Hi there,
I have a similar question, probably due to the same reasons?
When I did an active scan and it finished, in the resulting list of alerts there were also URLs flagged, which I did not choose to scan.
Most if not all of them were pointing to something with google, e.g.
csp.withgoogle.com, googleanalytics stuff and the like.
I only wanted to scan my target host, nothing else.
Any explanation about how those google urls made it to the list of alerts?
Another question:
In the "standard" mode, if I scan a target url, would ZAP automatically scan other second-level domains, e.g. by following links it finds in my target?
In the docu, there's some explanation that in the "attack" mode, it would automatically scan "nodes", as soon as they are found.
What exactly is a "node" in this context? Any other directory on the same second level domain? (which could be kind of OK sometimes), or would it scan different second level domains, too?
I would like to use ZAP's active scan but also am afraid of potential destruction this could cause, expecially when scnaning "random" domains, other than my targets..
Thanks a lot for clarifications!
Cheers
Juergen