Note the “grpc-web-text” application type. For the remainder of this article we assume that this is being used, however it is worth nothing that this is not the only possible value [Ref1].
Theres a way to reverse engineer gRPC, I would really recommend reading the article down below
Pentesting Twirp/gRPC-Web : Recon and Reverse-engineering
If you use the bind parameter to bind it to some IP address that differs from loopback(127.0.0.1) then your browser will gladly proxy your connections to Burp or ZAP. After that you can continue your “regular pentesting workflow” .
For deeper knowledge about the Tools you can use, refer to the article below
A very cool blog about the ways you can go about “Pentesting” gRPC, I do not have the same infra to test these on, but I can definitely link you that
Another article by the same authors
Do you have any questions? Feel free to reach out to me on twitter or on LinkedIn.