-
Updated
Sep 4, 2020
threat-modeling
Here are 59 public repositories matching this topic...
-
Updated
Oct 11, 2020
-
Updated
Sep 30, 2020 - Dockerfile
-
Updated
Feb 7, 2019
-
Updated
Aug 10, 2020 - Python
-
Updated
Feb 27, 2020
-
Updated
Oct 4, 2020 - Python
-
Updated
Sep 14, 2020
-
Updated
Oct 13, 2020 - Python
-
Updated
Sep 22, 2020 - C#
-
Updated
Oct 1, 2020
-
Updated
Aug 2, 2019
Apply OWASP ZAProxy on merge
It would be good to run OWASP ZAProxy on Threat Dragon
Solution
ZAP can be run from github:
https://www.zaproxy.org/blog/2020-04-09-automate-security-testing-with-zap-and-github-actions/
-
Updated
Oct 3, 2020 - Jupyter Notebook
-
Updated
Jul 3, 2018 - Gherkin
-
Updated
Dec 29, 2019
-
Updated
Sep 3, 2019
-
Updated
Oct 7, 2020 - JavaScript
-
Updated
Oct 9, 2018
-
Updated
Oct 14, 2020 - CSS
-
Updated
Oct 13, 2020 - JavaScript
-
Updated
Oct 12, 2020 - Java
-
Updated
Oct 6, 2018
-
Updated
Mar 21, 2019 - Python
-
Updated
Oct 9, 2018
-
Updated
Aug 2, 2019
-
Updated
Oct 6, 2020 - Python
-
Updated
Apr 13, 2020
Improve this page
Add a description, image, and links to the threat-modeling topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the threat-modeling topic, visit your repo's landing page and select "manage topics."
"AA03": { "description": "Weakness in SSO Authorization", "source": (Process, Element), "target": (Process, Server), "condition": "target.implementsAuthenticationScheme is False", },What if the Process implements BasicAuth or uses mutual TLS (neither of which is SSO)?
If the Process uses SAML or OAuth, then maybe.
Maybe authenticationScheme as a string var is neces