-
Updated
May 17, 2021 - Python
appsec
Here are 148 public repositories matching this topic...
-
Updated
May 19, 2021 - Python
-
Updated
May 18, 2021 - TypeScript
-
Updated
Mar 18, 2021 - Python
-
Updated
Mar 11, 2021 - Ruby
-
Updated
Apr 22, 2021 - Shell
What's the issue?
Overwritten test scenario, can be summarized and link to payload lists from other repos
How do we solve it?
Chop down the content to the required and needed information, link to payload lists instead of enumerating all possible usernames and passwords, provide further guidance on how to test.
If no one is up to handle it, I can take care of it
-
Updated
Jun 11, 2019
Current Behavior:
When viewing vulns in the Audit Vulnerabilities tab. the Analysis column appears to contain code (enum?) names, e.g. NOT_SET, FALSE_POSITIVE. This problem also occurs in Policy Violations tab.
Steps to Reproduce:
Open the Audit Vulnerabilities tab.
Expected Behavior:
The Analysis column contains language specific analysis values, e.g. Not Set, False Positive
Authentication via Azure/aad-pod-identity for keyvault access could be a good feature to avoid use of clientId/ clientSecret in chart values. Don't you think ?
-
Updated
May 19, 2021 - HTML
-
Updated
May 19, 2021 - Java
-
Updated
Mar 22, 2021
https://github.com/OWASP/www-community/blob/master/pages/CRV2_AppThreatModeling.md
Contains a bunch of HTML based tables that need attention. They did not auto-migrate well and at a certain point break the rendering of the majority of the page.
-
Updated
May 19, 2021 - Open Policy Agent
-
Updated
Oct 16, 2019 - Go
-
Updated
Apr 27, 2021 - Dockerfile
-
Updated
May 17, 2021 - HTML
-
Updated
Aug 7, 2020
rush.js build errors
Seeing the below error while installing rush.js. Probably might need a package in the base image. Any help would be appreciated.
#21 516.9 > keytar@7.6.0 install /usr/local/lib/node_modules/@microsoft/rush/node_modules/keytar
#21 516.9 > prebuild-install || npm run build
#21 516.9
#21 521.6 prebuild-install WARN install No prebuilt binaries found (target=14.16.0 runtime=node arch=arm64
-
Updated
Oct 1, 2020
If HTTP sites (is not HTTPS ones) use the Access-Control-Allow-Origin header then the site will typically not work.
ZAP should automatically fix this header.
https://stackoverflow.com/questions/61940616/how-do-i-work-with-http-sites-using-the-hud-in-owasps-zap-proxy
-
Updated
Mar 24, 2019 - Python
-
Updated
May 14, 2021 - Scala
-
Updated
Apr 30, 2021 - Python
-
Updated
Mar 6, 2021 - Python
-
Updated
May 13, 2021 - Java
-
Updated
Sep 23, 2020
-
Updated
May 17, 2021 - JavaScript
Improve this page
Add a description, image, and links to the appsec topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the appsec topic, visit your repo's landing page and select "manage topics."
PoC: explore (spider) Juice Shop.
This rule will raise 3 alerts for Java detcted but in each case its matching
classin a JavaScript file.The rule shouldnt try to perform this match in JavaScript files, maybe not do any of the source code checks in these?
Code: https://github.com/zaproxy/zap-extensions/blob/master/addOns/pscanrulesAlpha/src/main/java/org/zaproxy/zap/extension/pscanrule