Traffic Monitor
Real-time AI-powered HTTP traffic analysis — VISTA’s flagship feature.
Table of contents
Overview
The Traffic Monitor passively intercepts HTTP traffic flowing through Burp Suite’s proxy and sends it to your configured AI provider for vulnerability analysis. It runs in the background while you browse the target application, automatically flagging security issues.
How It Works
Browser → Burp Proxy → VISTA Traffic Monitor
│
┌─────────▼──────────┐
│ Scope Filter │
│ (in-scope only) │
└─────────┬──────────┘
│
┌─────────▼──────────┐
│ Traffic Buffer │
│ (batch requests) │
└─────────┬──────────┘
│
┌─────────▼──────────┐
│ AI Analysis │
│ (vulnerability │
│ detection) │
└─────────┬──────────┘
│
┌─────────▼──────────┐
│ Findings Tree │
│ (categorized) │
└────────────────────┘
- Capture — All HTTP traffic through Burp’s proxy is intercepted
- Filter — Only in-scope traffic is forwarded (saves AI tokens)
- Buffer — Requests are batched for efficient analysis
- Analyze — AI evaluates each request/response for vulnerabilities
- Report — Findings appear in a hierarchical tree with severity ratings
Using Traffic Monitor
Starting Monitoring
- Go to the Traffic Monitor tab
- Click “▶ Start Monitoring”
- The status indicator changes to show monitoring is active
- Browse your target application through Burp’s proxy
Configuring Scope
Only in-scope traffic is analyzed (prevents wasting AI tokens on irrelevant requests):
- In Traffic Monitor, click “Scope” or go to Settings
- Add target domains:
example.com,api.example.com - VISTA only sends matching traffic to the AI
Viewing Findings
Findings appear in a hierarchical tree view:
📂 Cross-Site Scripting (3)
├── 🔴 Reflected XSS in search parameter — /search?q=...
├── 🟡 Potential DOM XSS via hash — /app#callback=...
└── 🟡 Unencoded output in response — /profile
📂 SQL Injection (1)
└── 🔴 Error-based SQLi in login — /api/login
📂 Security Misconfiguration (2)
├── 🟢 Missing X-Frame-Options — /dashboard
└── 🟢 Verbose error messages — /api/users
- Tab badge shows
Findings (6)so you know when new issues are detected - Click any finding to see full details, affected request/response, and remediation advice
- Findings are color-coded by severity (🔴 High, 🟡 Medium, 🟢 Low)
Managing Findings
- Export — Save findings for reporting
- Clear — Remove all findings to start fresh
- Auto-save — Findings persist across Burp restarts
Customizing Analysis
Analysis Template
The AI prompt used for traffic analysis can be customized:
- Go to Prompt Templates tab
- Find the “Traffic - Bug Bounty Hunter” template
- Click “Edit” to modify the analysis prompt
- Or create a custom template and set it as the traffic analysis template
Token Optimization
VISTA minimizes AI costs by:
- Scope filtering — Only analyze in-scope traffic
- Request truncation — Large requests/responses are trimmed before sending to AI
- Batching — Multiple requests are analyzed efficiently
- Deduplication — Similar requests aren’t analyzed repeatedly
Tips
Set a tight scope before starting monitoring. Analyzing every request wastes tokens and clutters findings.
Use the Traffic Monitor for reconnaissance — let it run while you manually explore the application, then review findings for deeper testing with the AI Advisor.