I'm trying to write a python script to run in Github Actions to ZAP scan my API. This seems to be working for passive scans, but its not running attacks such as the SQL Injection attacks. I think this is because my fields it should be inject in are wrapped in a "data" object and ZAP attack can't inject into an object and doesn't know to go a step deeper to find they key:values contianed in "data" object.
How can I solve this? I have seeded my attacks and spidered with the format expected by my API. I cannot change away from the "data" object wrapper as this is how my API consumes request payloads. But I need to somehow tell ZAP to do this?
It is possible that the issue of SQL Injection attacks may be unrelated to this, but I think it is the issue.
Thanks,
Patrick