromeDriver to 142.0.7444.59.
124+
125+
**v163**
126+
Changed
127+
- Update ChromeDriver to 141.0.7390.122.
128+
129+
**v162**
130+
Changed
131+
- Update ChromeDriver to 141.0.7390.78.
132+
133+
**v161**
134+
Changed
135+
- Update ChromeDriver to 141.0.7390.76.
136+
137+
**v160**
138+
Changed
139+
- Update ChromeDriver to 141.0.7390.65.
140+
141+
**v159**
142+
Changed
143+
- Update ChromeDriver to 141.0.7390.54.
144+
145+
##### MacOS WebDrivers
146+
**v164**
147+
Changed
148+
- Update ChromeDriver to 142.0.7444.59.
149+
150+
**v163**
151+
Changed
152+
- Update ChromeDriver to 141.0.7390.122.
153+
154+
**v162**
155+
Changed
156+
- Update ChromeDriver to 141.0.7390.78.
157+
158+
**v161**
159+
Changed
160+
- Update ChromeDriver to 141.0.7390.76.
161+
162+
**v160**
163+
Changed
164+
- Update ChromeDriver to 141.0.7390.65.
165+
166+
**v159**
167+
Changed
168+
- Update ChromeDriver to 141.0.7390.54.
169+
170+
##### Passive scanner rules
171+
**v68**
172+
Added
173+
- SYSTEMIC tag to selected rules.
174+
175+
Changed
176+
- Update dependency.
177+
- The PII Disclosure scan rule now only evaluates visible text and script blocks in HTML responses at Medium or High alert threshold, while the entire response body is considered at Low alert threshold. To further prevent false positives at Medium or High alert threshold candidate strings with underscore are excluded.
178+
- Depends on an updated version of the Common Library add-on.
179+
180+
Fixed
181+
- ZAP is Out of Date rule to not trigger a CFU request in silent mode (Issue 9096).
182+
183+
##### Script Console
184+
**v45.14.0**
185+
Added
186+
- Support for alert reference overrides in script scan rule metadata.
187+
188+
Changed
189+
- Do not report authentication script errors as warnings in the Automation Framework for consistent behavior with all authentication methods, which handle errors as authentication failures.
190+
191+
##### Selenium
192+
**v15.41.0**
193+
Changed
194+
- Update Selenium to version 4.37.0.
195+
- Use configured Firefox binary when creating profiles.
196+
197+
##### Windows WebDrivers
198+
**v165**
199+
Changed
200+
- Update ChromeDriver to 142.0.7444.59.
201+
202+
**v164**
203+
Changed
204+
- Update ChromeDriver to 141.0.7390.122.
205+
206+
**v163**
207+
Changed
208+
- Update ChromeDriver to 141.0.7390.78.
209+
210+
**v162**
211+
Changed
212+
- Update ChromeDriver to 141.0.7390.76.
213+
214+
**v161**
215+
Changed
216+
- Update ChromeDriver to 141.0.7390.65.
217+
218+
**v160**
219+
Changed
220+
- Update ChromeDriver to 141.0.7390.54.
221+
222+
##### Zest - Graphical Security Scripting Language
223+
**v48.10.0**
224+
Added
225+
- Support for Edge in scripts run from the script console.
226+
227+
Changed
228+
- Deprecate the `Username` and `Password` credential parameters in favor of the lowercase `username` and
229+
`password` variants, aligning them with the naming convention of the other authentication credentials.
230+
- Update Zest library to 0.32.0.
231+
232+
Removed
233+
- Support for Internet Explorer.
234+

site/layouts/post/single.html

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,12 +45,12 @@ <h1 class="text--white">{{ .Title }}</h1>
4545
</div>
4646
<div class="author-name col-4-5">
4747
{{ if $author.name }}
48-
{{ $author.name }}
48+
<a href="/authors/{{ $name }}/">{{ $author.name }}</a>
4949
{{ else }}
5050
{{ $name }}
5151
{{ end }}
5252
{{ if $author.twitter }}
53-
<a class="author-twitter" href="https://twitter.com/{{ $author.twitter }}">@{{ $author.twitter }}</a>
53+
(<a class="author-twitter" href="https://twitter.com/{{ $author.twitter }}">@{{ $author.twitter }}</a>)
5454
{{ end }}
5555
</div>
5656
</section>

0 commit comments

Comments
 (0)