-
Updated
Mar 23, 2021 - Python
appsec
Here are 137 public repositories matching this topic...
-
Updated
Mar 15, 2021 - Python
-
Updated
Mar 18, 2021 - Python
-
Updated
Mar 11, 2021 - Ruby
-
Updated
Jul 19, 2020 - Shell
What's the issue?
Overwritten test scenario, can be summarized and link to payload lists from other repos
How do we solve it?
Chop down the content to the required and needed information, link to payload lists instead of enumerating all possible usernames and passwords, provide further guidance on how to test.
If no one is up to handle it, I can take care of it
-
Updated
Jun 11, 2019
Current Behavior:
When viewing vulns in the Audit Vulnerabilities tab. the Analysis column appears to contain code (enum?) names, e.g. NOT_SET, FALSE_POSITIVE. This problem also occurs in Policy Violations tab.
Steps to Reproduce:
Open the Audit Vulnerabilities tab.
Expected Behavior:
The Analysis column contains language specific analysis values, e.g. Not Set, False Positive
-
Updated
Mar 2, 2021 - HTML
Authentication via Azure/aad-pod-identity for keyvault access could be a good feature to avoid use of clientId/ clientSecret in chart values. Don't you think ?
-
Updated
Mar 22, 2021
-
Updated
Mar 24, 2021 - Java
https://github.com/OWASP/www-community/blob/master/pages/CRV2_AppThreatModeling.md
Contains a bunch of HTML based tables that need attention. They did not auto-migrate well and at a certain point break the rendering of the majority of the page.
-
Updated
Oct 16, 2019 - Go
-
Updated
Mar 24, 2021 - HTML
-
Updated
Mar 8, 2021 - Dockerfile
-
Updated
Aug 7, 2020
It will be a fun exercise to make scan work for mono repos such as https://github.com/swapnil-linux/spring-boot-examples
In theory, this can be achieved using a bit of bash with the new scan AppImage.
Description
GoReport card is reporting issues:
https://goreportcard.com/report/github.com/Checkmarx/kics#golint
https://goreportcard.com/report/github.com/Checkmarx/kics#ineffassign
-
Updated
Oct 1, 2020
If HTTP sites (is not HTTPS ones) use the Access-Control-Allow-Origin header then the site will typically not work.
ZAP should automatically fix this header.
https://stackoverflow.com/questions/61940616/how-do-i-work-with-http-sites-using-the-hud-in-owasps-zap-proxy
-
Updated
Mar 22, 2021 - Scala
-
Updated
Mar 24, 2019 - Python
-
Updated
Mar 1, 2021 - Python
-
Updated
Mar 6, 2021 - Python
-
Updated
Nov 23, 2020 - Java
-
Updated
Sep 23, 2020
-
Updated
Mar 5, 2021 - Java
Improve this page
Add a description, image, and links to the appsec topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the appsec topic, visit your repo's landing page and select "manage topics."
Background:
This is logged on the back of the discussion with the ZAP team about the current behaviour of XML External Entity Attack scanner. There were two concerns raised in this discussion. I am creating seperate tickets for them as they can be addressed independent of each other. F