Dalfox Caido Integration
New (v2.12.0)
Overview
Dalfox now supports direct integration with Caido, enabling powerful, automated XSS scanning as part of your Caido active workflows. This integration streamlines web security testing by allowing you to invoke Dalfox’s advanced XSS detection on HTTP requests intercepted or crafted within Caido, and view actionable results right in your workflow.
What is Caido?
Caido is a modern web security toolkit for penetration testers and bug bounty hunters. It provides an intuitive interface for intercepting, modifying, and replaying HTTP requests, and supports extensibility through active workflows and external tool integrations.
By integrating Dalfox with Caido, you can:
- Automatically scan HTTP requests for XSS vulnerabilities
- Receive structured, actionable scan results within Caido
- Enhance your security testing workflow with minimal manual effort
Setting Up Dalfox with Caido
Prerequisites
- Dalfox v2.12.0 or later installed on your system
- Caido installed and running
- jq installed on your system
Installation
If you haven’t installed Dalfox yet, use one of the following methods:
# From source
go install github.com/hahwul/dalfox/v2@latest
# Homebrew
brew install dalfox
# Snapcraft
snap install dalfox
Configuring the Active Workflow
To use Dalfox as an active workflow in Caido:
- Set your Dalfox binary path Update the workflow script with the path to your Dalfox executable (you can find it with
which dalfox
):
DALFOX_PATH="/path/to/your/dalfox"
- Configure the Caido workflow Use the following shell script in your Caido active workflow configuration:
cat - | jq -r .request | $DALFOX_PATH pipe --rawdata --silence --report --report-format=md
This script takes the intercepted HTTP request from Caido, pipes it to Dalfox, and outputs the results in Markdown format.
- Save and activate the workflow Ensure your workflow is enabled in Caido’s interface.
Example Workflow Configuration
# Set your dalfox path
DALFOX_PATH="/Users/hahwul/Projects/dalfox/dalfox"
# Run dalfox
cat - | jq -r .request | $DALFOX_PATH pipe --rawdata --silence --report --report-format=md
Using Dalfox in Caido
Once configured, you can trigger Dalfox scans directly from Caido’s UI. When you send a request through Caido, the active workflow will automatically invoke Dalfox and display the scan results.
Running from the Context Menu
You can also run the Dalfox workflow directly from Caido’s context menu. Simply right-click on a request, select Run workflow
, and choose XSS Scan
.
Example Scan Result in Caido
Advanced Usage
You can customize Dalfox’s behavior by modifying the workflow script to include additional flags, such as custom headers, cookies, or Blind XSS callbacks. For example:
cat - | jq -r .request | $DALFOX_PATH pipe --rawdata --silence --report --report-format=md --header "Authorization: Bearer <token>" -b your-callback.com
Best Practices
- Keep Dalfox Updated: Use the latest version for improved detection and features.
- Validate Results: Manually verify critical findings for accuracy.
- Respect Target Systems: Avoid scanning production systems without permission.
- Leverage Caido Context: Use Caido’s request manipulation features to test various scenarios before scanning.
- Secure Sensitive Data: Be mindful of sensitive information in scan results.
By integrating Dalfox with Caido, you can supercharge your web security assessments with automated, reliable XSS detection—right where you need it most.