Skip to content

Commit 59d3800

Browse files
authored
Merge pull request #14605 from balaakasam/patch-1
[docs] Improve Invicti parser documentation with enterprise usage guidance
2 parents 514487c + 2b7cee8 commit 59d3800

1 file changed

Lines changed: 133 additions & 3 deletions

File tree

  • docs/content/supported_tools/parsers/file

docs/content/supported_tools/parsers/file/invicti.md

Lines changed: 133 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,145 @@
22
title: "Invicti"
33
toc_hide: true
44
---
5+
56
Vulnerabilities List - JSON report
67

7-
### Sample Scan Data
8+
Invicti is a web application security scanner available as Invicti
9+
Enterprise (cloud-based) and Invicti Standard (on-premise). It identifies
10+
vulnerabilities through automated crawling and attack simulation, producing
11+
confirmed and unconfirmed findings with proof of exploit where available.
12+
13+
DefectDojo supports two methods of ingesting Invicti findings:
14+
15+
1. **File-based import** - Export a Vulnerabilities List in JSON format
16+
from Invicti and upload it manually into DefectDojo
17+
2. **Native integration** - Configure Invicti Enterprise to push findings
18+
directly to DefectDojo automatically after each scan
19+
20+
---
21+
22+
## File-Based Import
23+
24+
### How to Export from Invicti Enterprise
25+
26+
1. Log in to Invicti Enterprise
27+
2. Go to **Scans > Recent Scans** and select the relevant scan
28+
3. Select **Report**
29+
4. Under **Lists**, select **Vulnerabilities List**
30+
5. From the **Format** drop-down, select **JSON**
31+
6. Configure export options as needed:
32+
- **Exclude Addressed Issues** — excludes findings already actioned
33+
in Invicti
34+
- **Export Confirmed** - includes only findings verified with proof
35+
of exploit
36+
- **Export Unconfirmed** - includes findings detected but not
37+
fully verified
38+
7. Select **Export** and save the JSON file
39+
8. Upload the file into DefectDojo under your chosen Engagement
40+
using **Import Scan > Invicti Scan**
41+
42+
### Confirmed vs Unconfirmed Findings
43+
44+
Invicti classifies findings in two ways:
45+
46+
- **Confirmed** - Invicti verified the vulnerability with a proof of
47+
exploit. These are high-confidence findings and should be prioritized.
48+
- **Unconfirmed** - Invicti detected indicators of a vulnerability but
49+
could not fully verify it. These require manual review before acting
50+
on them.
51+
52+
It is recommended to export both confirmed and unconfirmed findings and
53+
use DefectDojo's **Active/Verified** flags to track review status rather
54+
than filtering at export time. This preserves full visibility and avoids
55+
losing findings from the vulnerability record.
56+
57+
---
58+
59+
## Native Integration (Invicti Enterprise)
60+
61+
Invicti Enterprise supports direct integration with DefectDojo, allowing
62+
findings to be pushed automatically after each scan without manual
63+
file export.
64+
65+
### Prerequisites
66+
- A DefectDojo API key with appropriate permissions
67+
- An existing Product and Engagement in DefectDojo to receive findings
68+
69+
### Setup Steps
70+
71+
1. Log in to Invicti Enterprise
72+
2. Go to **Integrations > New Integration**
73+
3. Under **Issue Tracking Systems**, select **DefectDojo**
74+
4. Enter a name for the integration
75+
5. Enter your DefectDojo URL, API key, Product ID, and Engagement ID
76+
6. Optionally add tags to help filter imported findings in DefectDojo
77+
7. Select **Save**
78+
8. Use **Test Credentials** to confirm the connection is working
79+
80+
Once configured, Invicti Enterprise can be set to automatically push
81+
findings to DefectDojo after each completed scan. This is recommended
82+
for teams running regular or scheduled scans as it removes the manual
83+
export step and keeps DefectDojo up to date in near real time.
84+
85+
---
86+
87+
## Severity Mapping
88+
89+
| Invicti Severity | DefectDojo Severity |
90+
|---|---|
91+
| Critical | Critical |
92+
| High | High |
93+
| Medium | Medium |
94+
| Low | Low |
95+
| Best Practice / Information | Info |
96+
97+
Invicti also uses action-based priority labels in its reports such as
98+
"Fix Immediately" and "Fix Soon". These do not map directly into
99+
DefectDojo severity fields but can be used to inform triage decisions
100+
when reviewing imported findings.
101+
102+
---
103+
104+
## Recommended Workflow for Enterprise Use
105+
106+
For teams running Invicti Enterprise across multiple applications:
107+
108+
1. **Use the native integration** rather than manual file exports to
109+
reduce operational overhead
110+
2. **Use Reimport** (not Import) for recurring scans on the same target
111+
to track finding status over time rather than creating duplicate records
112+
3. **Export Confirmed and Unconfirmed separately** if your team has a
113+
formal triage process — import confirmed findings as active and
114+
unconfirmed findings as requiring review
115+
4. **Set SLA thresholds** in DefectDojo aligned to Invicti severity
116+
levels so that Critical and High findings trigger appropriate
117+
remediation timelines automatically
118+
119+
---
120+
121+
## Sample Scan Data
8122

9123
Sample Invicti scans can be found [here](https://github.com/DefectDojo/django-DefectDojo/tree/master/unittests/scans/invicti).
10124

11-
### Default Deduplication Hashcode Fields
12-
By default, DefectDojo identifies duplicate Findings using these [hashcode fields](https://docs.defectdojo.com/en/working_with_findings/finding_deduplication/about_deduplication/):
125+
---
126+
127+
## Default Deduplication Hashcode Fields
128+
129+
By default, DefectDojo identifies duplicate Findings using these
130+
[hashcode fields](https://docs.defectdojo.com/en/working_with_findings/finding_deduplication/about_deduplication/):
13131

14132
- title
15133
- description
16134
- severity
135+
136+
### Note on Deduplication for Large Scans
137+
138+
Invicti can report the same vulnerability type across multiple URLs,
139+
which means importing large scans without reviewing deduplication
140+
settings can result in a high volume of findings that represent the
141+
same underlying vulnerability class. To manage this:
142+
143+
- Consider enabling **Apply Same Findings** in your Engagement settings
144+
to group similar findings
145+
- Use **Reimport** instead of Import for recurring scans to update
146+
existing findings rather than creating new ones each time

0 commit comments

Comments
 (0)