-
-
Notifications
You must be signed in to change notification settings - Fork 92
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
systematic security review(s) #318
Comments
Google led me to ZAP: https://www.zaproxy.org/ GitHub has suppport: https://github.com/marketplace/actions/owasp-zap-baseline-scan ZAP can be installed and run against the built-in server. The test wiki had auto registration turned off, one item with one bad link. ZAP found 9 alerts: 5 medium risk, 3 low risk, 1 informational.
Any suggestions for a better tool? |
I have a similiar issue in my project, a colleague mentioned there https://w3af.org/ |
From what I've read, ZAP looks good (I haven't tested it). The new URL for the ZAP basic scan is https://github.com/marketplace/actions/zap-baseline-scan. Additionally, we can do a static security code analysis, e.g. with 'bandit'. See https://bandit.readthedocs.io. I tested 'bandit' using config from https://github.com/codefactor-io/default-configs/blob/master/.bandit.yml and an additional line in
This results in 13 issues, see the summary section in the report:
|
Further issues related to 'bandit' findings are documented in #1820. |
Original report by Thomas Waldmann (Bitbucket: thomaswaldmann, GitHub: thomaswaldmann).
Some hints (not everything applies to Python, but you get the idea):
http://cwe.mitre.org/top25/index.html
The text was updated successfully, but these errors were encountered: