-
-
# Describe the feature
The CI pipeline could integrate static security analysis on the (`Cluster`)`Roles` that the operator would run with.
# What would the new user story look like?
As a mai…
-
**Slack us first!**
The easiest and fastest way to help you is via Slack. There's a free and easy signup to join our #defectdojo channel in the OWASP Slack workspace: [Get Access.](https://owasp-slac…
-
- [x] What is the OWASP Top 10
- [x] What tools can be used to test the security
-
**Is your feature request related to a problem? Please describe.**
I'd would like to prevent SQL injection in stored procedures.
**Describe the solution you'd like**
It would be good if semgrep s…
-
**Analysis**
The containers actually created and used are used only for potential development. As such the risk is very limited.
**Description**
The Docker container requests the `NET_RAW` ca…
-
- [ ] Come up with 5 most important tests to have in system by Tue EOD
- [ ] Reasoning why you are picking these 5 by Tue EOD
- [ ] Implemetation of these 5 actions by Wed EOD
-
### Describe the false alarm that Slither raise and how you know it's inaccurate:
I have a function F in contract A, that can only be called from contract B.
Slither marks some lines of F as possibl…
-
http://blog.diniscruz.com/2013/12/trying-to-add-evil-bit-to.html (find more up-to-date content)
As a great example of the kind of 'advanced research' that should be done by AppSec teams + Security Ch…
-
### Bug Report
| Q | A
|------------ | ------
| Version(s) | 3.2.0
#### Summary
PhpDoc of Laminas\Mvc\Controller\AbstractActionController (or its base class Laminas\Mvc\Control…