Hi Haakon,
I'm a big fan of OWASP Juice Shop, but I think of it more as a training platform for manual testing.
There are a lot of vulnerabilities, but most of them are "logical" vulnerabilities that require context to understand.
Automated tools can find some of the underlying problems, but they will not typically be able to find logical issues.
For those you either need pentesters, or potentially AI based testing.
I'm not aware of any other DAST tools which claim to find most of the Juice Shop vulnerabilities.
You may notice that some vendors implement their own deliberately vulnerable apps in order to showcase their capabilities, e.g.
Security is hard, and no one type of tool will find all vulnerabilities.
Ideally you should have a layered approach including DAST, SAST, SCA and pentesting. (In addition to things like a secure SDLC etc).
Pentesting (by experienced practitioners) is the most effective way to find the most vulnerabilities, but it is also the most expensive in both time and money. AI based pentesting is starting to encroach on that, but it is also expensive.
DAST is one of the most cost effective ways to find vulnerabilities that are exploitable.
Attackers will be running DAST scans against your apps. If you dont do the same then you wont know what they are finding.
Yes, you can add additional scan rules to ZAP.
The main release just has the "release" status scan rules, but you can install the beta and alpha ones from the ZAP Marketplace as well.
ZAP also supports script based rules - we have examples in the community scripts repo, and you can of course implement your own.
Cheers,
Simon