StackHawk

Announcing GraphQL Application Security Testing

Share on LinkedIn
Share on X
Share on Facebook
Share on Reddit
Send us an email

In 5 short years, GraphQL has solidified its footprint as the API backing of many applications, and it shows no sign of slowing. More and more companies are choosing GraphQL for its simplicity, ability to fetch the right amount of data, and the way it can traverse a graph of relational data.

Securing GraphQL applications, however, has been a challenge. Sure, there are common best practices and rules in place. But reliance on training or the rudimentary automated checks that currently exist only gets you so far. Eventually security bugs will be deployed and your app will be at risk.

…until now.

GraphQL Security from StackHawk

We’re excited to announce that HawkScan, StackHawk’s scanning engine, now supports GraphQL applications. StackHawk is the only product on the market that can scan a running GraphQL application, simulating an attack by fuzzing the various query parameters, and surfacing potential security bugs to engineering teams.

With StackHawk, teams using GraphQL for their API layer can now confidently catch potential vulnerabilities before security bugs hit production. With CI/CD automation, you can ensure that potential bugs are caught early in the development lifecycle and fixed by the developers who have the context and expertise of the code base they just merged to.

How it Works

StackHawk is a dynamic application security testing tool. That means it runs security testing against your running application, whether that be on your local machine, in CI environments, or against your application in production.

GraphQL testing is done by exposing the introspection endpoint to the scanner via the StackHawk.yml file. The scanner runs introspection and identifies all of the potential query and mutation operations of the endpoint, and then gets to work finding potential security bugs. As a dynamic security test, the scanner sends requests to all endpoints, effectively fuzzing the whole GraphQL tree, simulating the ways the application could be attacked. The scanner logs all tested endpoints and any security bugs found, with the associated request and response payload. From there, developers can triage bugs, fixing high priority issues and using Findings Management to quiet noise for accepted risk or assigned items. Then, GraphQL scanning can be automated in the pipeline to ensure that no build hits production with unaccepted security risk.

Getting Started

Getting started with GraphQL security in StackHawk is incredibly easy, simply requiring the addition of the schema path to the stackhawk.yml file.

App:
  ...
  graphqlConf:
    enabled: true
    schemaPath: /graphql

Visit our docs for more information on configuration for GraphQL, as well as other configuration options such as authenticated scanning. As always, our team is available to assist as you begin using StackHawk. Reach out to support@stackhawk.com and we will be happy to help.

More Hawksome Posts

Understanding LLM Security Risks: OWASP Top 10 for LLMs (2025)

Understanding LLM Security Risks: OWASP Top 10 for LLMs (2025)

As LLMs like ChatGPT moved from research to real-world applications, traditional security frameworks fell behind. OWASP’s Top 10 for LLM Applications highlights new risks—from prompt injection to model poisoning and system prompt leakage—that come with AI-driven systems. Understanding these threats is key to securing the next generation of applications. StackHawk helps teams find and fix vulnerabilities early, including those in AI-powered apps.

Top Security Testing Strategies for Software Development

Top Security Testing Strategies for Software Development

Security testing is a critical step in modern software development, ensuring applications stay resilient against evolving cyber threats. By identifying vulnerabilities early in the SDLC, teams can prevent breaches, protect data, and maintain user trust. This article explores key security testing types, benefits, challenges, best practices, and essential tools to help you strengthen your application’s defense—from code to runtime.

A Developer’s Guide to Dynamic Analysis in Software Security

A Developer’s Guide to Dynamic Analysis in Software Security

Running software under real conditions reveals vulnerabilities that static code checks miss. This guide breaks down dynamic analysis, how it works, when to run it, which tools to use, and where it fits in modern security testing workflows to help developers catch runtime issues before they reach production.