Rich support for the OpenAPI Specification (OAS) / Swagger specification making it quicker and easier to create, edit and navigate your OpenAPI definitions.
Also check the quality, conformance and security of your APIs from inside VS Code, with the bundled 42Crunch API security testing tools - API Audit and API Scan. Audit and Scan are available to both our freemium users and to 42Crunch platform subscribers. Monthly usage limitations apply for freemium users. Upgrade options available.
The plugin supports code navigation, linting, SwaggerUI or ReDoc preview, IntelliSense, schema enforcement and generation, schema definition links and snippets. It also supports both OpenAPI v2 and v3.0.x in JSON or YAML format. QuickStart
A static analysis that lets you check the quality, conformance (to the OpenAPI specification) and security of your API definition. Video explainer
A dynamic conformance and security tool that tests the API for conformance to the API definition and security vulnerabilities. The free version of API Scan runs locally in your own environment and does not require your API to be uploaded to the 42Crunch platform. Video explainer
The free version of API Scan runs locally in your own environment and requires no API file to be uploaded.
This service lets users of our OpenAPI editor extension who are not customers run the API Audit and Scan tests on their APIs.
We’ve recently launched our developer community where you’ll be able to help, get tips-n-tricks and keep up to speed with all the latest developments: https://developers.42crunch.com/
After installing the plugin, open any JSON or YAML file that contains an OpenAPI definition. The plugin automatically detects that this is an OpenAPI file, and the /API button is shown in the left-hand panel.
We also encourage you to watch this video that gives you a full tour of the editor and its different features.
This extension makes it easier and faster to navigate your OpenAPI definitions, especially when they get longer.
You can home in on elements in the OpenAPI explorer view, or jump directly to the target of a reference in the API. You can also add new elements to your API directly in the OpenAPI explorer directly where they are needed. Filling in the details is quicker with IntelliSense support for OpenAPI elements.
new openapi
, and click the corresponding command to create either an OAS v2 or v3 template file.Watch this video on editor basics.
As you start typing OpenAPI elements or their values, the context-sensitive list of available options is displayed in the IntelliSense menu. In JSON OpenAPI files, just type double-quote ("
) to show the menu, and type further to filter the list. In YAML OpenAPI files, start typing the property name.
You can also use the corresponding VS Code hotkey (Ctrl+Space on Windows, Cmd+Space on Mac) to open the IntelliSense menu.
Use Go to Definition to locate the targets of references easily. To jump to view the definition from a reference in your API, either Ctrl+click a reference, or right-click a reference and click Go to Definition in the shortcut menu.
By default, entries in the OpenAPI Explorer pane are sorted alphabetically. If you want to instead have them sorted in the order they are in the OpenAPI file, change the corresponding setting:
You can get a documentation-style preview of the API you are editing by clicking the Preview button at the top right:
The extension supports two popular OpenAPI documentation generators: SwaggerUI and ReDoc.
To change the default OpenAPI Preview rendering engine:
With "Try it", you can invoke operations defined in your OpenAPI directly from VS Code:
Try it comes with a number of limitations:
"Try it" can be used to generate JSON Schema based on the body of the response.
If you use references to schemas served by an authenticated HTTP service (such as an Schema Registry service or a repository), you'll need to configure the list of approved hosts in the extension settings. To do this:
In case some of the approved hosts requires authentication, you can configure it in the OpenAPI > External References section of the 42Crunch: Open Settings
command view:
To open this view, go to
View > Command Palette...
in VSCode menu and type in42Crunch
, you'll see the Open Settings command listed below: You can also use keyboard shortcuts for the Command Palette Ctrl+Shift+P, or Cmd+Shift+P for Mac users.
After configuring all hosts you need to refer to, all OpenAPI references to any of the approved hosts will be dynamically resolved when linting or previewing your API.
You can use this OpenAPI extension to check the quality and security of your API definition as you work on it. This feature is powered by 42Crunch Audit. 42Crunch Audit performs a static analysis of the API definition that includes more than 300 checks on best practices and potential vulnerabilities related to authentication, authorization as well as data constraints.
Watch this video to learn more about 42Crunch Audit.
You can run the audit service in freemium or platform mode:
42Crunch: Update platform credentials
from the command palette.To run Security Audit from VS Code, you need a token. The first time you try to audit or scan an API, you are asked to provide your email address or an API token from the platform.
Once you supply the address, the extension requests the token to be sent to your mailbox. Paste the token you received in the prompt in VS Code, and you are all set.
Watch this short video which takes you through those steps.
You can use OpenAPI extension to check the quality of your API as you work on it. You can run the audit directly from VS Code by clicking the Audit button in the toolbar. Alternatively, you can run an audit for an individual endpoint using the code lens.
After the audit finishes, you get the audit report directly in the VS Code view, side by side with your code. The report viewer provides handy ways to navigate the found issues, even if the report is quite long.
Look here for issues that require the most attention.
Those two lists will often overlap and in certain cases be identical, but this is totally normal.
The full issue list contains all issues found. The list can be filtered in two ways:
SQG results are not visible yet to all Freemium users.
For each issue, you have access to full information about the issue, why it is relevant and recommendations on how to address the issue.
Watch this video to learn more about audit and how to navigate issues.
Many of the issues reported by 42Crunch Audit have fixes associated with them. These are code snippets that you can insert into the OpenAPI file and then customize with the appropriate value.
42Crunch Audit performs a security analysis that does not require any live API, just the definition itself. 42Crunch Scan leverages the OpenAPI definition to:
Watch this video to learn more about 42Crunch Scan.
APIs which thoroughly enforce compliance to an established contract are far more resilient to all types of attacks.
You must only use 42Crunch Scan against APIs that you own, not those of third parties.
We recommend you use the 42Crunch API Security Testing Binary to run scans. The alternative is to run a docker image locally. 42Crunch customers can also leverage our scand manager, by deploying an API-driven scan engine on Kubernetes.
In order to run a scan, you will need :
A credential : most likely, your API is using some form of authentication, like an API Key or token. You need a valid credential to provide to the scan engine.
The URL when the API is deployed.
We strongly recommend that you do not target a production system. While the tool does not try to inject malicious payloads, it is possible that the API implementation is not resilient enough to handle the tests and may crash or behave unexpectedly.
When you first launch a scan, you are presented with the scan configuration viewer. The scan configuration is generated automatically from the OpenAPI file you chose to scan.
For each operation in the OpenAPI file, a request is created. You can test individual requests using the Try button top-right.
Requests can be arranged into testing scenarios: a scenario combines one or multiple requests, for example you need to create a resource before you can view it. The editor allows you to extract data as variables from a request execution to inject it into the next step.
Similarly to requests, you can test an individual scenario to ensure it is built correctly before starting a scan: the scan engine will execute the scenario and if successful, launch automatically dozens of tests using the data provided in the OpenAPI file. The scan will send bad verbs, bad data types, bad data formats as well as authentication tests.
Once the scan has run, you are presented with a results page. The summary shows if the scan got a testing baseline by running the HappyPath test. Additional testing results are visible from the tests list. For each issue, you can easily reproduce the problem using a curl request.
42Crunch: Load Security Audit report from file
from the command paletteTo execute the 42Crunch Freemium services, you need access to the following URL: https://stateless.42crunch.com. You may need to ask your administrators to add a firewall rule to allow the connection.
.json
or .yaml
.cannot send the scan report : rpc error: code = InvalidArgument desc = invalid input
, to resolve the issue make sure your clock is correctly set.Submit your bug reports at GitHub project Issues.
And, needless to say, your reviews at VS Code marketplace mean the world to us!