Features and Capabilities

An overview of the Seeker features and capabilities that address the needs of various users who are involved in application security testing.

Speed and Ease of Use

Seeker monitors web application interactions in the background during normal testing without any need to run manual security scans. It can quickly process hundreds of thousands of HTTP(S) requests and deliver immediate results with near-zero false positives.

Seeker provides a rich and intuitive user interface.

Integration with CI/CD and DevOps Processes

As a dynamic security testing tool, Seeker seamlessly integrates into the Software Development Life Cycle (SDLC) processes and blends its functions into various stages of Continuous Integration/Continuous Delivery (CI/CD) workflows.

Seeker can be used with any open-source and 3rd-party testing frameworks and tools including the widely popular Selenium, Apache JMeter, Micro Focus Quality Center, LoadRunner, ALM, CA, and more.

Vulnerability Detection and Remediation Guidance

A comprehensive collection of information and tools that enable you to explore, analyze, manage, and remediate vulnerabilities detected in your organization's applications.

For more information, see About Vulnerabilities.

Accuracy of Detection

The accuracy of vulnerability detection is empowered by the Seeker's Active Verification mechanism. For background information, see About Active Verification.

Tracking Sensitive Data

Seeker helps protecting sensitive data by applying built-in and/or user-defined rules to determine whether a request contains sensitive parameters and should be checked for related vulnerabilities.

Online Training Platform

Integrated eLearning provides a wealth of online training courses that educate and guide developers how to handle and remediate vulnerabilities detected in their code.

Integrated Software Composition Analysis

Black Duck® Binary Analysis is a Black Duck Software Composition Analysis (SCA) tool that is integrated with Seeker to detect known security vulnerabilities in third-party components included in applications.

It is possible to use BDBA as a cloud appliance, on-premise appliance dedicated to Seeker, or on-premise shared appliance.

Compliance with Security Standards

For each analyzed application, Seeker provides a wide up-to-date overview and in-depth analysis of the application's compliance with the major security standards, such as OWASP Top 10 2021, 2017, 2013; OWASP Top 10 API Security Risks 2023, 2019; PCI-DSS v3.2, CWE/SANS 2011, GDPR, CAPEC.

Exporting Vulnerability Information

In addition to displaying detected vulnerabilities in various contexts, Seeker enables you to export this information in different formats, such as plain machine-readable CSV, JSON, and XML, as well as detailed PDF reports.

Supported Languages and Frameworks

Seeker currently supports applications written in the major programming languages such as Java®, .NET, and Node.js running on-premise and on cloud Azure, AWS, and GCP platforms.

For the full list of supported languages, platforms, frameworks, and technologies see Agent Technical Specification.