Published 4 months ago • Last updated December 9, 2025 • ⏱️ 5 min read

Four years ago we released DOM Invader, I added a feature called callbacks that enabled you to execute JavaScript and log when sinks, messages or sources are found. This was so powerful but over the years I didn't really see many people publicly taking advantage of it. So recently I decided to build an extension that automates DOM Invader from within Burp and gets results back from DOM Invader. AutoVader was born. AutoVader is a Burp Suite extension that integrates DOM Invader with Playwright Java to automatically find DOM-based vulnerabilities in web applications. It provides automated scanning capabilities through context menu actions, allowing security testers to quickly identify client-side security issues without manual DOM Invader interaction.
One of the difficulties of automating DOM Invader is passing the correct canary. AutoVader handles all of this. It creates a project canary that is reused throughout the Burp project enabling you to scan with the same canary each time and when issues are created you can use the same request to manually confirm the issue.
AutoVader adds a context menu to Burp Suite with multiple scanning options. Right-click on any request in the Target, Proxy History, or Repeater tabs to access AutoVader features.
Open DOM Invader
This action is useful when you want to configure DOM Invader for scanning. Such as adding a custom sink such as alert. You can also manually use DOM Invader if you wish.
Scan all GET params
This passes the URL to DOM Invader and enumerates each parameter and places the canary in the value. You can use the payload setting to pass a vector too if you wish, just go to Burp Settings->Extensions->AutoVader->Payload.
Scan all GET params for gadgets
Imagine you have a CSP on your target and you want to find a script gadget. This feature uses the HTML and attributes defined in the settings and enumerates them and places the canary in each attribute. You can check this out yourself using a test case I constructed:
Scan all POST params This works by passing the whole request and enumerates all the POST parameters.
Scan web messages
This will scan for web message vulnerabilities and reports the findings back to Burp.
Inject into all sources
Inject into all sources & click everything
Scan for client side prototype pollution
Prototype pollution source test case
Scan for client side prototype pollution gadgets
Prototype pollution gadgets test case
Intercept client side redirect
AutoVader provides project-specific settings accessible through Burp Suite's Settings:
In Burp Suite Professional, go to Extensions->BApp store and search for AutoVader. Click the install button.
You can see it in action in this video demo.