GraphCrawler – GraphQL Automated Security Testing Toolkit
Discription

[![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3coeALero1wRwlbO8fdCsRJb6vNXDDPR1k1qaBCetTgspHlHADZCeqSnouS7FmTGZdx2nMe-280zsAruBYIsOQnFfxb41CNNCwHWBmgYHNB_mLkwsdx-JtTJPZQ8dJB47eDgV03T762M3kZt_waTqlBPKtoRxide38YWMRrmqvsHyc27ITQ_MYWzB3A/w640-h370/GraphCrawler_2_output.png)]()

Graph Crawler is the most powerful automated testing toolkit for any GraphQL endpoint.

NEW: Can search for endpoints for you using Escape Technology’s powerful [Graphinder]( “Graphinder” ) tool. Just point it towards a domain and add the ‘-e’ option and Graphinder will do [subdomain enumeration]( “subdomain enumeration” ) + search popular directories for GraphQL endpoints. After all this GraphCrawler will take over and work through each find.

It will run through and check if mutation is enabled, check for any sensitive queries available, such as users and files, and it will also test any easy queries it find to see if [authentication]( “authentication” ) is required.

If [introspection]( “introspection” ) is not enabled on the endpoint it will check if it is an Apollo Server and then can run [Clairvoyance]( “Clairvoyance” ) to [brute force]( “brute force” ) and grab the suggestions to try to build the schema ourselves. (See the Clairvoyance project for greater details on this). It will then score the findings 1-10 with 10 being the most critical.

If you want to dig deeper into the schema you can also use [graphql-path-enum]( “graphql-path-enum” ) to look for paths to certain types, like user IDs, emails, etc.

I hope this saves you as much time as it has for me

## Usage

python graphCrawler.py -u https://test.com/graphql/api -o -a “”

??????? ??????? ?????? ??????? ??? ??? ?????????????? ?????? ??? ?????? ???????????????
???????? ??????????????????????????? ?????????????????????????????? ?????? ????????????????
??? ??????????????????????????????????????? ??????????????????? ?? ?????? ?????? ????????
??? ?????????????????????????? ??????????? ????????????????????????????? ?????? ????????
???????????? ?????? ?????? ??? ?????????????? ?????? ???????????????????????????????? ???
??????? ??? ?????? ?????? ??? ??? ?????????? ?????? ??? ???????? ??????????????????? ???

The output option is not required and by default it will output to schema.json

### Example output:

[![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3coeALero1wRwlbO8fdCsRJb6vNXDDPR1k1qaBCetTgspHlHADZCeqSnouS7FmTGZdx2nMe-280zsAruBYIsOQnFfxb41CNNCwHWBmgYHNB_mLkwsdx-JtTJPZQ8dJB47eDgV03T762M3kZt_waTqlBPKtoRxide38YWMRrmqvsHyc27ITQ_MYWzB3A/w640-h370/GraphCrawler_2_output.png)]()

### Requirements

* Python3
* Docker
* Install all Python dependencies with pip

Wordlist from [google-10000-english]( “google-10000-english” )

### TODO

* Add option for “full report” following the endpoint search where it will run clairvoyance and all other aspects of the toolkit on the endpoints found
* Default to “simple scan” to just find endpoints when this feature is added
* Way Future: help craft queries based of the shema provided

**[Download GraphCrawler]( “Download GraphCrawler” )**Read More

Back to Main

Subscribe for the latest news: