FroggerAPI does not run Tenable WAS scans, manage scan credentials, or interact with Tenable APIs.
Instead, FroggerAPI prepares and enforces OpenAPI specifications so Tenable WAS scans behave predictably and fail only for real security findings.
Tenable WAS relies heavily on your OpenAPI 3 specifications to understand parameters, request bodies, and expected behavior. If your spec is too loose, you end up with noisy “permissive input validation” findings and partial coverage.
Most teams maintain Postman collections, not handcrafted OpenAPI docs. Collections typically lack:
maxLength) and array bounds (maxItems)Code-first generators or AI can guess at schemas, but they often err on the side of being permissive. Tenable will flag that.
FroggerAPI starts from your Postman collection and produces a strict OpenAPI 3.0 spec tuned for Tenable:
type and formatmaxLength and maxItemspattern where obvious (IDs, codes, etc.)additionalProperties: false where safeAuthorization so you can keep using Tenable’s own credential system.Think of FroggerAPI as a “spec hardener” that lives between your existing Postman collections and Tenable WAS. It doesn’t replace Tenable; it feeds Tenable with better, less-permissive specs.
From the web UI at froggerapi.io/convert, upload a Postman collection and optional environment JSON. Alternatively, use the API directly:
curl -X POST "https://api.froggerapi.io/api/convert" \ -F "collection=@your_collection.postman_collection.json" \ -F "environment=@your_environment.json" \ -o openapi.json
The response (or openapi.json if you use -o) is a strict OpenAPI 3 document.
For Pro / tenant-aware usage, you can also include:
curl -X POST "https://api.froggerapi.io/api/convert" \ -H "X-Tenant-Id: your-tenant-id" \ -H "X-Api-Key: your-froggerapi-key" \ -F "collection=@your_collection.postman_collection.json" \ -F "environment=@your_environment.json" \ -o openapi.json
Tenant and API key headers are optional in the public preview, but will be used for Pro features like history, diffing, and higher limits.
openapi.json (or YAML) you generated from FroggerAPI.
Configure your usual credential method in Tenable (bearer token, header auth, etc.). Since
FroggerAPI excludes Authorization from the spec, Tenable’s own credential
workflow remains the source of truth.
With tighter schemas, Tenable can:
For teams that want an always-fresh spec, you can run FroggerAPI as a build step:
# Example (GitHub Actions) curl -X POST "https://api.froggerapi.io/api/convert" \ -F "collection=@collections/my-api.postman_collection.json" \ -o openapi.json # Then, publish openapi.json as an artifact # or feed it into downstream tools (including Tenable WAS).
See the Docs for additional CI/CD examples and patterns, including tenant/API key usage for Pro.
The base FroggerAPI flow focuses on generating a single strict OpenAPI spec that you can import into Tenable. The Pro plan (targeted at $50/month per tenant) layers governance and collaboration on top of that workflow:
You can still use Tenable exactly as you do today; Pro just makes it easier to maintain a clean, well-governed spec between releases.
Over time, FroggerAPI may add more automation around Tenable itself, such as:
If you’re interested in deeper Tenable integration (or have a specific workflow in mind), reach out as a design partner at feedback@froggerapi.io.
If you have a specific Tenable WAS use case and want to see if FroggerAPI fits, email: feedback@froggerapi.io.