Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create scripts to validade if an app is still vulnerable to the attack narrative #447

Merged
merged 2 commits into from
Oct 22, 2020

Conversation

alexandreBN
Copy link
Contributor

This solution refers to which of the apps?

A/1# - SSType
A/4# - ViniJR Blog

Did you test your changes? What commands did you run?

Yes, in each application was inserted files to test if application is vulnerable to the attack narrative.

cd secDevLabs/owasp-top10-2017-apps/a1/sstype
make check-sec

cd secDevLabs/owasp-top10-2017-apps/a4/vinijr-blog
make check-sec

@Krlier Krlier added the enhancement 🚀 New feature or request label Oct 15, 2020
@alexandreBN
Copy link
Contributor Author

Hi @Krlier,

Can you link this PR to #433 issue and review this PR?

Copy link
Contributor

@Krlier Krlier left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nice job, @alexandreBN! Thanks so much for this contribution! 🚀

If you, or anyone else, would like to work on creating more validation scripts, I'll reopen the issue with more details.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement 🚀 New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Create scripts to validade if an app is still vulnerable to the attack narrative
2 participants