home / skills / codyswanngt / lisa / security-zap-scan
This skill runs an OWASP ZAP baseline scan via Docker, analyzes results by risk, and offers remediation guidance.
npx playbooks add skill codyswanngt/lisa --skill security-zap-scanReview the files below or copy the command above to add this skill to your agents.
---
name: security-zap-scan
description: "Run an OWASP ZAP baseline security scan locally using Docker. Checks for the ZAP baseline script, executes the scan, and summarizes findings by risk level with remediation recommendations."
allowed-tools: ["Bash", "Read"]
---
# OWASP ZAP Baseline Security Scan
Run a ZAP baseline security scan against the local application.
## Workflow
1. **Check prerequisites**:
- Verify Docker is installed and running: `docker info`
- Check if `scripts/zap-baseline.sh` exists in the project
2. **Execute scan**:
- If the script exists, run: `bash scripts/zap-baseline.sh`
- If the script does not exist, inform the user that this project does not have a ZAP baseline scan configured
3. **Analyze results**:
- After the scan completes, read `zap-report.html` (or `zap-report.md` for text)
- Summarize findings:
- Total number of alerts by risk level (High, Medium, Low, Informational)
- List each Medium+ finding with its rule ID, name, and recommended fix
- Categorize findings as "infrastructure-level" (fix at CDN/proxy) vs "application-level" (fix in code)
4. **Handle failures**:
- If the scan failed, explain what failed and suggest concrete remediation steps
## Execution
Run the scan now.
This skill runs an OWASP ZAP baseline security scan locally using Docker and the project's baseline script. It verifies prerequisites, executes the scan if configured, and produces a concise summary of findings by risk level with actionable remediation guidance. The goal is a quick, repeatable security check that highlights Medium+ issues and distinguishes infrastructure vs application fixes.
The skill first confirms Docker is available and that the project includes a ZAP baseline script (scripts/zap-baseline.sh). If present, it runs the script inside Docker to perform the baseline scan against the local application. After the run, it parses the generated report (HTML or Markdown), counts alerts by risk level, extracts each Medium and High finding with rule ID, name, and recommended fixes, and classifies each issue as infrastructure-level or application-level. If execution fails, it captures the failure reason and suggests concrete next steps.
What if Docker is not installed or running?
The skill aborts the scan and explains how to install and start Docker, plus commands to verify the daemon (e.g., docker info).
What reports are produced and how are they summarized?
It reads zap-report.html or zap-report.md, counts alerts by risk (High/Medium/Low/Informational), lists Medium+ findings with rule IDs, and offers remediation recommendations and classification.
How does it decide infrastructure-level vs application-level?
Classification is based on the nature of the finding: configuration, headers, CDN/proxy behavior map to infrastructure-level; code, input handling, and auth logic map to application-level.