back to home

akto-api-security / akto

Proactive, Open source API security → API discovery, API Security Posture, Testing in CI/CD, Test Library with 1000+ Tests, Add custom tests, Sensitive data exposure

View on GitHub
1,455 stars
276 forks
262 issues

AI Architecture Analysis

This repository is indexed by RepoMind. By analyzing akto-api-security/akto in our AI interface, you can instantly generate complete architecture diagrams, visualize control flows, and perform automated security audits across the entire codebase.

Our Agentic Context Augmented Generation (Agentic CAG) engine loads full source files into context on-demand, avoiding the fragmentation of traditional RAG systems. Ask questions about the architecture, dependencies, or specific features to see it in action.

Source files are only loaded when you start an analysis to optimize performance.

Embed this Badge

Showcase RepoMind's analysis directly in your repository's README.

[![Analyzed by RepoMind](https://img.shields.io/badge/Analyzed%20by-RepoMind-4F46E5?style=for-the-badge)](https://repomind.in/repo/akto-api-security/akto)
Preview:Analyzed by RepoMind

Repository Overview (README excerpt)

Crawler view

Akto.io API Security Contributors What is Akto? How it works • Getting-Started • API Inventory • API testing • Add Test • Join Discord community • Akto is an instant, open source API security platform that takes only 60 secs to get started. Akto is used by security teams to maintain a continuous inventory of APIs, test APIs for vulnerabilities and find runtime issues. Akto offers coverage for all OWASP top 10 and HackerOne Top 10 categories including BOLA, authentication, SSRF, XSS, security configurations, etc. Akto's powerful testing engine runs variety of business logic tests by reading traffic data to understand API traffic pattern leading to reduced false positives. Akto can integrate with multiple traffic sources - burpsuite, AWS, postman, GCP, gateways, etc. Here is our public roadmap for this quarter. Akto enables security and engineering teams to secure their APIs by doing three things: • API inventory • Run business logic tests in CI/CD • Find vulnerabilities in run-time https://user-images.githubusercontent.com/91306853/216407351-d18c396b-5cd0-4cbc-a350-10a76b1d67b3.mp4 How it works? Step 1: Create inventory Step 2: Run tests How to get Started? Using docker-compose (works for any machine which has Docker installed) Run the following commands to install Akto. You'll need to have curl and Docker installed in order to run the container.. • Clone the Akto repo by using this command • Go to the cloned directory • Run If you are setting this up in your own Cloud (AWS/GCP/Heroku), read this section Please ensure the following for good security practices • Open inbound security rule for port 9090 only. And restrict the source CIDR to VPC CIDR or your IP only. • Use an EC2 from a private subnet - a. This way, no one will be able to make an inbound request to your machine. b. Ensure this private subnet has access to Internet so that outbound calls can succeed! c. You might have to set up tunneling to access instance via VPN using d. In your browser, visit • Use an EC2 from a public subnet - please don't! If you still want to do this, you can skip 2.b and 2.c. Simply access your instance via Akto is really powerful in Cloud deployment if you can provide your application's mirrored traffic (0 performance impact). You would also be able to schedule tests in CI/CD and invite more team members on the dashboard. For that, you should install Akto Enterprise edition available here. Read more about it here API Security testing tutorials | Title | Link | | ------------- | ------------- | | Introduction | https://www.youtube.com/watch?v=oFt4OVmfE2s | | **Tutorial 1:** SSRF Port Scanning (OWASP API7:2023) | https://www.youtube.com/watch?v=WjNNh6asAD0 | Develop and contribute Quicksetup using VSCode Devcontainers Prerequisites: • Install VSCode • Install VSCode Dev Containers extension • **Windows:** Docker Desktop 2.0+ on Windows 10 Pro/Enterprise. Windows 10 Home (2004+) requires Docker Desktop 2.3+ and the WSL 2 back-end. • **macOS**: Docker Desktop 2.0+. • **Linux**: Docker CE/EE 18.06+ and Docker Compose 1.21+. **Note**: If using Docker Desktop, consider changing the memory allocation to 8 GB for better performance Steps: Clone repo and open in vscode • Open terminal • • • • Open in VScode: Start Dev Container • Go to View > Command Palette and type: Dev Containers: Reopen in Container • Wait for the Dev Container to set up. • Open **localhost:9090** in your web browser to see the Akto dashboard Manual Setup Instructions Prerequisites OpenJDK 8, node(v18.7.0+ link), npm(v8.15.0+), maven (v3.6.3 link), MongoDB (v5.0.3+ link) Clone repo • • • Setup database • • • • Setup Frontend • • • • • Setup Dashboard • • • • • • Setup Testing • • • • • Using Testing CLI tool Run the following command to run testing CLI tool Play around • Open in your favourite browser • You will need to signup when logging in for the first time, next time onwards you can login Debug • To debug front end, install Vue.js Chrome extension from here. • To debug backend, run the following before running web server - a. Set MAVEN_OPTS variable to enable debugging on your Java process export MAVEN_OPTS="-Xdebug -Xrunjdwp:transport=dt_socket,server=y,suspend=n,address=8081, -Dcom.sun.management.jmxremote=true -Dcom.sun.management.jmxremote.port=9010 -Dcom.sun.management.jmxremote.rmi.port=9010 -Dcom.sun.management.jmxremote.local.only=false -Dcom.sun.management.jmxremote.authenticate=false -Dcom.sun.management.jmxremote.ssl=false" b. In Visual Studio code, click on any line number to set a breakpoint. c. Attach the Java debugger from Run and Debug mode. If you are doing this for the first time, click on “Create launch.json file” and then “Add configuration”. Choose “Java: Attach process by ID” and save the file. d. A list of running Java processes with show up. Select the web server process to attach the debugger Contributing We welcome contributions to this project. Please read our CONTRIBUTING.md for more information on how to get involved. License This project is licensed under the MIT License.