{"version":"1.0","provider_name":"DevSecOps School","provider_url":"https:\/\/devsecopsschool.com\/blog","author_name":"pritesh k","author_url":"https:\/\/devsecopsschool.com\/blog\/author\/priteshgeek\/","title":"OWASP ZAP Tutorial: A Comprehensive Guide for DevSecOps - DevSecOps School","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"UutXEztrkG\"><a href=\"https:\/\/devsecopsschool.com\/blog\/owasp-zap-tutorial-a-comprehensive-guide-for-devsecops\/\">OWASP ZAP Tutorial: A Comprehensive Guide for DevSecOps<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/devsecopsschool.com\/blog\/owasp-zap-tutorial-a-comprehensive-guide-for-devsecops\/embed\/#?secret=UutXEztrkG\" width=\"600\" height=\"338\" title=\"&#8220;OWASP ZAP Tutorial: A Comprehensive Guide for DevSecOps&#8221; &#8212; DevSecOps School\" data-secret=\"UutXEztrkG\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/devsecopsschool.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Introduction &amp; Overview What is OWASP ZAP? OWASP ZAP (Zed Attack Proxy) is an open-source, free-to-use web application security testing tool maintained by the Open Web Application Security Project (OWASP). It is designed to identify vulnerabilities in web applications during development, testing, and deployment phases. ZAP acts as an intercepting proxy, capturing HTTP\/HTTPS traffic between ... Read more","thumbnail_url":"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2023\/09\/image-410.png"}