Hello!
I am a beginner in IT security. I have recently tested Owasp Zap Baseline Scan Action in Github, to see how it works on a project pipeline, and started researching about it a bit more.
1) I noticed that, on the Baseline Scan README file, it says that the target could be a publicly available web application, but it does NOT have the same warning that Zap Full Scan has about we only being able to scan targets that we have permission to test.
2) I have also seen that Baseline Scan runs the ZAP spider for 1 minute and then waits for the passive scanning to complete, and does NOT perform any actual 'attacks'.
3) Finally, I saw the faq question in zaproxy website, where it explains that passive scanning is completely safe and legal against a live website, but spidering is a bit more dangerous, and could cause problems.
So, considering all this, I have a few questions: is baseline scan safe and legal to be used targeting third-party applications, since it does not have a warning, and does not perform actual 'attacks', but still uses a spider? If so, why is the spider in baseline scan safe compared to a spider that could cause damage a live website?
Thank you for the attention!