<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Foobar</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Foobar"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Foobar"/>
		<updated>2026-05-07T05:41:20Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=249265</id>
		<title>GSoC2019 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=249265"/>
				<updated>2019-03-25T07:00:31Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* OWASP-SKF */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP-SKF==&lt;br /&gt;
&lt;br /&gt;
=== Idea 1 Improving the Machine Learning chatbot: ===&lt;br /&gt;
We want to extend the functionality of SKF Bot. (Security Knowledge Framework Chatbot):&lt;br /&gt;
&lt;br /&gt;
Some improvements or the suggestions which we can do to improve the functionality are:&lt;br /&gt;
&lt;br /&gt;
1.    Create a desktop version of the chatbot. Where people can install the setup file on their local machine.&lt;br /&gt;
&lt;br /&gt;
2.    Create a Plugin or website bot which we can add in the website for better chat experience for the user.&lt;br /&gt;
&lt;br /&gt;
3.    Extend the bots capability to do the google search (using web scraping) for the things which are not available in the database. So, it will have a wider scope of knowledge.&lt;br /&gt;
&lt;br /&gt;
4.    Add basic conversation flow which makes SKF Bot friendly and provides the better user experience. Example: Replies to the general queries like How are you? What is your Name etc?&lt;br /&gt;
&lt;br /&gt;
5.    Extend the bot capability to reply to what security controls should be followed from the ASVS and MASVS or other custom checklists that are present in SKF.&lt;br /&gt;
# Extend the bot to different platforms like Facebook, telegram, slack, Google Assistant etc.&lt;br /&gt;
Existing chatbot implementation is on Gitter. You can test the bot by typing @skfchatbot on Gitter Community.&lt;br /&gt;
&lt;br /&gt;
'''Getting started:'''&lt;br /&gt;
&lt;br /&gt;
·         Get familiar with the architecture and code base of SKF (Security Knowledge Framework)&lt;br /&gt;
&lt;br /&gt;
·         Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
&lt;br /&gt;
·         Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
·         Python 3+, Flask, Coffee Script&lt;br /&gt;
&lt;br /&gt;
'''Mentors and Leaders'''&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Priyanka Jain (Mentor)&lt;br /&gt;
&lt;br /&gt;
=== Idea 2 Improving and building Lab challenges and write-ups: ===&lt;br /&gt;
Build lab examples and write-ups (how to test) for different vulnerabilities over different technology stacks. These challenges are to be delivered in Docker so they can be &lt;br /&gt;
&lt;br /&gt;
easily deployed.&lt;br /&gt;
&lt;br /&gt;
In the current situation the security knowledge framework ultimately presents a list of security controls with correlating knowledge base items that contain a description and &lt;br /&gt;
&lt;br /&gt;
a solution. The new labs are used to give the software developers or application security specialists a more in depth understanding and approach on how to test the &lt;br /&gt;
&lt;br /&gt;
vulnerabilities in their own code.  &lt;br /&gt;
* For example we have now around 20 lab challenges in Docker container build in Python:&lt;br /&gt;
** A Local File Inclusion Docker app example:&lt;br /&gt;
*** https://github.com/blabla1337/skf-labs/tree/master/LFI&lt;br /&gt;
** A write-up example:&lt;br /&gt;
*** https://owasp-skf.gitbook.io/asvs-write-ups/filename-injection&lt;br /&gt;
The images that are pushed to the Github repository are already automatically build and pushed to a docker registry where the SKF users can easily pull the images from to get their&lt;br /&gt;
&lt;br /&gt;
labs running. Of course they can download it and build it themselves from source by pulling the original repository.  &lt;br /&gt;
&lt;br /&gt;
=== Idea 3 Addition of exploitation framework + labs + challenges and write ups ===&lt;br /&gt;
The proposal for SKF (Security Knowledge Framework) involves addition of “Exploit Development Framework” , the idea revolves around how does one start with Linux exploit development from basic string format attacks to advance buffer overflows.&lt;br /&gt;
&lt;br /&gt;
The idea is to develop an addition (framework) which intergrates SKF, that now gives you an hands on experience for writing exploit code deployed over various containers with the help of dockers for easy and instant deployment.&lt;br /&gt;
&lt;br /&gt;
The framework will involve a browser based environmental (shell) and inbuilt chat utility that will be guiding you on how to go from an absolute beginner with gdb basics to all the way to how to bypass various protections like ASLR/NX/Canaries on Linux environment.&lt;br /&gt;
&lt;br /&gt;
Each challenge will have a dedicated container to easily maintain various challenges, also it will give you an option to connect to binary running on a particular port if you want to access it via your own machine, and also the source to the vulnerable code. This idea gives user a flexibility to experiment with the idea and even automate the attacks in python via socket programs or user intermediate framework like pwntools.&lt;br /&gt;
&lt;br /&gt;
The whole idea of challenges isn’t limited to stack based buffer overflows, but includes various challenges like format string attacks, double frees, heap overflows and privilege escalations.&lt;br /&gt;
&lt;br /&gt;
Total number will be deploying 20 challenges, the whole idea isn’t limited to exploit development but also to try out some very advance exploitation techniques like blind ROPs and lots of experimentation.&lt;br /&gt;
&lt;br /&gt;
The whole add on also comes with a dedicated document with very well written ways to exploit challenges in various flavours like manual, automated, advanced.&lt;br /&gt;
&lt;br /&gt;
Upon completion of labs and write ups the NLP model can be trained now to know not just web, but also all about various languages like C / C++ coding best practices and risk involved with calls like free (); puts(); and not just only tell the theory on why is it bad but also train you and guide you why it is bad and how you can write an exploit from a vulnerable code.&lt;br /&gt;
&lt;br /&gt;
Upon completion of labs with ASLR turned off on (non ASLR) stages they can be turned on and lead to ROP with ASLR and even more challenging questions.&lt;br /&gt;
&lt;br /&gt;
'''Mentors and Leaders'''  &lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Priyanka Jain (Mentor, SKF Contributor)&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
OWASP DefectDojo is a popular open source vulnerability management tool and is used as the backbone for security programs. It is easy to get started with to work on! We welcome volunteers of all experience levels and are happy to provide mentorship.&lt;br /&gt;
&lt;br /&gt;
'''Issue Tracking:'''&lt;br /&gt;
&lt;br /&gt;
Enhancement [https://github.com/DefectDojo/django-DefectDojo/issues?q=is%3Aissue+is%3Aopen+label%3Aenhancement requests] and [https://github.com/DefectDojo/django-DefectDojo/issues?q=is%3Aissue+is%3Aopen+label%3Abug bugfixes] are located in Github issues. This project could implement a whole bunch of new features one by one and release them over the course of several small releases. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 5 or more new features or functional enhancements of significant scope for OWASP DefectDojo&lt;br /&gt;
* Each feature comes with full functional unit and integration tests&lt;br /&gt;
'''Getting started:'''&lt;br /&gt;
* Get familiar with the architecture and code base of the application built on Django&lt;br /&gt;
* Review the application functionality and familiarize yourself with Products, Engagements, Tests and Findings.&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python, Django, Javascript, Unit/Integration testing.&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[Mailto:aaron.weaver2+gsoc@gmail.com|Aaron Weaver]] - DefectDojo Project Leader&lt;br /&gt;
* [[Mailto:greg.anderson@owasp.org|Greg Anderson]] - DefectDojo Project Leader&lt;br /&gt;
* [[Mailto:matt.tesauro@owasp.org|Matt Tesauro]] - DefectDojo Project Leader&lt;br /&gt;
'''Option 1: Unit Tests - Difficulty: Easy'''&lt;br /&gt;
* If you're new to programming, unit tests are short scripts designed to test a specific function of an application.&lt;br /&gt;
* The project needs additional unit tests to ensure that new code functions properly. &lt;br /&gt;
* Review the current [https://github.com/DefectDojo/django-DefectDojo/tree/dev/dojo/unittests unit tests]  &lt;br /&gt;
* Complete Code Coverage Testing&lt;br /&gt;
** Validate Tests exist for the following (create any that are missing):&lt;br /&gt;
*** Finding, Test, Engagement, Reports, Endpoints &lt;br /&gt;
*** Import from all scanners &lt;br /&gt;
'''Option 2: Python3 Completion'''&lt;br /&gt;
* DefectDojo is finishing up a migration to Python3&lt;br /&gt;
Test the current [https://github.com/DefectDojo/django-DefectDojo/tree/python3/dojo/unittests state] of Python3&lt;br /&gt;
* Ensure all features work&lt;br /&gt;
* Travis testing works correctly&lt;br /&gt;
'''Option 3: Scan 2.0 / Launch Containers'''&lt;br /&gt;
&lt;br /&gt;
Scan 2.0 consists of automating the scanning orchestration within DefectDojo. Several proof of concepts exist for this using the AppSecpPipeline to launch containers and then push those finding into the appropriate product. &lt;br /&gt;
* Use the [https://github.com/appsecpipeline/AppSecPipeline-Specification AppSecPipeline] containers to build a scanning pipeline built on top of [https://www.openfaas.com/ OpenFaaS]&lt;br /&gt;
* Scans should be able to be scheduled by DefectDojo and then invoked via the REST API call to OpenFaaS&lt;br /&gt;
* Upon scan completion the results will be posted back to DefectDojo via DefectDojo's REST API and consumed as an engagement/test.&lt;br /&gt;
* Pick 2 or 3 popular open source scanners such as NMAP, ZAP and Nikto to start out with.&lt;br /&gt;
&lt;br /&gt;
== OHP (OWASP Honeypot) ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Python_Honeypot|OWASP Honeypot]] is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
=== Getting Start ===&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to adding more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
=== Technologies ===&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
&lt;br /&gt;
* Zero Bugs: Currently we may have several bugs in different conditions, and it's best to test the all functions and fix them&lt;br /&gt;
* Monitoring: Right now monitoring limited to the connections (send&amp;amp;recieve) and it's best to store and analysis the contents for farther investigations and recognizing incoming attacks.&lt;br /&gt;
* Duplicated codes: codes are complicated and duplicated in engine, should be fixed/clean up&lt;br /&gt;
* New modules: add some creative ICS/Network/Web modules andvulnerable web applications, services and stuff&lt;br /&gt;
* API: update API sync to all features&lt;br /&gt;
* WebUI: Demonstrate and add API on WebUI and Live version with all features&lt;br /&gt;
* WebUI Special Reports: Track the attacks more creative and provide high risk IPs&lt;br /&gt;
* Database: Better database structure, faster and use queue&lt;br /&gt;
* Data analysis: Analysis stored data and attack signatures&lt;br /&gt;
* OWASP Top 10: Preparing useful processed/raw data for OWASP top 10 project&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Packet Analysis &amp;amp; Tshark &amp;amp; Libpcap&lt;br /&gt;
* Docker&lt;br /&gt;
* Database&lt;br /&gt;
* Web Development Skills&lt;br /&gt;
* Honeypot and Deception knowledge&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Reza Espargham](Mentor)&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi] (Mentor)&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and Angular. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the potential mentors (@bkimminich, @J12934 and @CaptainFreak) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Feature Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new functionality and &amp;quot;business&amp;quot; features are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Afeature GitHub issues labeled &amp;quot;feature&amp;quot;]. This project could implement a whole bunch of new features one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
''Coming up with good additional ideas for features and new functionality in the proposal could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 5 or more new features or functional enhancements of significant scope for OWASP Juice Shop (not necessarily including corresponding challenges)&lt;br /&gt;
* Each feature comes with full functional unit and integration tests&lt;br /&gt;
* Extending the functional walk-through chapter of the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, security knowledge is optional.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Juice Shop Mobile ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
A complete mobile client for Juice-Shop API which will serve a legit mobile experience for Juice-Shop user as well as a plethora of Mobile app vulnerabilities and challenges around them to solve. Should in the best case translate the idea of Juice Shop's hacking challenges with a score board and success notifications into the mobile world.&lt;br /&gt;
&lt;br /&gt;
''Coming up with a sophisticated proposal (optimally even with a good initial sample implementation) could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's RESTful backend&lt;br /&gt;
* Get familiar with Native App developement&lt;br /&gt;
* Get familiar with Mobile vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A mobile App with consistent UI/UX for Juice-Shop with standard client side vulnerabilities.&lt;br /&gt;
* Sufficient initial release quality (en par with Juice Shop and Juice Shop CTF) to make it an official extension project hosted in its own GitHub repository ''bkimminich/juice-shop-mobile''&lt;br /&gt;
* Code follows existing styleguides and applies similar quality gates regarding code smells, test coverage etc. as the main project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) React Native and NodeJS/Express, some Mobile security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
''Coming up with good additional ideas for challenges in the proposal could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges)&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Hacking Instructor ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
While the Juice Shop is offering a lot of long-lasting motivation and challenges for security experts, it might be a bit daunting for newcomers and less experienced hackers.&lt;br /&gt;
The &amp;quot;Hacking Instructor&amp;quot; as sketched in [https://github.com/bkimminich/juice-shop/issues/440 GitHub issue #440] could guide users from this target audience through at least some of the hacking challenges. As this would be an entirely new and relatively independent feature of the Juice Shop, students should be able to bring in their own creativity and ideas a lot.&lt;br /&gt;
&lt;br /&gt;
''For this project, a good proposal with a design &amp;amp; implementation proposal more sophisticated than the rough ideas in [https://github.com/bkimminich/juice-shop/issues/440 #440] is paramount to be selected as a student!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A working implementation of e.g. an avatar-style &amp;quot;Hacking Instructor&amp;quot; or other solution based on the students own proposal&lt;br /&gt;
* Coverage of at least the trivial (1-star) and some easy (2-star) challenges&lt;br /&gt;
* Documentation how to configure or script the &amp;quot;Hacking Instructor&amp;quot; for challenges in general&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular, some UI/UX experience would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP-Securetea Tools Project ==&lt;br /&gt;
The OWASP SecureTea Project is an application designed to help secure a person's laptop or computer / server with IoT (Internet Of Things) and notify users (via various communication mechanisms), whenever someone accesses their computer / server. This application uses the touchpad/mouse/wireless mouse to determine activity and is developed in Python and tested on various machines (Linux, Mac &amp;amp; Windows).&lt;br /&gt;
The software is still under development, and will eventually have it's own IDS(Intrusion Detection System) / IPS(Instrusion Prevention System), firewall, anti-virus, intelligent log monitoring capabilities with web defacement detection, and support for much more communication medium.&lt;br /&gt;
. -&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project/blob/master/README.md&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
We are looking any awesome idea to improve Securetea Project that is not on this list? We are expecting make this project will be useful to everyone to secure their Small IoT. &lt;br /&gt;
&lt;br /&gt;
===Idea===&lt;br /&gt;
Below roadmap and expect  results you can choose to improve Securetea Project . &lt;br /&gt;
if any bugs please help to fix it&lt;br /&gt;
&lt;br /&gt;
===Roadmap=== &lt;br /&gt;
See Our Roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project#roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Expect  Results ===&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Protection /firewall&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Antivirus&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Whatsapp&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by SMS Alerts&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Line&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Telegram&amp;lt;br&amp;gt;&lt;br /&gt;
Intelligent Log Monitoring  include Web Deface Detection&amp;lt;br&amp;gt;&lt;br /&gt;
Detection of malicious devices &amp;lt;br&amp;gt;&lt;br /&gt;
Login History&amp;lt;br&amp;gt;&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Javascript &lt;br /&gt;
* Angular and NodeJS/Express&lt;br /&gt;
* Database&lt;br /&gt;
* Linux&lt;br /&gt;
&lt;br /&gt;
=== Mentors === &lt;br /&gt;
&lt;br /&gt;
* [mailto:ade.putra@owasp.org Ade Yoseman Putra] - (OWASP Securetea Project Leader) &amp;lt;br&amp;gt;&lt;br /&gt;
* [mailto:rejah.rehim@owasp.org Rejah Rehim.A.A]]- (OWASP Securetea Project Leader)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Passive Online scanner improvements ===&lt;br /&gt;
'''Brief Explanation'''&lt;br /&gt;
&lt;br /&gt;
OWTF allows many passive tests, such as those using third party websites like Google, Bing, etc. searches, as well as handy &amp;quot;Search for vulnerability&amp;quot; search boxes (i.e. Fingerprinting plugin). This feature involves the creation of a '''script''' that produces an interactive OWTF report with the intention of hosting it in the github.io site. The idea here is to have a passive, JavaScript-only interactive report available on the owtf.github.io site, so that people can try OWTF '''without installing anything''', simply visiting a URL.&lt;br /&gt;
&lt;br /&gt;
This would be a normal OWTF interactive report where the user can:&lt;br /&gt;
* Enter a target&lt;br /&gt;
* Try passive plugins (only the parts that use no tools)&lt;br /&gt;
* Play with boilerplate templates from the OWTF interactive report&lt;br /&gt;
An old version of the passive online scanner is hosted at https://owtf.github.io/online-passive-scanner.&lt;br /&gt;
&lt;br /&gt;
'''LEGAL CLARIFICATION (Just in case!)''': The passive online scanner, simply makes OWTF passive testing '''through third party websites''' more accessible to anybody, however it is the user that must 1) click the link manually + 2) do something bad with that afterwards + 3) doing 1 + 2 WITHOUT permission :). Therefore this passive online scanner does not do anything illegal [http://www.slideshare.net/abrahamaranguren/legal-and-efficient-web-app-testing-without-permission More information about why this is not illegal here] (recommended reading!)&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code]/ES6 JavaScript code in all modified code and surrounding areas.'''&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
A good knowledge of JavaScript and writing ES6 compliant React/TypeScript is needed. Previous exposure to security concepts and penetration testing is not required but recommended and some lack of this can be compensated with pre-GSoC involvement and will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP iGoat (draft) ==&lt;br /&gt;
'''Idea 1:''' Completing OWASP iGoat documentation at https://docs.igoatapp.com/ and creating demo videos at for OWASP iGoat YouTube channel for learning purpose.&lt;br /&gt;
&lt;br /&gt;
'''Idea 2:''' Adding new challenge pack / CTF for iGoat. It should be one point solution for learning iOS app security&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid ==&lt;br /&gt;
[[OWASP SeraphimDroid Project|OWASP Seraphimdroid]] is Android security and privacy app, with features to enhance user's knowledge about security and privacy on his/her mobile device. If you are interested in this project and working on it during Google Summer of Code, please contact [[User:Nikola Milosevic|Nikola Milosevic]] and express your interest.&lt;br /&gt;
&lt;br /&gt;
=== Idea 1: Anomaly detection of device state ===&lt;br /&gt;
The idea is that certain features of a device would be constantly monitored (battery use, internet usage, opp calls, etc.). Initially, the usual behaviour of the device would be learned. Later, anomalies normal behavior would be reported to the user. This should involve some explanations, such as which applications are causing an anomaly the device behaviors &lt;br /&gt;
&lt;br /&gt;
=== Idea 2: On device machine learning of maliciousness of an app ===&lt;br /&gt;
Tensor-flow for on-device processing and some other libraries have been released that enable machine learning. We have previously applied a system, that based on permissions, is able to distinguish malicious apps from non-malicious. Now, we would like to learn also from other outputs and things one can monitor about application whether it can be malicious. &lt;br /&gt;
&lt;br /&gt;
=== Idea 3:  Enhansing privacy features ===&lt;br /&gt;
The vision of Seraphimdroid is to be aware of privacy threats. This may be achieved throug knowing which applications are using user accounts or other information that uthe user has on phone to send to the server, or just by knowing which applications may be doing it. Knowledgebase shouldbbeextending with the suggestions on how to improve privacy. Also, automated settings of various apps to use encryption should be proposed.&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
=== Active Scanning WebSockets ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesn't currently support active scanning (automated attacking) of websocket traffic (messages).&lt;br /&gt;
: We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* An pluggable infrastructure that allows us to active scan websockets&lt;br /&gt;
:* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
:* Implementing new websocket specific scan rules&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated Authentication Detection and Configuration ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
: This is time consuming and error prone.&lt;br /&gt;
: Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* Detect login and registration pages&lt;br /&gt;
:* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
:* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== IoT Goat ==&lt;br /&gt;
IoT Goat will be a deliberately insecure firmware based on OpenWrt. The project’s goal is to teach users about the most common vulnerabilities typically found in IoT devices. The vulnerabilities will be based on the [https://www.owasp.org/images/1/1c/OWASP-IoT-Top-10-2018-final.pdf IoT Top 10 2018]. &lt;br /&gt;
&lt;br /&gt;
===Idea 1: Insecure firmware web application ecosystem===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
A vulnerable web application, and backend API/web services deployed in OpenWrt containing critical vulnerabilities showcasing the traditional IoT problems.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Have a look at the getting started page to get familiar with virtualizing OpenWrt: https://github.com/scriptingxss/IoTGoat#-getting-started-&lt;br /&gt;
* Create a GitHub account to be added as a collaborator to the repository&lt;br /&gt;
* Review the example vulnerabilities and challenges: https://github.com/scriptingxss/IoTGoat/blob/master/challenges/challenges.md&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Development of a simple web application user interface with web services and API's deployed locally on the OpenWrt firmware. Documented challenges of how to discover and remediate web software security vulnerabilities. The insecure web application services must contain the following vulnerabilities to be used with the IoT testing guide: &lt;br /&gt;
* Command injection&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Local file inclusion &lt;br /&gt;
* XXE injection,Insufficient Authentication&lt;br /&gt;
* Transfer sensitive data using insecure channels&lt;br /&gt;
* Store sensitive data insecurely&lt;br /&gt;
Vulnerable SOAP web services and REST API implementations are in-scope. &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Working Linux knowledge&lt;br /&gt;
* Embedded and/or web development (nice to have)&lt;br /&gt;
** Web application code can be developed using the following common embedded programming languages:&lt;br /&gt;
*** Lua&lt;br /&gt;
*** PHP&lt;br /&gt;
*** C/C++&lt;br /&gt;
*** JavaScript&lt;br /&gt;
&lt;br /&gt;
===Idea 2: Insecure network services===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Deliberately insecure services configured within OpenWrt such as an miniupnp daemon configured with secure_mode off (Secure mode; client can only redirect an incoming port to the client itself (same IP as the request comes from), to demonstrate a port mapping attack where an attacker from inside the network exposes a service that typically should be behind a LAN to the internet). &lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Have a look at the getting started page to get familiar with virtualizing OpenWrt: https://github.com/scriptingxss/IoTGoat#-getting-started-&lt;br /&gt;
* Create a GitHub account to be added as a collaborator to the repository&lt;br /&gt;
* Review the example vulnerabilities and challenges: https://github.com/scriptingxss/IoTGoat/blob/master/challenges/challenges.md&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Documented challenges of how to discover and remediate insecure network service vulnerabilities. The network services can be inherently insecure or have insecure configurations that can be abused during the challenges.&lt;br /&gt;
* Example of network insecure services include:&lt;br /&gt;
** FTP&lt;br /&gt;
** Telnet&lt;br /&gt;
** miniupnpd&lt;br /&gt;
** HTTP&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Working Linux knowledge&lt;br /&gt;
* Network security&lt;br /&gt;
&lt;br /&gt;
===Idea 3: Insecure firmware build system===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Develop custom firmware builds of the latest OpenWrt version (18.06) demonstrating the process of incorporating debug services/tools, misconfigurations, and usage of vulnerable software packages. &lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Review OpenWrt's developer guide to get familiar with creating custom firmware builds&lt;br /&gt;
** https://openwrt.org/docs/guide-developer/start&lt;br /&gt;
** https://openwrt.org/docs/guide-developer/build-system/install-buildsystem&lt;br /&gt;
** https://github.com/openwrt/openwrt&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Provide walkthrough examples of insecure design choices for building firmware. &lt;br /&gt;
* Provide suggested mitigation security controls&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Working Linux knowledge&lt;br /&gt;
* Embedded development (C/C++)&lt;br /&gt;
&lt;br /&gt;
===Suggest your own ideas===&lt;br /&gt;
You may suggest additional challenges or ideas that fit this project's objectives.&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
* Aaron Guzman - OWASP IoT Goat Contributor (Project leader of the IoT and Embedded AppSec project)&lt;br /&gt;
* Fotios Chantzis - OWASP IoT Goat Contributor (and former GSoC Student/GSoc Mentor)&lt;br /&gt;
* [[User:Calderpwn|Paulino Calderon]] - OWASP IoT Goat Contributor (and former GSoC 2011 Student/GSoc Mentor in 2015 and 2017)&lt;br /&gt;
&lt;br /&gt;
==OWASP Web Honeypot Project ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Honeypot Project is to identify emerging attacks against web applications and report them to the community, in order to facilitate protection against such targeted attacks. Within this project, Anglia Ruskin University is leading the collection, storage and analysis of threat intelligence data. &lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Honeypot_Project&lt;br /&gt;
&lt;br /&gt;
https://github.com/OWASP/Honeypot-Project/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The purpose of this part of the project is to capture intelligence on attacker activity against web applications and utilise this intelligence as ways to protect software against attacks. Honeypots are an established industry technique to provide a realistic target to entice a criminal, whilst encouraging them to divulge the tools and techniques they use during an attack. Like bees to a honeypot. These honeypots are safely designed to contain no information of monetary use to an attacker, and hence provide no risk to the businesses implementing them. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The project will create honeypots that the community can distribute within their own networks. With enough honeypots globally distributed, we will be in a position to aggregate attack techniques to better understand and protect against the techniques used by attackers. With this information, we will be in a position to create educational information, such as rules and strategies, that application writers can use to ensure that any detected bugs and vulnerabilities are closed. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Idea===&lt;br /&gt;
Project progression: &lt;br /&gt;
* Honeypot software. The honeypot software that is to be provided to the community to place in their networks has been written. Honeypots are available in a variety of forms, to make deployment as flexible as possible and appeal to a diverse a user set as possible.&lt;br /&gt;
* Collection software. The centralised collection software has been written and evaluated in a student driven proof-of-concept project. Honeypots have been attacked in a laboratory situation and have reported both the steps taken by the attacker and what they have attacked, back to the collection software.&lt;br /&gt;
* Rollout to the Community. The project now needs a dedicated infrastructure platform in place that is available to the entire community to start collecting intelligence back from community deployed honeypots. This infrastructure will run the collector software, analysis programmes and provide a portal for communicating our finds and recommendations back to the community in a meaningful manner.&lt;br /&gt;
* Going Forward. Toolkits and skills used by attackers do not stand still.  As existing bugs are plugged, others open. Follow up stages for the project will be to create a messaging system to automatically update the community on findings of significant risk in their existing code that requires attention. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Expect  Results ===&lt;br /&gt;
&lt;br /&gt;
Some of the ideas from last year's summit&lt;br /&gt;
&lt;br /&gt;
* Setup Proof of Concept to understand how Mod Security baed Honeypot/Probe interacts with a receiving console (develop a VM and/or Docker based test solution to store logs from multiple probes).&lt;br /&gt;
* Evaluate console options to visualise threat data received from ModSecurity Honeypots/probes in MosSecurity Audit Console, WAF-FLE, Fluent and bespoke scripts for single and multiple probes.&lt;br /&gt;
* Develop a mechanism to convert from stored MySQL to JSON format.&lt;br /&gt;
* Provide a mechanism to convert ModSecurity mlogc audit log output into JSON format.&lt;br /&gt;
* Provide a mechanism to convert mlogc audit log output directly into ELK (ElasticSearch/Logstash/Kibana) to visualise the data.&lt;br /&gt;
* Provide a mechanism to forward honest output into threat intelligence format such as STIX using something like the MISP project(https://www.misp-project.org) to share Threat data coming from the Honeypots making it easy to export/import data from formats such as STIX and TAXII., may require use of concurrent logs in a format that MISP can deal with.&lt;br /&gt;
* Consider new alternatives for log transfer including the use of MLOGC-NG or other possible approaches.&lt;br /&gt;
* Develop a new VM based honeypot/robe based on CRS v3.0.&lt;br /&gt;
* Develop new alternative small footprint honeypot/probe formats utilising Docker &amp;amp; Raspberry Pi.&lt;br /&gt;
* Develop machine learning approach to automatically be able to update the rule set being used by the probe based on cyber threat intelligence received.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
Some of the skills we are looking for:&lt;br /&gt;
&lt;br /&gt;
* Apache/Tomcat &lt;br /&gt;
* Any experience of MISP&lt;br /&gt;
* MySQL &amp;amp; JSON&lt;br /&gt;
* ELK &lt;br /&gt;
* STIX/TAXII&lt;br /&gt;
* Python&lt;br /&gt;
* ModSecurity/mlogc&lt;br /&gt;
* OWASP Core RuleSet (CRS)&lt;br /&gt;
* Linux&lt;br /&gt;
* VM/Docker&lt;br /&gt;
&lt;br /&gt;
=== Mentors === &lt;br /&gt;
&lt;br /&gt;
* [mailto:adrian.winckles@owasp.org Adrian Winckles] - (OWASP Web Honeypot Project Leader) &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Suggest your own ideas===&lt;br /&gt;
&lt;br /&gt;
You may suggest additional challenges or ideas that fit this project's objectives.&lt;br /&gt;
&lt;br /&gt;
==OWASP Risk Assessment Framework ==&lt;br /&gt;
Tool projects aim to assessment more than one or many web application using owasp risk rating mathodologies.&lt;br /&gt;
https://github.com/OWASP/RiskAssessmentFramework&lt;br /&gt;
&lt;br /&gt;
'''Idea 1:''' make dashboard with databases and can assess many website based owasp risk rating mathodologies, create graph  and report in pdf,word &amp;amp; excel format.&lt;br /&gt;
=== Mentors === &lt;br /&gt;
* [mailto:ade.putra@owasp.org Ade Yoseman] -  &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=249264</id>
		<title>GSoC2019 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=249264"/>
				<updated>2019-03-25T06:53:06Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* OWASP-SKF */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP-SKF==&lt;br /&gt;
&lt;br /&gt;
=== Idea 1 Improving the Machine Learning chatbot: ===&lt;br /&gt;
We want to extend the functionality of SKF Bot. (Security Knowledge Framework Chatbot):&lt;br /&gt;
&lt;br /&gt;
Some improvements or the suggestions which we can do to improve the functionality are:&lt;br /&gt;
&lt;br /&gt;
1.    Create a desktop version of the chatbot. Where people can install the setup file on their local machine.&lt;br /&gt;
&lt;br /&gt;
2.    Create a Plugin or website bot which we can add in the website for better chat experience for the user.&lt;br /&gt;
&lt;br /&gt;
3.    Extend the bots capability to do the google search (using web scraping) for the things which are not available in the database. So, it will have a wider scope of knowledge.&lt;br /&gt;
&lt;br /&gt;
4.    Add basic conversation flow which makes SKF Bot friendly and provides the better user experience. Example: Replies to the general queries like How are you? What is your Name etc?&lt;br /&gt;
&lt;br /&gt;
5.    Extend the bot capability to reply to what security controls should be followed from the ASVS and MASVS or other custom checklists that are present in SKF.&lt;br /&gt;
# Extend the bot to different platforms like Facebook, telegram, slack, Google Assistant etc.&lt;br /&gt;
Existing chatbot implementation is on Gitter. You can test the bot by typing @skfchatbot on Gitter Community.&lt;br /&gt;
&lt;br /&gt;
'''Getting started:'''&lt;br /&gt;
&lt;br /&gt;
·         Get familiar with the architecture and code base of SKF (Security Knowledge Framework)&lt;br /&gt;
&lt;br /&gt;
·         Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
&lt;br /&gt;
·         Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
·         Python 3+, Flask, Coffee Script&lt;br /&gt;
&lt;br /&gt;
'''Mentors and Leaders'''&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Priyanka Jain (Mentor)&lt;br /&gt;
&lt;br /&gt;
=== Idea 2 Improving and building Lab challenges and write-ups: ===&lt;br /&gt;
Build lab examples and write-ups (how to test) for different vulnerabilities over different technology stacks. These challenges are to be delivered in Docker so they can be &lt;br /&gt;
&lt;br /&gt;
easily deployed.&lt;br /&gt;
&lt;br /&gt;
In the current situation the security knowledge framework ultimately presents a list of security controls with correlating knowledge base items that contain a description and &lt;br /&gt;
&lt;br /&gt;
a solution. The new labs are used to give the software developers or application security specialists a more in depth understanding and approach on how to test the &lt;br /&gt;
&lt;br /&gt;
vulnerabilities in their own code.  &lt;br /&gt;
* For example we have now around 20 lab challenges in Docker container build in Python:&lt;br /&gt;
** A Local File Inclusion Docker app example:&lt;br /&gt;
*** https://github.com/blabla1337/skf-labs/tree/master/LFI&lt;br /&gt;
** A write-up example:&lt;br /&gt;
*** https://owasp-skf.gitbook.io/asvs-write-ups/filename-injection&lt;br /&gt;
The images that are pushed to the Github repository are already automatically build and pushed to a docker registry where the SKF users can easily pull the images from to get their&lt;br /&gt;
&lt;br /&gt;
labs running. Of course they can download it and build it themselves from source by pulling the original repository.  &lt;br /&gt;
&lt;br /&gt;
===== Idea 3 Addition of exploitation framework + labs + challenges and write ups =====&lt;br /&gt;
The proposal for SKF (Security Knowledge Framework) involves addition of “Exploit Development Framework” , the idea revolves around how does one start with Linux exploit development from basic string format attacks to advance buffer overflows.&lt;br /&gt;
&lt;br /&gt;
The idea is to develop an addition (framework) which intergrates SKF, that now gives you an hands on experience for writing exploit code deployed over various containers with the help of dockers for easy and instant deployment.&lt;br /&gt;
&lt;br /&gt;
The framework will involve a browser based environmental (shell) and inbuilt chat utility that will be guiding you on how to go from an absolute beginner with gdb basics to all the way to how to bypass various protections like ASLR/NX/Canaries on Linux environment.&lt;br /&gt;
&lt;br /&gt;
Each challenge will have a dedicated container to easily maintain various challenges, also it will give you an option to connect to binary running on a particular port if you want to access it via your own machine, and also the source to the vulnerable code. This idea gives user a flexibility to experiment with the idea and even automate the attacks in python via socket programs or user intermediate framework like pwntools.&lt;br /&gt;
&lt;br /&gt;
The whole idea of challenges isn’t limited to stack based buffer overflows, but includes various challenges like format string attacks, double frees, heap overflows and privilege escalations.&lt;br /&gt;
&lt;br /&gt;
Total number will be deploying 20 challenges, the whole idea isn’t limited to exploit development but also to try out some very advance exploitation techniques like blind ROPs and lots of experimentation.&lt;br /&gt;
&lt;br /&gt;
The whole add on also comes with a dedicated document with very well written ways to exploit challenges in various flavours like manual, automated, advanced.&lt;br /&gt;
&lt;br /&gt;
Upon completion of labs and write ups the NLP model can be trained now to know not just web, but also all about various languages like C / C++ coding best practices and risk involved with calls like free (); puts(); and not just only tell the theory on why is it bad but also train you and guide you why it is bad and how you can write an exploit from a vulnerable code.&lt;br /&gt;
&lt;br /&gt;
Upon completion of labs with ASLR turned off on (non ASLR) stages they can be turned on and lead to ROP with ASLR and even more challenging questions.&lt;br /&gt;
&lt;br /&gt;
'''Mentors and Leaders'''  &lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
OWASP DefectDojo is a popular open source vulnerability management tool and is used as the backbone for security programs. It is easy to get started with to work on! We welcome volunteers of all experience levels and are happy to provide mentorship.&lt;br /&gt;
&lt;br /&gt;
'''Issue Tracking:'''&lt;br /&gt;
&lt;br /&gt;
Enhancement [https://github.com/DefectDojo/django-DefectDojo/issues?q=is%3Aissue+is%3Aopen+label%3Aenhancement requests] and [https://github.com/DefectDojo/django-DefectDojo/issues?q=is%3Aissue+is%3Aopen+label%3Abug bugfixes] are located in Github issues. This project could implement a whole bunch of new features one by one and release them over the course of several small releases. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 5 or more new features or functional enhancements of significant scope for OWASP DefectDojo&lt;br /&gt;
* Each feature comes with full functional unit and integration tests&lt;br /&gt;
'''Getting started:'''&lt;br /&gt;
* Get familiar with the architecture and code base of the application built on Django&lt;br /&gt;
* Review the application functionality and familiarize yourself with Products, Engagements, Tests and Findings.&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python, Django, Javascript, Unit/Integration testing.&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[Mailto:aaron.weaver2+gsoc@gmail.com|Aaron Weaver]] - DefectDojo Project Leader&lt;br /&gt;
* [[Mailto:greg.anderson@owasp.org|Greg Anderson]] - DefectDojo Project Leader&lt;br /&gt;
* [[Mailto:matt.tesauro@owasp.org|Matt Tesauro]] - DefectDojo Project Leader&lt;br /&gt;
'''Option 1: Unit Tests - Difficulty: Easy'''&lt;br /&gt;
* If you're new to programming, unit tests are short scripts designed to test a specific function of an application.&lt;br /&gt;
* The project needs additional unit tests to ensure that new code functions properly. &lt;br /&gt;
* Review the current [https://github.com/DefectDojo/django-DefectDojo/tree/dev/dojo/unittests unit tests]  &lt;br /&gt;
* Complete Code Coverage Testing&lt;br /&gt;
** Validate Tests exist for the following (create any that are missing):&lt;br /&gt;
*** Finding, Test, Engagement, Reports, Endpoints &lt;br /&gt;
*** Import from all scanners &lt;br /&gt;
'''Option 2: Python3 Completion'''&lt;br /&gt;
* DefectDojo is finishing up a migration to Python3&lt;br /&gt;
Test the current [https://github.com/DefectDojo/django-DefectDojo/tree/python3/dojo/unittests state] of Python3&lt;br /&gt;
* Ensure all features work&lt;br /&gt;
* Travis testing works correctly&lt;br /&gt;
'''Option 3: Scan 2.0 / Launch Containers'''&lt;br /&gt;
&lt;br /&gt;
Scan 2.0 consists of automating the scanning orchestration within DefectDojo. Several proof of concepts exist for this using the AppSecpPipeline to launch containers and then push those finding into the appropriate product. &lt;br /&gt;
* Use the [https://github.com/appsecpipeline/AppSecPipeline-Specification AppSecPipeline] containers to build a scanning pipeline built on top of [https://www.openfaas.com/ OpenFaaS]&lt;br /&gt;
* Scans should be able to be scheduled by DefectDojo and then invoked via the REST API call to OpenFaaS&lt;br /&gt;
* Upon scan completion the results will be posted back to DefectDojo via DefectDojo's REST API and consumed as an engagement/test.&lt;br /&gt;
* Pick 2 or 3 popular open source scanners such as NMAP, ZAP and Nikto to start out with.&lt;br /&gt;
&lt;br /&gt;
== OHP (OWASP Honeypot) ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Python_Honeypot|OWASP Honeypot]] is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
=== Getting Start ===&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to adding more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
=== Technologies ===&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
&lt;br /&gt;
* Zero Bugs: Currently we may have several bugs in different conditions, and it's best to test the all functions and fix them&lt;br /&gt;
* Monitoring: Right now monitoring limited to the connections (send&amp;amp;recieve) and it's best to store and analysis the contents for farther investigations and recognizing incoming attacks.&lt;br /&gt;
* Duplicated codes: codes are complicated and duplicated in engine, should be fixed/clean up&lt;br /&gt;
* New modules: add some creative ICS/Network/Web modules andvulnerable web applications, services and stuff&lt;br /&gt;
* API: update API sync to all features&lt;br /&gt;
* WebUI: Demonstrate and add API on WebUI and Live version with all features&lt;br /&gt;
* WebUI Special Reports: Track the attacks more creative and provide high risk IPs&lt;br /&gt;
* Database: Better database structure, faster and use queue&lt;br /&gt;
* Data analysis: Analysis stored data and attack signatures&lt;br /&gt;
* OWASP Top 10: Preparing useful processed/raw data for OWASP top 10 project&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Packet Analysis &amp;amp; Tshark &amp;amp; Libpcap&lt;br /&gt;
* Docker&lt;br /&gt;
* Database&lt;br /&gt;
* Web Development Skills&lt;br /&gt;
* Honeypot and Deception knowledge&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Reza Espargham](Mentor)&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi] (Mentor)&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and Angular. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the potential mentors (@bkimminich, @J12934 and @CaptainFreak) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Feature Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new functionality and &amp;quot;business&amp;quot; features are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Afeature GitHub issues labeled &amp;quot;feature&amp;quot;]. This project could implement a whole bunch of new features one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
''Coming up with good additional ideas for features and new functionality in the proposal could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 5 or more new features or functional enhancements of significant scope for OWASP Juice Shop (not necessarily including corresponding challenges)&lt;br /&gt;
* Each feature comes with full functional unit and integration tests&lt;br /&gt;
* Extending the functional walk-through chapter of the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, security knowledge is optional.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Juice Shop Mobile ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
A complete mobile client for Juice-Shop API which will serve a legit mobile experience for Juice-Shop user as well as a plethora of Mobile app vulnerabilities and challenges around them to solve. Should in the best case translate the idea of Juice Shop's hacking challenges with a score board and success notifications into the mobile world.&lt;br /&gt;
&lt;br /&gt;
''Coming up with a sophisticated proposal (optimally even with a good initial sample implementation) could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's RESTful backend&lt;br /&gt;
* Get familiar with Native App developement&lt;br /&gt;
* Get familiar with Mobile vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A mobile App with consistent UI/UX for Juice-Shop with standard client side vulnerabilities.&lt;br /&gt;
* Sufficient initial release quality (en par with Juice Shop and Juice Shop CTF) to make it an official extension project hosted in its own GitHub repository ''bkimminich/juice-shop-mobile''&lt;br /&gt;
* Code follows existing styleguides and applies similar quality gates regarding code smells, test coverage etc. as the main project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) React Native and NodeJS/Express, some Mobile security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
''Coming up with good additional ideas for challenges in the proposal could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges)&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Hacking Instructor ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
While the Juice Shop is offering a lot of long-lasting motivation and challenges for security experts, it might be a bit daunting for newcomers and less experienced hackers.&lt;br /&gt;
The &amp;quot;Hacking Instructor&amp;quot; as sketched in [https://github.com/bkimminich/juice-shop/issues/440 GitHub issue #440] could guide users from this target audience through at least some of the hacking challenges. As this would be an entirely new and relatively independent feature of the Juice Shop, students should be able to bring in their own creativity and ideas a lot.&lt;br /&gt;
&lt;br /&gt;
''For this project, a good proposal with a design &amp;amp; implementation proposal more sophisticated than the rough ideas in [https://github.com/bkimminich/juice-shop/issues/440 #440] is paramount to be selected as a student!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A working implementation of e.g. an avatar-style &amp;quot;Hacking Instructor&amp;quot; or other solution based on the students own proposal&lt;br /&gt;
* Coverage of at least the trivial (1-star) and some easy (2-star) challenges&lt;br /&gt;
* Documentation how to configure or script the &amp;quot;Hacking Instructor&amp;quot; for challenges in general&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular, some UI/UX experience would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP-Securetea Tools Project ==&lt;br /&gt;
The OWASP SecureTea Project is an application designed to help secure a person's laptop or computer / server with IoT (Internet Of Things) and notify users (via various communication mechanisms), whenever someone accesses their computer / server. This application uses the touchpad/mouse/wireless mouse to determine activity and is developed in Python and tested on various machines (Linux, Mac &amp;amp; Windows).&lt;br /&gt;
The software is still under development, and will eventually have it's own IDS(Intrusion Detection System) / IPS(Instrusion Prevention System), firewall, anti-virus, intelligent log monitoring capabilities with web defacement detection, and support for much more communication medium.&lt;br /&gt;
. -&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project/blob/master/README.md&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
We are looking any awesome idea to improve Securetea Project that is not on this list? We are expecting make this project will be useful to everyone to secure their Small IoT. &lt;br /&gt;
&lt;br /&gt;
===Idea===&lt;br /&gt;
Below roadmap and expect  results you can choose to improve Securetea Project . &lt;br /&gt;
if any bugs please help to fix it&lt;br /&gt;
&lt;br /&gt;
===Roadmap=== &lt;br /&gt;
See Our Roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project#roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Expect  Results ===&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Protection /firewall&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Antivirus&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Whatsapp&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by SMS Alerts&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Line&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Telegram&amp;lt;br&amp;gt;&lt;br /&gt;
Intelligent Log Monitoring  include Web Deface Detection&amp;lt;br&amp;gt;&lt;br /&gt;
Detection of malicious devices &amp;lt;br&amp;gt;&lt;br /&gt;
Login History&amp;lt;br&amp;gt;&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Javascript &lt;br /&gt;
* Angular and NodeJS/Express&lt;br /&gt;
* Database&lt;br /&gt;
* Linux&lt;br /&gt;
&lt;br /&gt;
=== Mentors === &lt;br /&gt;
&lt;br /&gt;
* [mailto:ade.putra@owasp.org Ade Yoseman Putra] - (OWASP Securetea Project Leader) &amp;lt;br&amp;gt;&lt;br /&gt;
* [mailto:rejah.rehim@owasp.org Rejah Rehim.A.A]]- (OWASP Securetea Project Leader)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Passive Online scanner improvements ===&lt;br /&gt;
'''Brief Explanation'''&lt;br /&gt;
&lt;br /&gt;
OWTF allows many passive tests, such as those using third party websites like Google, Bing, etc. searches, as well as handy &amp;quot;Search for vulnerability&amp;quot; search boxes (i.e. Fingerprinting plugin). This feature involves the creation of a '''script''' that produces an interactive OWTF report with the intention of hosting it in the github.io site. The idea here is to have a passive, JavaScript-only interactive report available on the owtf.github.io site, so that people can try OWTF '''without installing anything''', simply visiting a URL.&lt;br /&gt;
&lt;br /&gt;
This would be a normal OWTF interactive report where the user can:&lt;br /&gt;
* Enter a target&lt;br /&gt;
* Try passive plugins (only the parts that use no tools)&lt;br /&gt;
* Play with boilerplate templates from the OWTF interactive report&lt;br /&gt;
An old version of the passive online scanner is hosted at https://owtf.github.io/online-passive-scanner.&lt;br /&gt;
&lt;br /&gt;
'''LEGAL CLARIFICATION (Just in case!)''': The passive online scanner, simply makes OWTF passive testing '''through third party websites''' more accessible to anybody, however it is the user that must 1) click the link manually + 2) do something bad with that afterwards + 3) doing 1 + 2 WITHOUT permission :). Therefore this passive online scanner does not do anything illegal [http://www.slideshare.net/abrahamaranguren/legal-and-efficient-web-app-testing-without-permission More information about why this is not illegal here] (recommended reading!)&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code]/ES6 JavaScript code in all modified code and surrounding areas.'''&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
A good knowledge of JavaScript and writing ES6 compliant React/TypeScript is needed. Previous exposure to security concepts and penetration testing is not required but recommended and some lack of this can be compensated with pre-GSoC involvement and will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP iGoat (draft) ==&lt;br /&gt;
'''Idea 1:''' Completing OWASP iGoat documentation at https://docs.igoatapp.com/ and creating demo videos at for OWASP iGoat YouTube channel for learning purpose.&lt;br /&gt;
&lt;br /&gt;
'''Idea 2:''' Adding new challenge pack / CTF for iGoat. It should be one point solution for learning iOS app security&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid ==&lt;br /&gt;
[[OWASP SeraphimDroid Project|OWASP Seraphimdroid]] is Android security and privacy app, with features to enhance user's knowledge about security and privacy on his/her mobile device. If you are interested in this project and working on it during Google Summer of Code, please contact [[User:Nikola Milosevic|Nikola Milosevic]] and express your interest.&lt;br /&gt;
&lt;br /&gt;
=== Idea 1: Anomaly detection of device state ===&lt;br /&gt;
The idea is that certain features of a device would be constantly monitored (battery use, internet usage, opp calls, etc.). Initially, the usual behaviour of the device would be learned. Later, anomalies normal behavior would be reported to the user. This should involve some explanations, such as which applications are causing an anomaly the device behaviors &lt;br /&gt;
&lt;br /&gt;
=== Idea 2: On device machine learning of maliciousness of an app ===&lt;br /&gt;
Tensor-flow for on-device processing and some other libraries have been released that enable machine learning. We have previously applied a system, that based on permissions, is able to distinguish malicious apps from non-malicious. Now, we would like to learn also from other outputs and things one can monitor about application whether it can be malicious. &lt;br /&gt;
&lt;br /&gt;
=== Idea 3:  Enhansing privacy features ===&lt;br /&gt;
The vision of Seraphimdroid is to be aware of privacy threats. This may be achieved throug knowing which applications are using user accounts or other information that uthe user has on phone to send to the server, or just by knowing which applications may be doing it. Knowledgebase shouldbbeextending with the suggestions on how to improve privacy. Also, automated settings of various apps to use encryption should be proposed.&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
=== Active Scanning WebSockets ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesn't currently support active scanning (automated attacking) of websocket traffic (messages).&lt;br /&gt;
: We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* An pluggable infrastructure that allows us to active scan websockets&lt;br /&gt;
:* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
:* Implementing new websocket specific scan rules&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated Authentication Detection and Configuration ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
: This is time consuming and error prone.&lt;br /&gt;
: Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* Detect login and registration pages&lt;br /&gt;
:* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
:* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== IoT Goat ==&lt;br /&gt;
IoT Goat will be a deliberately insecure firmware based on OpenWrt. The project’s goal is to teach users about the most common vulnerabilities typically found in IoT devices. The vulnerabilities will be based on the [https://www.owasp.org/images/1/1c/OWASP-IoT-Top-10-2018-final.pdf IoT Top 10 2018]. &lt;br /&gt;
&lt;br /&gt;
===Idea 1: Insecure firmware web application ecosystem===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
A vulnerable web application, and backend API/web services deployed in OpenWrt containing critical vulnerabilities showcasing the traditional IoT problems.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Have a look at the getting started page to get familiar with virtualizing OpenWrt: https://github.com/scriptingxss/IoTGoat#-getting-started-&lt;br /&gt;
* Create a GitHub account to be added as a collaborator to the repository&lt;br /&gt;
* Review the example vulnerabilities and challenges: https://github.com/scriptingxss/IoTGoat/blob/master/challenges/challenges.md&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Development of a simple web application user interface with web services and API's deployed locally on the OpenWrt firmware. Documented challenges of how to discover and remediate web software security vulnerabilities. The insecure web application services must contain the following vulnerabilities to be used with the IoT testing guide: &lt;br /&gt;
* Command injection&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Local file inclusion &lt;br /&gt;
* XXE injection,Insufficient Authentication&lt;br /&gt;
* Transfer sensitive data using insecure channels&lt;br /&gt;
* Store sensitive data insecurely&lt;br /&gt;
Vulnerable SOAP web services and REST API implementations are in-scope. &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Working Linux knowledge&lt;br /&gt;
* Embedded and/or web development (nice to have)&lt;br /&gt;
** Web application code can be developed using the following common embedded programming languages:&lt;br /&gt;
*** Lua&lt;br /&gt;
*** PHP&lt;br /&gt;
*** C/C++&lt;br /&gt;
*** JavaScript&lt;br /&gt;
&lt;br /&gt;
===Idea 2: Insecure network services===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Deliberately insecure services configured within OpenWrt such as an miniupnp daemon configured with secure_mode off (Secure mode; client can only redirect an incoming port to the client itself (same IP as the request comes from), to demonstrate a port mapping attack where an attacker from inside the network exposes a service that typically should be behind a LAN to the internet). &lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Have a look at the getting started page to get familiar with virtualizing OpenWrt: https://github.com/scriptingxss/IoTGoat#-getting-started-&lt;br /&gt;
* Create a GitHub account to be added as a collaborator to the repository&lt;br /&gt;
* Review the example vulnerabilities and challenges: https://github.com/scriptingxss/IoTGoat/blob/master/challenges/challenges.md&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Documented challenges of how to discover and remediate insecure network service vulnerabilities. The network services can be inherently insecure or have insecure configurations that can be abused during the challenges.&lt;br /&gt;
* Example of network insecure services include:&lt;br /&gt;
** FTP&lt;br /&gt;
** Telnet&lt;br /&gt;
** miniupnpd&lt;br /&gt;
** HTTP&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Working Linux knowledge&lt;br /&gt;
* Network security&lt;br /&gt;
&lt;br /&gt;
===Idea 3: Insecure firmware build system===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Develop custom firmware builds of the latest OpenWrt version (18.06) demonstrating the process of incorporating debug services/tools, misconfigurations, and usage of vulnerable software packages. &lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Review OpenWrt's developer guide to get familiar with creating custom firmware builds&lt;br /&gt;
** https://openwrt.org/docs/guide-developer/start&lt;br /&gt;
** https://openwrt.org/docs/guide-developer/build-system/install-buildsystem&lt;br /&gt;
** https://github.com/openwrt/openwrt&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Provide walkthrough examples of insecure design choices for building firmware. &lt;br /&gt;
* Provide suggested mitigation security controls&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Working Linux knowledge&lt;br /&gt;
* Embedded development (C/C++)&lt;br /&gt;
&lt;br /&gt;
===Suggest your own ideas===&lt;br /&gt;
You may suggest additional challenges or ideas that fit this project's objectives.&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
* Aaron Guzman - OWASP IoT Goat Contributor (Project leader of the IoT and Embedded AppSec project)&lt;br /&gt;
* Fotios Chantzis - OWASP IoT Goat Contributor (and former GSoC Student/GSoc Mentor)&lt;br /&gt;
* [[User:Calderpwn|Paulino Calderon]] - OWASP IoT Goat Contributor (and former GSoC 2011 Student/GSoc Mentor in 2015 and 2017)&lt;br /&gt;
&lt;br /&gt;
==OWASP Web Honeypot Project ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Honeypot Project is to identify emerging attacks against web applications and report them to the community, in order to facilitate protection against such targeted attacks. Within this project, Anglia Ruskin University is leading the collection, storage and analysis of threat intelligence data. &lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Honeypot_Project&lt;br /&gt;
&lt;br /&gt;
https://github.com/OWASP/Honeypot-Project/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The purpose of this part of the project is to capture intelligence on attacker activity against web applications and utilise this intelligence as ways to protect software against attacks. Honeypots are an established industry technique to provide a realistic target to entice a criminal, whilst encouraging them to divulge the tools and techniques they use during an attack. Like bees to a honeypot. These honeypots are safely designed to contain no information of monetary use to an attacker, and hence provide no risk to the businesses implementing them. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The project will create honeypots that the community can distribute within their own networks. With enough honeypots globally distributed, we will be in a position to aggregate attack techniques to better understand and protect against the techniques used by attackers. With this information, we will be in a position to create educational information, such as rules and strategies, that application writers can use to ensure that any detected bugs and vulnerabilities are closed. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Idea===&lt;br /&gt;
Project progression: &lt;br /&gt;
* Honeypot software. The honeypot software that is to be provided to the community to place in their networks has been written. Honeypots are available in a variety of forms, to make deployment as flexible as possible and appeal to a diverse a user set as possible.&lt;br /&gt;
* Collection software. The centralised collection software has been written and evaluated in a student driven proof-of-concept project. Honeypots have been attacked in a laboratory situation and have reported both the steps taken by the attacker and what they have attacked, back to the collection software.&lt;br /&gt;
* Rollout to the Community. The project now needs a dedicated infrastructure platform in place that is available to the entire community to start collecting intelligence back from community deployed honeypots. This infrastructure will run the collector software, analysis programmes and provide a portal for communicating our finds and recommendations back to the community in a meaningful manner.&lt;br /&gt;
* Going Forward. Toolkits and skills used by attackers do not stand still.  As existing bugs are plugged, others open. Follow up stages for the project will be to create a messaging system to automatically update the community on findings of significant risk in their existing code that requires attention. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Expect  Results ===&lt;br /&gt;
&lt;br /&gt;
Some of the ideas from last year's summit&lt;br /&gt;
&lt;br /&gt;
* Setup Proof of Concept to understand how Mod Security baed Honeypot/Probe interacts with a receiving console (develop a VM and/or Docker based test solution to store logs from multiple probes).&lt;br /&gt;
* Evaluate console options to visualise threat data received from ModSecurity Honeypots/probes in MosSecurity Audit Console, WAF-FLE, Fluent and bespoke scripts for single and multiple probes.&lt;br /&gt;
* Develop a mechanism to convert from stored MySQL to JSON format.&lt;br /&gt;
* Provide a mechanism to convert ModSecurity mlogc audit log output into JSON format.&lt;br /&gt;
* Provide a mechanism to convert mlogc audit log output directly into ELK (ElasticSearch/Logstash/Kibana) to visualise the data.&lt;br /&gt;
* Provide a mechanism to forward honest output into threat intelligence format such as STIX using something like the MISP project(https://www.misp-project.org) to share Threat data coming from the Honeypots making it easy to export/import data from formats such as STIX and TAXII., may require use of concurrent logs in a format that MISP can deal with.&lt;br /&gt;
* Consider new alternatives for log transfer including the use of MLOGC-NG or other possible approaches.&lt;br /&gt;
* Develop a new VM based honeypot/robe based on CRS v3.0.&lt;br /&gt;
* Develop new alternative small footprint honeypot/probe formats utilising Docker &amp;amp; Raspberry Pi.&lt;br /&gt;
* Develop machine learning approach to automatically be able to update the rule set being used by the probe based on cyber threat intelligence received.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
Some of the skills we are looking for:&lt;br /&gt;
&lt;br /&gt;
* Apache/Tomcat &lt;br /&gt;
* Any experience of MISP&lt;br /&gt;
* MySQL &amp;amp; JSON&lt;br /&gt;
* ELK &lt;br /&gt;
* STIX/TAXII&lt;br /&gt;
* Python&lt;br /&gt;
* ModSecurity/mlogc&lt;br /&gt;
* OWASP Core RuleSet (CRS)&lt;br /&gt;
* Linux&lt;br /&gt;
* VM/Docker&lt;br /&gt;
&lt;br /&gt;
=== Mentors === &lt;br /&gt;
&lt;br /&gt;
* [mailto:adrian.winckles@owasp.org Adrian Winckles] - (OWASP Web Honeypot Project Leader) &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Suggest your own ideas===&lt;br /&gt;
&lt;br /&gt;
You may suggest additional challenges or ideas that fit this project's objectives.&lt;br /&gt;
&lt;br /&gt;
==OWASP Risk Assessment Framework ==&lt;br /&gt;
Tool projects aim to assessment more than one or many web application using owasp risk rating mathodologies.&lt;br /&gt;
https://github.com/OWASP/RiskAssessmentFramework&lt;br /&gt;
&lt;br /&gt;
'''Idea 1:''' make dashboard with databases and can assess many website based owasp risk rating mathodologies, create graph  and report in pdf,word &amp;amp; excel format.&lt;br /&gt;
=== Mentors === &lt;br /&gt;
* [mailto:ade.putra@owasp.org Ade Yoseman] -  &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=248220</id>
		<title>GSoC2019 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=248220"/>
				<updated>2019-03-03T23:12:08Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: typo name fix&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP-SKF==&lt;br /&gt;
&lt;br /&gt;
=== '''Idea 1 Improving the Machine Learning chatbot:''' ===&lt;br /&gt;
We want to extend the functionality of SKF Bot. (Security Knowledge Framework Chatbot):&lt;br /&gt;
&lt;br /&gt;
Some improvements or the suggestions which we can do to improve the functionality are:&lt;br /&gt;
&lt;br /&gt;
1.    Create a desktop version of the chatbot. Where people can install the setup file on their local machine.&lt;br /&gt;
&lt;br /&gt;
2.    Create a Plugin or website bot which we can add in the website for better chat experience for the user.&lt;br /&gt;
&lt;br /&gt;
3.    Extend the bots capability to do the google search (using web scraping) for the things which are not available in the database. So, it will have a wider scope of knowledge.&lt;br /&gt;
&lt;br /&gt;
4.    Add basic conversation flow which makes SKF Bot friendly and provides the better user experience. Example: Replies to the general queries like How are you? What is your Name etc?&lt;br /&gt;
&lt;br /&gt;
5.    Extend the bot capability to reply to what security controls should be followed from the ASVS and MASVS or other custom checklists that are present in SKF.&lt;br /&gt;
# Extend the bot to different platforms like Facebook, telegram, slack, Google Assistant etc.&lt;br /&gt;
Existing chatbot implementation is on Gitter. You can test the bot by typing @skfchatbot on Gitter Community.&lt;br /&gt;
&lt;br /&gt;
'''Getting started:'''&lt;br /&gt;
&lt;br /&gt;
·         Get familiar with the architecture and code base of SKF (Security Knowledge Framework)&lt;br /&gt;
&lt;br /&gt;
·         Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
&lt;br /&gt;
·         Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
·         Python 3+, Flask, Coffee Script&lt;br /&gt;
&lt;br /&gt;
'''Mentors and Leaders'''&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Priyanka Jain (Mentor)&lt;br /&gt;
&lt;br /&gt;
=== '''Idea 2 Improving and building Lab challenges and write-ups:''' ===&lt;br /&gt;
Build lab examples and write-ups (how to test) for different vulnerabilities over different technology stacks. These challenges are to be delivered in Docker so they can be &lt;br /&gt;
&lt;br /&gt;
easily deployed.&lt;br /&gt;
&lt;br /&gt;
In the current situation the security knowledge framework ultimately presents a list of security controls with correlating knowledge base items that contain a description and &lt;br /&gt;
&lt;br /&gt;
a solution. The new labs are used to give the software developers or application security specialists a more in depth understanding and approach on how to test the &lt;br /&gt;
&lt;br /&gt;
vulnerabilities in their own code.  &lt;br /&gt;
* For example we have now around 20 lab challenges in Docker container build in Python:&lt;br /&gt;
** A Local File Inclusion Docker app example:&lt;br /&gt;
*** https://github.com/blabla1337/skf-labs/tree/master/LFI&lt;br /&gt;
** A write-up example:&lt;br /&gt;
*** https://owasp-skf.gitbook.io/asvs-write-ups/filename-injection&lt;br /&gt;
The images that are pushed to the Github repository are already automatically build and pushed to a docker registry where the SKF users can easily pull the images from to get their&lt;br /&gt;
&lt;br /&gt;
labs running. Of course they can download it and build it themselves from source by pulling the original repository.  &lt;br /&gt;
&lt;br /&gt;
'''Mentors and Leaders'''  &lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
OWASP DefectDojo is a popular open source vulnerability management tool, used as the backbone for security programs. It is easy to get started with and work on! We welcome volunteers of all experience levels and are happy to provide mentorship.&lt;br /&gt;
&lt;br /&gt;
Option 1: Unit Tests - Difficulty: Easy&lt;br /&gt;
* If you're new to programming, unit tests are short scripts designed to test a specific function of an application.&lt;br /&gt;
* The project needs additional unit tests to ensure that new code functions properly. &lt;br /&gt;
Option 2: Feature Enhancement - Difficulty: Varies&lt;br /&gt;
* The functionality of DefectDojo is constantly expanding.&lt;br /&gt;
* Feature enhancements offer programming challenges for all levels of experience.&lt;br /&gt;
Option 3: Pull Request Review - Difficulty: Moderate - Hard&lt;br /&gt;
* Test pull requests and provide feedback on code.&lt;br /&gt;
&lt;br /&gt;
== OHP (OWASP Honeypot) ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Python_Honeypot|OWASP Honeypot]] is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
=== Getting Start ===&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to adding more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
=== Technologies ===&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
&lt;br /&gt;
* Zero Bugs: Currently we may have several bugs in different conditions, and it's best to test the all functions and fix them&lt;br /&gt;
* Monitoring: Right now monitoring limited to the connections (send&amp;amp;recieve) and it's best to store and analysis the contents for farther investigations and recognizing incoming attacks.&lt;br /&gt;
* Duplicated codes: codes are complicated and duplicated in engine, should be fixed/clean up&lt;br /&gt;
* New modules: add some creative ICS/Network/Web modules andvulnerable web applications, services and stuff&lt;br /&gt;
* API: update API sync to all features&lt;br /&gt;
* WebUI: Demonstrate and add API on WebUI and Live version with all features&lt;br /&gt;
* WebUI Special Reports: Track the attacks more creative and provide high risk IPs&lt;br /&gt;
* Database: Better database structure, faster and use queue&lt;br /&gt;
* Data analysis: Analysis stored data and attack signatures&lt;br /&gt;
* OWASP Top 10: Preparing useful processed/raw data for OWASP top 10 project&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Packet Analysis &amp;amp; Tshark &amp;amp; Libpcap&lt;br /&gt;
* Docker&lt;br /&gt;
* Database&lt;br /&gt;
* Web Development Skills&lt;br /&gt;
* Honeypot and Deception knowledge&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Reza Espargham](Mentor)&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi] (Mentor)&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and Angular. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the potential mentors (@bkimminich, @wurstbrot and @J12934) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
''Coming up with good additional ideas for challenges in the proposal could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges)&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Hacking Instructor ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
While the Juice Shop is offering a lot of long-lasting motivation and challenges for security experts, it might be a bit daunting for newcomers and less experienced hackers.&lt;br /&gt;
The &amp;quot;Hacking Instructor&amp;quot; as sketched in [https://github.com/bkimminich/juice-shop/issues/440 GitHub issue #440] could guide users from this target audience through at least some of the hacking challenges. As this would be an entirely new and relatively independent feature of the Juice Shop, students should be able to bring in their own creativity and ideas a lot.&lt;br /&gt;
&lt;br /&gt;
''For this project, a good proposal with a design &amp;amp; implementation proposal more sophisticated than the rough ideas in [https://github.com/bkimminich/juice-shop/issues/440 #440] is paramount to be selected as a student!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A working implementation of e.g. an avatar-style &amp;quot;Hacking Instructor&amp;quot; or other solution based on the students own proposal&lt;br /&gt;
* Coverage of at least the trivial (1-star) and some easy (2-star) challenges&lt;br /&gt;
* Documentation how to configure or script the &amp;quot;Hacking Instructor&amp;quot; for challenges in general&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular, some UI/UX experience would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Juice Shop Mobile ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
A complete mobile client for Juice-Shop API which will serve a legit mobile experience for Juice-Shop user as well as a plethora of Mobile app vulnerabilities and challenges around them to solve. Should in the best case translate the idea of Juice Shop's hacking challenges with a score board and success notifications into the mobile world.&lt;br /&gt;
&lt;br /&gt;
''Coming up with a sophisticated proposal (optimally even with a good initial sample implementation) could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's RESTful backend&lt;br /&gt;
* Get familiar with Native App developement&lt;br /&gt;
* Get familiar with Mobile vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A mobile App with consistent UI/UX for Juice-Shop with standard client side vulnerabilities.&lt;br /&gt;
* Sufficient initial release quality (en par with Juice Shop and Juice Shop CTF) to make it an official extension project hosted in its own GitHub repository ''bkimminich/juice-shop-mobile''&lt;br /&gt;
* Code follows existing styleguides and applies similar quality gates regarding code smells, test coverage etc. as the main project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) React Native and NodeJS/Express, some Mobile security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP-Securetea Tools Project ==&lt;br /&gt;
The purpose of this application is to warn the user (via various communication mechanisms) whenever their laptop accessed. This small application was developed and tested in python in Linux machine is likely to work well on the Raspberry Pi as well. -&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project/blob/master/README.md&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
We are looking any awesome idea to improve Securetea Project that is not on this list? We are expecting make this project will be useful to everyone to secure their Small IoT. &lt;br /&gt;
&lt;br /&gt;
===Idea===&lt;br /&gt;
Below roadmap and expect  results you can choose to improve Securetea Project . &lt;br /&gt;
if any bugs please help to fix it&lt;br /&gt;
&lt;br /&gt;
===Roadmap=== &lt;br /&gt;
See Our Roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project#roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Twitter (done)&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Dashboard / Gui (done)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Expect  Results ===&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Protection /firewall&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Antivirus&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Whatsapp&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by SMS Alerts&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Line&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Telegram&amp;lt;br&amp;gt;&lt;br /&gt;
Intelligent Log Monitoring&amp;lt;br&amp;gt;&lt;br /&gt;
Login History&amp;lt;br&amp;gt;&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Javascript &lt;br /&gt;
* Angular and NodeJS/Express&lt;br /&gt;
* Database&lt;br /&gt;
* Linux&lt;br /&gt;
&lt;br /&gt;
=== Mentors === &lt;br /&gt;
&lt;br /&gt;
* [mailto:ade.putra@owasp.org Ade Yoseman Putra] - (OWASP Securetea Project Leader) &amp;lt;br&amp;gt;&lt;br /&gt;
* [mailto:rejah.rehim@owasp.org Rejah Rehim.A.A]]- (OWASP Securetea Project Leader)&lt;br /&gt;
* [https://github.com/sananthu Ananthu S] - (Mentor)&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP iGoat (draft) ==&lt;br /&gt;
'''Idea 1:''' Completing OWASP iGoat documentation at https://docs.igoatapp.com/ and creating demo videos at for OWASP iGoat YouTube channel for learning purpose.&lt;br /&gt;
&lt;br /&gt;
'''Idea 2:''' Adding new challenge pack / CTF for iGoat. It should be one point solution for learning iOS app security&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid ==&lt;br /&gt;
&lt;br /&gt;
=== Idea 1: Anomaly detection of device state ===&lt;br /&gt;
The idea is that certain features of a device would be constantly monitored (battery use, internet usage, opp calls, etc.). Initially, the usual behaviour of the device would be learned. Later, anomalies normal behavior would be reported to the user. This should involve some explanations, such as which applications are causing an anomaly the device behaviors &lt;br /&gt;
&lt;br /&gt;
=== Idea 2: On device machine learning of maliciousness of an app ===&lt;br /&gt;
Tensor-flow for on-device processing and some other libraries have been released that enable machine learning. We have previously applied a system, that based on permissions, is able to distinguish malicious apps from non-malicious. Now, we would like to learn also from other outputs and things one can monitor about application whether it can be malicious. &lt;br /&gt;
&lt;br /&gt;
=== Idea 3:  Enhansing privacy features ===&lt;br /&gt;
The vision of Seraphimdroid is to be aware of privacy threats. This may be achieved throug knowing which applications are using user accounts or other information that user has on phone to send to the server, or just by knowing which applications may be doing it. Knowledge base should be extending with the suggestions on how to improve privacy. Also, automated settings of various apps to use encryption should be proposed.&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
=== Active Scanning WebSockets ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesn't currently support active scanning (automated attacking) of websocket traffic (messages).&lt;br /&gt;
: We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* An pluggable infrastructure that allows us to active scan websockets&lt;br /&gt;
:* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
:* Implementing new websocket specific scan rules&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated Authentication Detection and Configuration ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
: This is time consuming and error prone.&lt;br /&gt;
: Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* Detect login and registration pages&lt;br /&gt;
:* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
:* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=248112</id>
		<title>GSoC2019 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=248112"/>
				<updated>2019-03-01T03:59:29Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* OWASP-SKF */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP-SKF==&lt;br /&gt;
&lt;br /&gt;
=== '''Idea 1 Improving the Machine Learning chatbot:''' ===&lt;br /&gt;
We want to extend the functionality of SKF Bot. (Security Knowledge Framework Chatbot):&lt;br /&gt;
&lt;br /&gt;
Some improvements or the suggestions which we can do to improve the functionality are:&lt;br /&gt;
&lt;br /&gt;
1.    Create a desktop version of the chatbot. Where people can install the setup file on their local machine.&lt;br /&gt;
&lt;br /&gt;
2.    Create a Plugin or website bot which we can add in the website for better chat experience for the user.&lt;br /&gt;
&lt;br /&gt;
3.    Extend the bots capability to do the google search (using web scraping) for the things which are not available in the database. So, it will have a wider scope of knowledge.&lt;br /&gt;
&lt;br /&gt;
4.    Add basic conversation flow which makes SKF Bot friendly and provides the better user experience. Example: Replies to the general queries like How are you? What is your Name etc?&lt;br /&gt;
&lt;br /&gt;
5.    Extend the bot capability to reply to what security controls should be followed from the ASVS and MASVS or other custom checklists that are present in SKF.&lt;br /&gt;
# Extend the bot to different platforms like Facebook, telegram, slack, Google Assistant etc.&lt;br /&gt;
Existing chatbot implementation is on Gitter. You can test the bot by typing @skfchatbot on Gitter Community.&lt;br /&gt;
&lt;br /&gt;
'''Getting started:'''&lt;br /&gt;
&lt;br /&gt;
·         Get familiar with the architecture and code base of SKF (Security Knowledge Framework)&lt;br /&gt;
&lt;br /&gt;
·         Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
&lt;br /&gt;
·         Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
·         Python 3+, Flask, Coffee Script&lt;br /&gt;
&lt;br /&gt;
'''Mentors and Leaders'''&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Priyanka Jaine (Mentor)&lt;br /&gt;
&lt;br /&gt;
=== '''Idea 2 Improving and building Lab challenges and write-ups:''' ===&lt;br /&gt;
Build lab examples and write-ups (how to test) for different vulnerabilities over different technology stacks. These challenges are to be delivered in Docker so they can be &lt;br /&gt;
&lt;br /&gt;
easily deployed.&lt;br /&gt;
&lt;br /&gt;
In the current situation the security knowledge framework ultimately presents a list of security controls with correlating knowledge base items that contain a description and &lt;br /&gt;
&lt;br /&gt;
a solution. The new labs are used to give the software developers or application security specialists a more in depth understanding and approach on how to test the &lt;br /&gt;
&lt;br /&gt;
vulnerabilities in their own code.  &lt;br /&gt;
* For example we have now around 20 lab challenges in Docker container build in Python:&lt;br /&gt;
** A Local File Inclusion Docker app example:&lt;br /&gt;
*** https://github.com/blabla1337/skf-labs/tree/master/LFI&lt;br /&gt;
** A write-up example:&lt;br /&gt;
*** https://owasp-skf.gitbook.io/asvs-write-ups/filename-injection&lt;br /&gt;
The images that are pushed to the Github repository are already automatically build and pushed to a docker registry where the SKF users can easily pull the images from to get their&lt;br /&gt;
&lt;br /&gt;
labs running. Of course they can download it and build it themselves from source by pulling the original repository.  &lt;br /&gt;
&lt;br /&gt;
'''Mentors and Leaders'''  &lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
OWASP DefectDojo is a popular open source vulnerability management tool, used as the backbone for security programs. It is easy to get started with and work on! We welcome volunteers of all experience levels and are happy to provide mentorship.&lt;br /&gt;
&lt;br /&gt;
Option 1: Unit Tests - Difficulty: Easy&lt;br /&gt;
* If you're new to programming, unit tests are short scripts designed to test a specific function of an application.&lt;br /&gt;
* The project needs additional unit tests to ensure that new code functions properly. &lt;br /&gt;
Option 2: Feature Enhancement - Difficulty: Varies&lt;br /&gt;
* The functionality of DefectDojo is constantly expanding.&lt;br /&gt;
* Feature enhancements offer programming challenges for all levels of experience.&lt;br /&gt;
Option 3: Pull Request Review - Difficulty: Moderate - Hard&lt;br /&gt;
* Test pull requests and provide feedback on code.&lt;br /&gt;
&lt;br /&gt;
== OHP (OWASP Honeypot) ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Python_Honeypot|OWASP Honeypot]] is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
=== Getting Start ===&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to adding more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
=== Technologies ===&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
&lt;br /&gt;
* Zero Bugs: Currently we may have several bugs in different conditions, and it's best to test the all functions and fix them&lt;br /&gt;
* Monitoring: Right now monitoring limited to the connections (send&amp;amp;recieve) and it's best to store and analysis the contents for farther investigations and recognizing incoming attacks.&lt;br /&gt;
* Duplicated codes: codes are complicated and duplicated in engine, should be fixed/clean up&lt;br /&gt;
* New modules: add some creative ICS/Network/Web modules andvulnerable web applications, services and stuff&lt;br /&gt;
* API: update API sync to all features&lt;br /&gt;
* WebUI: Demonstrate and add API on WebUI and Live version with all features&lt;br /&gt;
* WebUI Special Reports: Track the attacks more creative and provide high risk IPs&lt;br /&gt;
* Database: Better database structure, faster and use queue&lt;br /&gt;
* Data analysis: Analysis stored data and attack signatures&lt;br /&gt;
* OWASP Top 10: Preparing useful processed/raw data for OWASP top 10 project&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Packet Analysis &amp;amp; Tshark &amp;amp; Libpcap&lt;br /&gt;
* Docker&lt;br /&gt;
* Database&lt;br /&gt;
* Web Development Skills&lt;br /&gt;
* Honeypot and Deception knowledge&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Reza Espargham](Mentor)&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi] (Mentor)&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and Angular. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the potential mentors (@bkimminich, @wurstbrot and @J12934) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
''Coming up with good additional ideas for challenges in the proposal could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges)&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Hacking Instructor ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
While the Juice Shop is offering a lot of long-lasting motivation and challenges for security experts, it might be a bit daunting for newcomers and less experienced hackers.&lt;br /&gt;
The &amp;quot;Hacking Instructor&amp;quot; as sketched in [https://github.com/bkimminich/juice-shop/issues/440 GitHub issue #440] could guide users from this target audience through at least some of the hacking challenges. As this would be an entirely new and relatively independent feature of the Juice Shop, students should be able to bring in their own creativity and ideas a lot.&lt;br /&gt;
&lt;br /&gt;
''For this project, a good proposal with a design &amp;amp; implementation proposal more sophisticated than the rough ideas in [https://github.com/bkimminich/juice-shop/issues/440 #440] is paramount to be selected as a student!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A working implementation of e.g. an avatar-style &amp;quot;Hacking Instructor&amp;quot; or other solution based on the students own proposal&lt;br /&gt;
* Coverage of at least the trivial (1-star) and some easy (2-star) challenges&lt;br /&gt;
* Documentation how to configure or script the &amp;quot;Hacking Instructor&amp;quot; for challenges in general&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular, some UI/UX experience would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Juice Shop Mobile ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
A complete mobile client for Juice-Shop API which will serve a legit mobile experience for Juice-Shop user as well as a plethora of Mobile app vulnerabilities and challenges around them to solve. Should in the best case translate the idea of Juice Shop's hacking challenges with a score board and success notifications into the mobile world.&lt;br /&gt;
&lt;br /&gt;
''Coming up with a sophisticated proposal (optimally even with a good initial sample implementation) could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's RESTful backend&lt;br /&gt;
* Get familiar with Native App developement&lt;br /&gt;
* Get familiar with Mobile vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A mobile App with consistent UI/UX for Juice-Shop with standard client side vulnerabilities.&lt;br /&gt;
* Sufficient initial release quality (en par with Juice Shop and Juice Shop CTF) to make it an official extension project hosted in its own GitHub repository ''bkimminich/juice-shop-mobile''&lt;br /&gt;
* Code follows existing styleguides and applies similar quality gates regarding code smells, test coverage etc. as the main project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) React Native and NodeJS/Express, some Mobile security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP-Securetea Tools Project ==&lt;br /&gt;
The purpose of this application is to warn the user (via various communication mechanisms) whenever their laptop accessed. This small application was developed and tested in python in Linux machine is likely to work well on the Raspberry Pi as well. -&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project/blob/master/README.md&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
We are looking any awesome idea to improve Securetea Project that is not on this list? We are expecting make this project will be useful to everyone to secure their Small IoT. &lt;br /&gt;
&lt;br /&gt;
===Idea===&lt;br /&gt;
Below roadmap and expect  results you can choose to improve Securetea Project . &lt;br /&gt;
if any bugs please help to fix it&lt;br /&gt;
&lt;br /&gt;
===Roadmap=== &lt;br /&gt;
See Our Roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project#roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Twitter (done)&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Dashboard / Gui (done)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Expect  Results ===&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Protection /firewall&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Antivirus&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Whatsapp&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by SMS Alerts&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Line&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Telegram&amp;lt;br&amp;gt;&lt;br /&gt;
Intelligent Log Monitoring&amp;lt;br&amp;gt;&lt;br /&gt;
Login History&amp;lt;br&amp;gt;&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Javascript &lt;br /&gt;
* Angular and NodeJS/Express&lt;br /&gt;
* Database&lt;br /&gt;
* Linux&lt;br /&gt;
&lt;br /&gt;
=== Mentors === &lt;br /&gt;
&lt;br /&gt;
* [mailto:ade.putra@owasp.org Ade Yoseman Putra] - (OWASP Securetea Project Leader) &amp;lt;br&amp;gt;&lt;br /&gt;
* [mailto:rejah.rehim@owasp.org Rejah Rehim.A.A]]- (OWASP Securetea Project Leader)&lt;br /&gt;
* [https://github.com/sananthu Ananthu S] - (Mentor)&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP iGoat (draft) ==&lt;br /&gt;
'''Idea 1:''' Completing OWASP iGoat documentation at https://docs.igoatapp.com/ and creating demo videos at for OWASP iGoat YouTube channel for learning purpose.&lt;br /&gt;
&lt;br /&gt;
'''Idea 2:''' Adding new challenge pack / CTF for iGoat. It should be one point solution for learning iOS app security&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid ==&lt;br /&gt;
&lt;br /&gt;
=== Idea 1: Anomaly detection of device state ===&lt;br /&gt;
The idea is that certain features of a device would be constantly monitored (battery use, internet usage, opp calls, etc.). Initially, the usual behaviour of the device would be learned. Later, anomalies normal behavior would be reported to the user. This should involve some explanations, such as which applications are causing an anomaly the device behaviors &lt;br /&gt;
&lt;br /&gt;
=== Idea 2: On device machine learning of maliciousness of an app ===&lt;br /&gt;
Tensor-flow for on-device processing and some other libraries have been released that enable machine learning. We have previously applied a system, that based on permissions, is able to distinguish malicious apps from non-malicious. Now, we would like to learn also from other outputs and things one can monitor about application whether it can be malicious. &lt;br /&gt;
&lt;br /&gt;
=== Idea 3:  Enhansing privacy features ===&lt;br /&gt;
The vision of Seraphimdroid is to be aware of privacy threats. This may be achieved throug knowing which applications are using user accounts or other information that user has on phone to send to the server, or just by knowing which applications may be doing it. Knowledge base should be extending with the suggestions on how to improve privacy. Also, automated settings of various apps to use encryption should be proposed.&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
=== Active Scanning WebSockets ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesn't currently support active scanning (automated attacking) of websocket traffic (messages).&lt;br /&gt;
: We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* An pluggable infrastructure that allows us to active scan websockets&lt;br /&gt;
:* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
:* Implementing new websocket specific scan rules&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated Authentication Detection and Configuration ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
: This is time consuming and error prone.&lt;br /&gt;
: Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* Detect login and registration pages&lt;br /&gt;
:* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
:* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=248111</id>
		<title>GSoC2019 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=248111"/>
				<updated>2019-03-01T03:56:24Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: updated SKF idea's&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP-SKF==&lt;br /&gt;
'''Idea 1:''' &lt;br /&gt;
&lt;br /&gt;
We want to extend the functionality of SKF Bot. (Security Knowledge Framework Chatbot):&lt;br /&gt;
&lt;br /&gt;
Some improvements or the suggestions which we can do to improve the functionality are:&lt;br /&gt;
&lt;br /&gt;
1.    Create a desktop version of the chatbot. Where people can install the setup file on their local machine.&lt;br /&gt;
&lt;br /&gt;
2.    Create a Plugin or website bot which we can add in the website for better chat experience for the user.&lt;br /&gt;
&lt;br /&gt;
3.    Extend the bots capability to do the google search (using web scraping) for the things which are not available in the database. So, it will have a wider scope of knowledge.&lt;br /&gt;
&lt;br /&gt;
4.    Add basic conversation flow which makes SKF Bot friendly and provides the better user experience. Example: Replies to the general queries like How are you? What is your Name etc?&lt;br /&gt;
&lt;br /&gt;
5.    Extend the bot capability to reply to what security controls should be followed from the ASVS and MASVS or other custom checklists that are present in SKF.&lt;br /&gt;
# Extend the bot to different platforms like Facebook, telegram, slack, Google Assistant etc.&lt;br /&gt;
Existing chatbot implementation is on Gitter. You can test the bot by typing @skfchatbot on Gitter Community.&lt;br /&gt;
&lt;br /&gt;
'''Getting started:'''&lt;br /&gt;
&lt;br /&gt;
·         Get familiar with the architecture and code base of SKF (Security Knowledge Framework)&lt;br /&gt;
&lt;br /&gt;
·         Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
&lt;br /&gt;
·         Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
·         Python 3+, Flask, Coffee Script&lt;br /&gt;
&lt;br /&gt;
'''Mentors and Leaders'''&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Priyanka Jaine (Mentor)&lt;br /&gt;
&lt;br /&gt;
'''Idea 2:'''&lt;br /&gt;
&lt;br /&gt;
Build lab examples and write-ups (how to test) for different vulnerabilities over different technology stacks. These challenges are to be delivered in Docker so they can be &lt;br /&gt;
&lt;br /&gt;
easily deployed.&lt;br /&gt;
&lt;br /&gt;
In the current situation the security knowledge framework ultimately presents a list of security controls with correlating knowledge base items that contain a description and &lt;br /&gt;
&lt;br /&gt;
a solution. The new labs are used to give the software developers or application security specialists a more in depth understanding and approach on how to test the &lt;br /&gt;
&lt;br /&gt;
vulnerabilities in their own code.  &lt;br /&gt;
* For example we have now around 20 lab challenges in Docker container build in Python:&lt;br /&gt;
** A Local File Inclusion Docker app example:&lt;br /&gt;
*** https://github.com/blabla1337/skf-labs/tree/master/LFI&lt;br /&gt;
** A write-up example:&lt;br /&gt;
*** https://owasp-skf.gitbook.io/asvs-write-ups/filename-injection&lt;br /&gt;
The images that are pushed to the Github repository are already automatically build and pushed to a docker registry where the SKF users can easily pull the images from to get their&lt;br /&gt;
&lt;br /&gt;
labs running. Of course they can download it and build it themselves from source by pulling the original repository.  &lt;br /&gt;
&lt;br /&gt;
'''Mentors and Leaders'''  &lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
OWASP DefectDojo is a popular open source vulnerability management tool, used as the backbone for security programs. It is easy to get started with and work on! We welcome volunteers of all experience levels and are happy to provide mentorship.&lt;br /&gt;
&lt;br /&gt;
Option 1: Unit Tests - Difficulty: Easy&lt;br /&gt;
* If you're new to programming, unit tests are short scripts designed to test a specific function of an application.&lt;br /&gt;
* The project needs additional unit tests to ensure that new code functions properly. &lt;br /&gt;
Option 2: Feature Enhancement - Difficulty: Varies&lt;br /&gt;
* The functionality of DefectDojo is constantly expanding.&lt;br /&gt;
* Feature enhancements offer programming challenges for all levels of experience.&lt;br /&gt;
Option 3: Pull Request Review - Difficulty: Moderate - Hard&lt;br /&gt;
* Test pull requests and provide feedback on code.&lt;br /&gt;
&lt;br /&gt;
== OHP (OWASP Honeypot) ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Python_Honeypot|OWASP Honeypot]] is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
=== Getting Start ===&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to adding more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
=== Technologies ===&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
&lt;br /&gt;
* Zero Bugs: Currently we may have several bugs in different conditions, and it's best to test the all functions and fix them&lt;br /&gt;
* Monitoring: Right now monitoring limited to the connections (send&amp;amp;recieve) and it's best to store and analysis the contents for farther investigations and recognizing incoming attacks.&lt;br /&gt;
* Duplicated codes: codes are complicated and duplicated in engine, should be fixed/clean up&lt;br /&gt;
* New modules: add some creative ICS/Network/Web modules andvulnerable web applications, services and stuff&lt;br /&gt;
* API: update API sync to all features&lt;br /&gt;
* WebUI: Demonstrate and add API on WebUI and Live version with all features&lt;br /&gt;
* WebUI Special Reports: Track the attacks more creative and provide high risk IPs&lt;br /&gt;
* Database: Better database structure, faster and use queue&lt;br /&gt;
* Data analysis: Analysis stored data and attack signatures&lt;br /&gt;
* OWASP Top 10: Preparing useful processed/raw data for OWASP top 10 project&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Packet Analysis &amp;amp; Tshark &amp;amp; Libpcap&lt;br /&gt;
* Docker&lt;br /&gt;
* Database&lt;br /&gt;
* Web Development Skills&lt;br /&gt;
* Honeypot and Deception knowledge&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Reza Espargham](Mentor)&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi] (Mentor)&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and Angular. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the potential mentors (@bkimminich, @wurstbrot and @J12934) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
''Coming up with good additional ideas for challenges in the proposal could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges)&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Hacking Instructor ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
While the Juice Shop is offering a lot of long-lasting motivation and challenges for security experts, it might be a bit daunting for newcomers and less experienced hackers.&lt;br /&gt;
The &amp;quot;Hacking Instructor&amp;quot; as sketched in [https://github.com/bkimminich/juice-shop/issues/440 GitHub issue #440] could guide users from this target audience through at least some of the hacking challenges. As this would be an entirely new and relatively independent feature of the Juice Shop, students should be able to bring in their own creativity and ideas a lot.&lt;br /&gt;
&lt;br /&gt;
''For this project, a good proposal with a design &amp;amp; implementation proposal more sophisticated than the rough ideas in [https://github.com/bkimminich/juice-shop/issues/440 #440] is paramount to be selected as a student!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A working implementation of e.g. an avatar-style &amp;quot;Hacking Instructor&amp;quot; or other solution based on the students own proposal&lt;br /&gt;
* Coverage of at least the trivial (1-star) and some easy (2-star) challenges&lt;br /&gt;
* Documentation how to configure or script the &amp;quot;Hacking Instructor&amp;quot; for challenges in general&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular, some UI/UX experience would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Juice Shop Mobile ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
A complete mobile client for Juice-Shop API which will serve a legit mobile experience for Juice-Shop user as well as a plethora of Mobile app vulnerabilities and challenges around them to solve. Should in the best case translate the idea of Juice Shop's hacking challenges with a score board and success notifications into the mobile world.&lt;br /&gt;
&lt;br /&gt;
''Coming up with a sophisticated proposal (optimally even with a good initial sample implementation) could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's RESTful backend&lt;br /&gt;
* Get familiar with Native App developement&lt;br /&gt;
* Get familiar with Mobile vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A mobile App with consistent UI/UX for Juice-Shop with standard client side vulnerabilities.&lt;br /&gt;
* Sufficient initial release quality (en par with Juice Shop and Juice Shop CTF) to make it an official extension project hosted in its own GitHub repository ''bkimminich/juice-shop-mobile''&lt;br /&gt;
* Code follows existing styleguides and applies similar quality gates regarding code smells, test coverage etc. as the main project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) React Native and NodeJS/Express, some Mobile security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP-Securetea Tools Project ==&lt;br /&gt;
The purpose of this application is to warn the user (via various communication mechanisms) whenever their laptop accessed. This small application was developed and tested in python in Linux machine is likely to work well on the Raspberry Pi as well. -&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project/blob/master/README.md&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
We are looking any awesome idea to improve Securetea Project that is not on this list? We are expecting make this project will be useful to everyone to secure their Small IoT. &lt;br /&gt;
&lt;br /&gt;
===Idea===&lt;br /&gt;
Below roadmap and expect  results you can choose to improve Securetea Project . &lt;br /&gt;
if any bugs please help to fix it&lt;br /&gt;
&lt;br /&gt;
===Roadmap=== &lt;br /&gt;
See Our Roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project#roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Twitter (done)&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Dashboard / Gui (done)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Expect  Results ===&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Protection /firewall&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Antivirus&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Whatsapp&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by SMS Alerts&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Line&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Telegram&amp;lt;br&amp;gt;&lt;br /&gt;
Intelligent Log Monitoring&amp;lt;br&amp;gt;&lt;br /&gt;
Login History&amp;lt;br&amp;gt;&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Javascript &lt;br /&gt;
* Angular and NodeJS/Express&lt;br /&gt;
* Database&lt;br /&gt;
* Linux&lt;br /&gt;
&lt;br /&gt;
=== Mentors === &lt;br /&gt;
&lt;br /&gt;
* [mailto:ade.putra@owasp.org Ade Yoseman Putra] - (OWASP Securetea Project Leader) &amp;lt;br&amp;gt;&lt;br /&gt;
* [mailto:rejah.rehim@owasp.org Rejah Rehim.A.A]]- (OWASP Securetea Project Leader)&lt;br /&gt;
* [https://github.com/sananthu Ananthu S] - (Mentor)&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP iGoat (draft) ==&lt;br /&gt;
'''Idea 1:''' Completing OWASP iGoat documentation at https://docs.igoatapp.com/ and creating demo videos at for OWASP iGoat YouTube channel for learning purpose.&lt;br /&gt;
&lt;br /&gt;
'''Idea 2:''' Adding new challenge pack / CTF for iGoat. It should be one point solution for learning iOS app security&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid ==&lt;br /&gt;
&lt;br /&gt;
=== Idea 1: Anomaly detection of device state ===&lt;br /&gt;
The idea is that certain features of a device would be constantly monitored (battery use, internet usage, opp calls, etc.). Initially, the usual behaviour of the device would be learned. Later, anomalies normal behavior would be reported to the user. This should involve some explanations, such as which applications are causing an anomaly the device behaviors &lt;br /&gt;
&lt;br /&gt;
=== Idea 2: On device machine learning of maliciousness of an app ===&lt;br /&gt;
Tensor-flow for on-device processing and some other libraries have been released that enable machine learning. We have previously applied a system, that based on permissions, is able to distinguish malicious apps from non-malicious. Now, we would like to learn also from other outputs and things one can monitor about application whether it can be malicious. &lt;br /&gt;
&lt;br /&gt;
=== Idea 3:  Enhansing privacy features ===&lt;br /&gt;
The vision of Seraphimdroid is to be aware of privacy threats. This may be achieved throug knowing which applications are using user accounts or other information that user has on phone to send to the server, or just by knowing which applications may be doing it. Knowledge base should be extending with the suggestions on how to improve privacy. Also, automated settings of various apps to use encryption should be proposed.&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
=== Active Scanning WebSockets ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesn't currently support active scanning (automated attacking) of websocket traffic (messages).&lt;br /&gt;
: We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* An pluggable infrastructure that allows us to active scan websockets&lt;br /&gt;
:* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
:* Implementing new websocket specific scan rules&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated Authentication Detection and Configuration ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
: This is time consuming and error prone.&lt;br /&gt;
: Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* Detect login and registration pages&lt;br /&gt;
:* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
:* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=246474</id>
		<title>GSoC2019 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=246474"/>
				<updated>2019-01-09T17:41:05Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: Added 2 ideas for SKF&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== '''OWASP-SKF (draft)''' ====&lt;br /&gt;
Idea 1: Build lab examples and write-ups (how to test) for different code languages delivered in Docker (these must correlate with a Knowledge base item in SKF)&lt;br /&gt;
* For example we have now around 20 lab challenges in Docker container build in Python:&lt;br /&gt;
** A Local File Inclusion Docker app example:&lt;br /&gt;
*** https://github.com/blabla1337/skf-labs/tree/master/LFI&lt;br /&gt;
** A write-up example:&lt;br /&gt;
*** https://owasp-skf.gitbook.io/asvs-write-ups/filename-injection&lt;br /&gt;
Idea 2: We want to extend the Machine learning chatbot functionality in SKF.&lt;br /&gt;
* Create a desktop version of the chatbot. Where people can install the setup file on their local machine.&lt;br /&gt;
* Extend the bots capability to do the google search(using web scraping) for the things which are not available in the database. So, it will have a wider scope of knowledge.&lt;br /&gt;
* Extend the bot capability to reply what security controls should be followed from the ASVS and MASVS or other custom checklists that are present in SKF.&lt;br /&gt;
* Extend the bot to different platforms like Facebook, telegram, slack etc.&lt;br /&gt;
** Now the working chatbot implementation for example is only for Gitter &lt;br /&gt;
&lt;br /&gt;
=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=243178</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=243178"/>
				<updated>2018-09-05T10:50:55Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Use SKF to gather the right security requirements for your projects&lt;br /&gt;
* SKF then gives extensive knowledgebase items that correlates to the security requirements&lt;br /&gt;
* Developers can close &amp;quot;tickets&amp;quot; and leave an audit trail to determine possible technical depts or improvements&lt;br /&gt;
* Security specialist can follow the &amp;quot;tickets&amp;quot; and audit trail and verify or Fail closed items and provide feedback.&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
&lt;br /&gt;
|target=_blank&lt;br /&gt;
&lt;br /&gt;
|budget=OWASP SKF&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br /&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&lt;br /&gt;
* http://www.secureby.design&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Testing_Guide OWASP Mobile Application Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|https://www.owasp.org/index.php?title=OWASP_Project_Stages]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Milestones / Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Next major release features==&lt;br /&gt;
* Implement the MASVS Knowledge base items in the OWASP-SKF project &lt;br /&gt;
&lt;br /&gt;
* Implement MASVS process flow under the new project section &lt;br /&gt;
* Implement dynamic checklist creation for custom checklists to process flow under the new project section &lt;br /&gt;
* Add CWE to Knowledge base items &lt;br /&gt;
* Add how to pentest section per Knowledge base item (OWASP-Testing Guide)  &lt;br /&gt;
* Add internationalist feature to SKF for supporting multiple human languages  &lt;br /&gt;
* Market and brand the new AI chat-bot implementation  &lt;br /&gt;
* Add dynamic questionnaire creation that links questions to security requirements  &lt;br /&gt;
&lt;br /&gt;
Check out the detailed roadmap here: &lt;br /&gt;
&lt;br /&gt;
'''[https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== CI-Pipeline ==&lt;br /&gt;
&lt;br /&gt;
=== Travis-ci.org: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes! SKF Build details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://travis-ci.org/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Coveralls.io Python: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite. SKF Coveralls details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://coveralls.io/r/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== codecov.io for Angular: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Code coverage done right. Highly integrated with GitHub, Bitbucket and GitLab. SKF codecov details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://codecov.io/gh/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrutinizer-ci.com: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality. SKF Scrutinizer details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://scrutinizer-ci.com/g/blabla1337/skf-flask/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Bithound.io NPM packages: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;BitHound provides your Node team with comprehensive and prioritized issues in your code and npm packages. SKF Bithound details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://www.bithound.io/github/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Requires.io pip packages: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Stay Up-to-date! Stay secure! Requires.io monitors your Python projects dependencies, and notify you whenever any of your dependency is out-of-date. SKF Requires details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://requires.io/github/blabla1337/skf-flask/requirements/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Black Duck Security Risk: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Announcing Black Duck CoPilot, a new service helping open source project teams catalog and report on their project's dependencies. SKF Requires details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://copilot.blackducksoftware.com/github/groups/blabla1337/locations/skf-flask/public/results&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== uptimerobot.com: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&amp;lt;/code&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== ssllabs.com &amp;amp; sslbadge.org: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;ssllabs.org: Bringing you the best SSL/TLS and PKI testing tools and documentation. sslbadge.org: Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&amp;lt;/code&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=243177</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=243177"/>
				<updated>2018-09-05T10:49:26Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: added the Flagship status&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Use SKF to gather the right security requirements for your projects&lt;br /&gt;
* SKF then gives extensive knowledgebase items that correlates to the security requirements&lt;br /&gt;
* Developers can close &amp;quot;tickets&amp;quot; and leave an audit trail to determine possible technical depts or improvements&lt;br /&gt;
* Security specialist can follow the &amp;quot;tickets&amp;quot; and audit trail and verify or Fail closed items and provide feedback.&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
&lt;br /&gt;
|target=_blank&lt;br /&gt;
&lt;br /&gt;
|budget=OWASP SKF&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br /&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&lt;br /&gt;
* http://www.secureby.design&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Testing_Guide OWASP Mobile Application Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-flagship-trans-85.png]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Milestones / Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Next major release features==&lt;br /&gt;
* Implement the MASVS Knowledge base items in the OWASP-SKF project &lt;br /&gt;
&lt;br /&gt;
* Implement MASVS process flow under the new project section &lt;br /&gt;
* Implement dynamic checklist creation for custom checklists to process flow under the new project section &lt;br /&gt;
* Add CWE to Knowledge base items &lt;br /&gt;
* Add how to pentest section per Knowledge base item (OWASP-Testing Guide)  &lt;br /&gt;
* Add internationalist feature to SKF for supporting multiple human languages  &lt;br /&gt;
* Market and brand the new AI chat-bot implementation  &lt;br /&gt;
* Add dynamic questionnaire creation that links questions to security requirements  &lt;br /&gt;
&lt;br /&gt;
Check out the detailed roadmap here: &lt;br /&gt;
&lt;br /&gt;
'''[https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== CI-Pipeline ==&lt;br /&gt;
&lt;br /&gt;
=== Travis-ci.org: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes! SKF Build details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://travis-ci.org/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Coveralls.io Python: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite. SKF Coveralls details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://coveralls.io/r/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== codecov.io for Angular: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Code coverage done right. Highly integrated with GitHub, Bitbucket and GitLab. SKF codecov details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://codecov.io/gh/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrutinizer-ci.com: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality. SKF Scrutinizer details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://scrutinizer-ci.com/g/blabla1337/skf-flask/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Bithound.io NPM packages: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;BitHound provides your Node team with comprehensive and prioritized issues in your code and npm packages. SKF Bithound details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://www.bithound.io/github/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Requires.io pip packages: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Stay Up-to-date! Stay secure! Requires.io monitors your Python projects dependencies, and notify you whenever any of your dependency is out-of-date. SKF Requires details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://requires.io/github/blabla1337/skf-flask/requirements/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Black Duck Security Risk: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Announcing Black Duck CoPilot, a new service helping open source project teams catalog and report on their project's dependencies. SKF Requires details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://copilot.blackducksoftware.com/github/groups/blabla1337/locations/skf-flask/public/results&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== uptimerobot.com: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&amp;lt;/code&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== ssllabs.com &amp;amp; sslbadge.org: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;ssllabs.org: Bringing you the best SSL/TLS and PKI testing tools and documentation. sslbadge.org: Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&amp;lt;/code&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=243176</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=243176"/>
				<updated>2018-09-05T10:45:51Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Use SKF to gather the right security requirements for your projects&lt;br /&gt;
* SKF then gives extensive knowledgebase items that correlates to the security requirements&lt;br /&gt;
* Developers can close &amp;quot;tickets&amp;quot; and leave an audit trail to determine possible technical depts or improvements&lt;br /&gt;
* Security specialist can follow the &amp;quot;tickets&amp;quot; and audit trail and verify or Fail closed items and provide feedback.&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
&lt;br /&gt;
|target=_blank&lt;br /&gt;
&lt;br /&gt;
|budget=OWASP SKF&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br /&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&lt;br /&gt;
* http://www.secureby.design&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Testing_Guide OWASP Mobile Application Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Midlevel.png]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Milestones / Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Next major release features==&lt;br /&gt;
* Implement the MASVS Knowledge base items in the OWASP-SKF project &lt;br /&gt;
&lt;br /&gt;
* Implement MASVS process flow under the new project section &lt;br /&gt;
* Implement dynamic checklist creation for custom checklists to process flow under the new project section &lt;br /&gt;
* Add CWE to Knowledge base items &lt;br /&gt;
* Add how to pentest section per Knowledge base item (OWASP-Testing Guide)  &lt;br /&gt;
* Add internationalist feature to SKF for supporting multiple human languages  &lt;br /&gt;
* Market and brand the new AI chat-bot implementation  &lt;br /&gt;
* Add dynamic questionnaire creation that links questions to security requirements  &lt;br /&gt;
&lt;br /&gt;
Check out the detailed roadmap here: &lt;br /&gt;
&lt;br /&gt;
'''[https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== CI-Pipeline ==&lt;br /&gt;
&lt;br /&gt;
=== Travis-ci.org: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes! SKF Build details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://travis-ci.org/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Coveralls.io Python: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite. SKF Coveralls details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://coveralls.io/r/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== codecov.io for Angular: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Code coverage done right. Highly integrated with GitHub, Bitbucket and GitLab. SKF codecov details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://codecov.io/gh/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrutinizer-ci.com: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality. SKF Scrutinizer details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://scrutinizer-ci.com/g/blabla1337/skf-flask/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Bithound.io NPM packages: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;BitHound provides your Node team with comprehensive and prioritized issues in your code and npm packages. SKF Bithound details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://www.bithound.io/github/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Requires.io pip packages: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Stay Up-to-date! Stay secure! Requires.io monitors your Python projects dependencies, and notify you whenever any of your dependency is out-of-date. SKF Requires details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://requires.io/github/blabla1337/skf-flask/requirements/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Black Duck Security Risk: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Announcing Black Duck CoPilot, a new service helping open source project teams catalog and report on their project's dependencies. SKF Requires details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://copilot.blackducksoftware.com/github/groups/blabla1337/locations/skf-flask/public/results&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== uptimerobot.com: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&amp;lt;/code&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== ssllabs.com &amp;amp; sslbadge.org: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;ssllabs.org: Bringing you the best SSL/TLS and PKI testing tools and documentation. sslbadge.org: Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&amp;lt;/code&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=242865</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=242865"/>
				<updated>2018-08-27T18:44:28Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Use SKF to gather the right security requirements for your projects&lt;br /&gt;
* SKF then gives extensive knowledgebase items that correlates to the security requirements&lt;br /&gt;
* Developers can close &amp;quot;tickets&amp;quot; and leave an audit trail to determine possible technical depts or improvements&lt;br /&gt;
* Security specialist can follow the &amp;quot;tickets&amp;quot; and audit trail and verify or Fail closed items and provide feedback.&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br /&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&lt;br /&gt;
* http://www.secureby.design&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Testing_Guide OWASP Mobile Application Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Midlevel.png]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Milestones / Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Next major release features==&lt;br /&gt;
* Implement the MASVS Knowledge base items in the OWASP-SKF project &lt;br /&gt;
&lt;br /&gt;
* Implement MASVS process flow under the new project section &lt;br /&gt;
* Implement dynamic checklist creation for custom checklists to process flow under the new project section &lt;br /&gt;
* Add CWE to Knowledge base items &lt;br /&gt;
* Add how to pentest section per Knowledge base item (OWASP-Testing Guide)  &lt;br /&gt;
* Add internationalist feature to SKF for supporting multiple human languages  &lt;br /&gt;
* Market and brand the new AI chat-bot implementation  &lt;br /&gt;
* Add dynamic questionnaire creation that links questions to security requirements  &lt;br /&gt;
&lt;br /&gt;
Check out the detailed roadmap here: &lt;br /&gt;
&lt;br /&gt;
'''[https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== CI-Pipeline ==&lt;br /&gt;
&lt;br /&gt;
=== Travis-ci.org: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes! SKF Build details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://travis-ci.org/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Coveralls.io Python: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite. SKF Coveralls details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://coveralls.io/r/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== codecov.io for Angular: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Code coverage done right. Highly integrated with GitHub, Bitbucket and GitLab. SKF codecov details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://codecov.io/gh/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrutinizer-ci.com: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality. SKF Scrutinizer details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://scrutinizer-ci.com/g/blabla1337/skf-flask/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Bithound.io NPM packages: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;BitHound provides your Node team with comprehensive and prioritized issues in your code and npm packages. SKF Bithound details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://www.bithound.io/github/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Requires.io pip packages: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Stay Up-to-date! Stay secure! Requires.io monitors your Python projects dependencies, and notify you whenever any of your dependency is out-of-date. SKF Requires details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://requires.io/github/blabla1337/skf-flask/requirements/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Black Duck Security Risk: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Announcing Black Duck CoPilot, a new service helping open source project teams catalog and report on their project's dependencies. SKF Requires details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://copilot.blackducksoftware.com/github/groups/blabla1337/locations/skf-flask/public/results&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== uptimerobot.com: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&amp;lt;/code&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== ssllabs.com &amp;amp; sslbadge.org: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;ssllabs.org: Bringing you the best SSL/TLS and PKI testing tools and documentation. sslbadge.org: Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&amp;lt;/code&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=242864</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=242864"/>
				<updated>2018-08-27T18:37:27Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* Video demo */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Use SKF to gather the right security requirements for your projects&lt;br /&gt;
* SKF then gives extensive knowledgebase items that correlates to the security requirements&lt;br /&gt;
* Developers can close &amp;quot;tickets&amp;quot; and leave an audit trail to determine possible technical depts or improvements&lt;br /&gt;
* Security specialist can follow the &amp;quot;tickets&amp;quot; and audit trail and verify or Fail closed items and provide feedback.&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br /&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&lt;br /&gt;
* http://www.secureby.design&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Testing_Guide OWASP Mobile Application Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Midlevel.png]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Milestones / Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Next major release features==&lt;br /&gt;
* Implement the MASVS Knowledge base items in the OWASP-SKF project &lt;br /&gt;
&lt;br /&gt;
* Implement MASVS process flow under the new project section &lt;br /&gt;
* Implement dynamic checklist creation for custom checklists to process flow under the new project section &lt;br /&gt;
* Add CWE to Knowledge base items &lt;br /&gt;
* Add how to pentest section per Knowledge base item (OWASP-Testing Guide)  &lt;br /&gt;
* Add internationalist feature to SKF for supporting multiple human languages  &lt;br /&gt;
* Market and brand the new AI chat-bot implementation  &lt;br /&gt;
* Add dynamic questionnaire creation that links questions to security requirements  &lt;br /&gt;
&lt;br /&gt;
Check out the detailed roadmap here: &lt;br /&gt;
&lt;br /&gt;
'''[https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== CI-Pipeline ==&lt;br /&gt;
&lt;br /&gt;
=== Travis-ci.org: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes! SKF Build details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://travis-ci.org/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Coveralls.io Python: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite. SKF Coveralls details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://coveralls.io/r/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== codecov.io for Angular: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Code coverage done right. Highly integrated with GitHub, Bitbucket and GitLab. SKF codecov details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://codecov.io/gh/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrutinizer-ci.com: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality. SKF Scrutinizer details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://scrutinizer-ci.com/g/blabla1337/skf-flask/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Bithound.io NPM packages: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;BitHound provides your Node team with comprehensive and prioritized issues in your code and npm packages. SKF Bithound details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://www.bithound.io/github/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Requires.io pip packages: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Stay Up-to-date! Stay secure! Requires.io monitors your Python projects dependencies, and notify you whenever any of your dependency is out-of-date. SKF Requires details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://requires.io/github/blabla1337/skf-flask/requirements/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Black Duck Security Risk: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Announcing Black Duck CoPilot, a new service helping open source project teams catalog and report on their project's dependencies. SKF Requires details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://copilot.blackducksoftware.com/github/groups/blabla1337/locations/skf-flask/public/results&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== uptimerobot.com: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&amp;lt;/code&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== ssllabs.com &amp;amp; sslbadge.org: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;ssllabs.org: Bringing you the best SSL/TLS and PKI testing tools and documentation. sslbadge.org: Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&amp;lt;/code&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=242862</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=242862"/>
				<updated>2018-08-27T18:30:09Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* Classifications */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Use SKF to gather the right security requirements for your projects&lt;br /&gt;
* SKF then gives extensive knowledgebase items that correlates to the security requirements&lt;br /&gt;
* Developers can close &amp;quot;tickets&amp;quot; and leave an audit trail to determine possible technical depts or improvements&lt;br /&gt;
* Security specialist can follow the &amp;quot;tickets&amp;quot; and audit trail and verify or Fail closed items and provide feedback.&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br /&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&lt;br /&gt;
* http://www.secureby.design&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Midlevel.png]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Milestones / Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Next major release features==&lt;br /&gt;
* Implement the MASVS Knowledge base items in the OWASP-SKF project &lt;br /&gt;
&lt;br /&gt;
* Implement MASVS process flow under the new project section &lt;br /&gt;
* Implement dynamic checklist creation for custom checklists to process flow under the new project section &lt;br /&gt;
* Add CWE to Knowledge base items &lt;br /&gt;
* Add how to pentest section per Knowledge base item (OWASP-Testing Guide)  &lt;br /&gt;
* Add internationalist feature to SKF for supporting multiple human languages  &lt;br /&gt;
&lt;br /&gt;
Check out the detailed roadmap here: &lt;br /&gt;
&lt;br /&gt;
'''[https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== CI-Pipeline ==&lt;br /&gt;
&lt;br /&gt;
=== Travis-ci.org: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes! SKF Build details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://travis-ci.org/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Coveralls.io Python: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite. SKF Coveralls details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://coveralls.io/r/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== codecov.io for Angular: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Code coverage done right. Highly integrated with GitHub, Bitbucket and GitLab. SKF codecov details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://codecov.io/gh/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrutinizer-ci.com: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality. SKF Scrutinizer details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://scrutinizer-ci.com/g/blabla1337/skf-flask/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Bithound.io NPM packages: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;BitHound provides your Node team with comprehensive and prioritized issues in your code and npm packages. SKF Bithound details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://www.bithound.io/github/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Requires.io pip packages: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Stay Up-to-date! Stay secure! Requires.io monitors your Python projects dependencies, and notify you whenever any of your dependency is out-of-date. SKF Requires details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://requires.io/github/blabla1337/skf-flask/requirements/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Black Duck Security Risk: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Announcing Black Duck CoPilot, a new service helping open source project teams catalog and report on their project's dependencies. SKF Requires details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://copilot.blackducksoftware.com/github/groups/blabla1337/locations/skf-flask/public/results&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== uptimerobot.com: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&amp;lt;/code&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== ssllabs.com &amp;amp; sslbadge.org: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;ssllabs.org: Bringing you the best SSL/TLS and PKI testing tools and documentation. sslbadge.org: Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&amp;lt;/code&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=241613</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=241613"/>
				<updated>2018-07-02T20:32:12Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* Classifications */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Use SKF to gather the right security requirements for your projects&lt;br /&gt;
* SKF then gives extensive knowledgebase items that correlates to the security requirements&lt;br /&gt;
* Developers can close &amp;quot;tickets&amp;quot; and leave an audit trail to determine possible technical depts or improvements&lt;br /&gt;
* Security specialist can follow the &amp;quot;tickets&amp;quot; and audit trail and verify or Fail closed items and provide feedback.&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br /&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&lt;br /&gt;
* http://www.secureby.design&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Midlevel.png]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Milestones / Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Next major release features==&lt;br /&gt;
* Implement the MASVS Knowledge base items in the OWASP-SKF project &lt;br /&gt;
&lt;br /&gt;
* Implement MASVS process flow under the new project section &lt;br /&gt;
* Add CWE to Knowledge base items &lt;br /&gt;
* Add how to pentest section per Knowledge base item (OWASP-Testing Guide)  &lt;br /&gt;
&lt;br /&gt;
Check out the detailed roadmap here: &lt;br /&gt;
&lt;br /&gt;
'''[https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== CI-Pipeline ==&lt;br /&gt;
&lt;br /&gt;
=== Travis-ci.org: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes! SKF Build details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://travis-ci.org/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Coveralls.io Python: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite. SKF Coveralls details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://coveralls.io/r/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== codecov.io for Angular: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Code coverage done right. Highly integrated with GitHub, Bitbucket and GitLab. SKF codecov details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://codecov.io/gh/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrutinizer-ci.com: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality. SKF Scrutinizer details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://scrutinizer-ci.com/g/blabla1337/skf-flask/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Bithound.io NPM packages: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;BitHound provides your Node team with comprehensive and prioritized issues in your code and npm packages. SKF Bithound details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://www.bithound.io/github/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Requires.io pip packages: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Stay Up-to-date! Stay secure! Requires.io monitors your Python projects dependencies, and notify you whenever any of your dependency is out-of-date. SKF Requires details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://requires.io/github/blabla1337/skf-flask/requirements/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Black Duck Security Risk: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Announcing Black Duck CoPilot, a new service helping open source project teams catalog and report on their project's dependencies. SKF Requires details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://copilot.blackducksoftware.com/github/groups/blabla1337/locations/skf-flask/public/results&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== uptimerobot.com: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&amp;lt;/code&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== ssllabs.com &amp;amp; sslbadge.org: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;ssllabs.org: Bringing you the best SSL/TLS and PKI testing tools and documentation. sslbadge.org: Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&amp;lt;/code&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=236901</id>
		<title>GSOC2018 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=236901"/>
				<updated>2018-01-18T21:18:07Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* OWASP Security Knowledge Framework */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
===Active Scanning WebSockets===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesnt current support active scanning (automated attacking) of websockets.&lt;br /&gt;
&lt;br /&gt;
We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* An plugable infrastructure that allows us to active scan websockets&lt;br /&gt;
* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
* Implementing new websocket specific scan rules&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== React Handling  ===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP doesnt understand React applications as well as it should be able to.&lt;br /&gt;
&lt;br /&gt;
It would be great if ZAP had a much better understanding of such applications, including how to explore and attack them more effectively.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* ZAP able to explore React applications more effectively&lt;br /&gt;
* ZAP able to attack React applications more effectively&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* As React is written in JavaScript, good knowledge of this language is recommended. ZAP is written in Java, so some knowledge of this language would be useful. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated authentication detection and configuration  ===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is time consuming and error prone.&lt;br /&gt;
&lt;br /&gt;
Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Detect login and registration pages&lt;br /&gt;
* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
&lt;br /&gt;
A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A documented definition of a text representation for Zest&lt;br /&gt;
* A parser that converts the text representation into a working Zest script&lt;br /&gt;
* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Develop Bamboo Addon ===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
It would be great to have an official ZAP add-on for [https://www.atlassian.com/software/bamboo Bamboo], equivalent to the one we now have for [https://wiki.jenkins.io/display/JENKINS/zap+plugin Jenkins]&lt;br /&gt;
&lt;br /&gt;
For more information about Bamboo plugins see the [https://developer.atlassian.com/server/bamboo/bamboo-plugin-guide/ Bamboo plugin guide].&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A Bamboo addon that supports:&lt;br /&gt;
* Spidering (using the traditional and Ajax spiders)&lt;br /&gt;
* Active Scanning&lt;br /&gt;
* Authentication&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* ZAP and Bamboo are written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes ZAP even better&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2018 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] user story])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Frontend Technology Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frontend framework AngularJS 1.x along with Bootstrap 3. Several major releases later, there now are [https://github.com/bkimminich/juice-shop/issues/165 Angular 5] and [https://github.com/bkimminich/juice-shop/issues/400 Bootstrap 4] available as well as other mature web frontend frameworks. Migrating the OWASP Juice Shop to the latest version of Angular and Bootstrap is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target client-architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, testing and building&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== UI/Graphics Design Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The UI of OWASP Juice Shop was written following recommendations from Twitter Bootstrap to be responsive, but it never had an actual designer or graphics artist take a look or add some insight. Currently the look &amp;amp; feel comes &amp;quot;out of the box&amp;quot; from a [https://bootswatch.com Bootswatch] theme and [https://fontawesome.com Font Awesome 5] icons. This gives it a quite modern look, but also leaves it very generic. The project could greatly benefit from involvement of someone with actual UI/UX Design expertise. Having a matching theme for [https://ctfd.io CTFd] would be another big achievement for the Juice Shop.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Design concepts to pick or have the user community vote on (including color schemes, sample screens, icons etc.)&lt;br /&gt;
* Overhauling the overall UI look &amp;amp; feel, e.g. by making an individual Bootswatch theme or designing some individual icons&lt;br /&gt;
* Getting rid of the stock images by providing individually designed product images for the standard inventory of the shop&lt;br /&gt;
* Add more flexibility and options to the existing theming/customization of the UI (see [https://github.com/bkimminich/juice-shop/issues/379 #379])&lt;br /&gt;
* Design a [https://github.com/bkimminich/juice-shop-ctf/issues/9 &amp;quot;Juice Shop&amp;quot; CTFd-theme] playing well with the look &amp;amp; feel of the application&lt;br /&gt;
* Execution of migration without breaking functionality or client-side unit and end-to-end tests along the way&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the existing HTML views and CSS of the frontend&lt;br /&gt;
* Get a feeling for the high quality bar by inspecting the existing client-side unit and e2e test suites&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Strong web and graphic design experience&lt;br /&gt;
* Sophisticated HTML and CSS experience&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework - Chatbot machine learning feature==&lt;br /&gt;
&lt;br /&gt;
=== Brief Explanation ===&lt;br /&gt;
We want to create a SKF Chatbot service using the knowledge already inside SKF like the knowledge base items, code examples and the security controls like ASVS and PCI DSS.&lt;br /&gt;
&lt;br /&gt;
The chatbot service and core of this new feature can be consumed by website’s as an addon, IDE of developers and website chat channels like Gitter.im.&lt;br /&gt;
&lt;br /&gt;
The core of the SKF Chatbot will be using machine learning to accomplish the hard task of correlating data and merging different sources as a response/answer.&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
# A Defined Knowledge Base (Data Structure / DB) which can be used to define and search for entities. For example: if a query is:&lt;br /&gt;
## How to mitigate CSRF in PHP   the system should be able to understand or translate it to:  {How: intent} to {mitigate: solution} {CSRF: attack} in {PHP: programming language}  This kind of query can be further user to fetch right information in the knowledge base and provide right solution (code example) for mitigating CSRF in PHP.&lt;br /&gt;
## What is CSRF?   the system should be able to understand or translate it to:  {What: intent} is {CSRF: attack/defense}  This kind of query can be further user to fetch right information in the knowledge base that explains CSRF and provide the security control from example ASVS&lt;br /&gt;
# An ETL process to convert existing SKF Knowledge data and ASVS data to above mentioned data structure.&lt;br /&gt;
# A Chatbot (using existing frameworks) to:&lt;br /&gt;
## Understand at least two intent like (How to, What is …..) and be able to enrich the user query as mentioned above.&lt;br /&gt;
## Based on enriched query fetch relevant information from knowledge base and return.&lt;br /&gt;
# An integration to some chat system like Gitter.im, IRC, Slack etc.&lt;br /&gt;
&lt;br /&gt;
=== Knowledge Prerequisites ===&lt;br /&gt;
* Programming languages:&lt;br /&gt;
** OWASP-SKF API is build in Python 3.6/3.7&lt;br /&gt;
** OWASP-SKF Frontend is build with Angular 4 TS&lt;br /&gt;
* Machine learning enthusiastic/interest&lt;br /&gt;
&lt;br /&gt;
=== Proposal from student ===&lt;br /&gt;
* We want to ask from the student to write a proposal on how to approach the problem we described.&lt;br /&gt;
'''Mentors''':&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org] Glenn ten Cate [mailto:glenn.ten.cate@owasp.org] Minhaz [mailto:minhaz@owasp.org]&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker==&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.&lt;br /&gt;
&lt;br /&gt;
if you need more details please visit the [https://github.com/viraintel/OWASP-Nettacker GitHub page] or contact a leader([mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:reza.espargham@owasp.org Reza Espargham]).&lt;br /&gt;
&lt;br /&gt;
===Getting started===&lt;br /&gt;
&lt;br /&gt;
* You may read the available documents in the [https://github.com/viraintel/OWASP-Nettacker/wiki wiki page]. Developers and users documents are separated.&lt;br /&gt;
&lt;br /&gt;
'''A Better Penetration Testing Automated Framework'''&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
The expected results are to contribute the OWASP Nettacker framework [https://github.com/viraintel/OWASP-Nettacker/issues issues] (mostly help wanted or enhancement). Please check the GitHub repo to learn more.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* The whole framework was written in Python language. You must be familiar with Python 2.x, 3.x.&lt;br /&gt;
* Good knowledge of computer security (and penetration testing)&lt;br /&gt;
* Knowledge of OS (Linux, Windows, Mac...) and Services&lt;br /&gt;
* Familiar with IDS/IPS/Firewalls and ...&lt;br /&gt;
* To develop the API you should be familiar with HTTP, Database...&lt;br /&gt;
&lt;br /&gt;
===Mentors===&lt;br /&gt;
Mentors are: [mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:abiusx@owasp.org Abbas Naderi Afooshteh]&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/ui-break.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP CSRF Protector ==&lt;br /&gt;
[[CSRFProtector Project|OWASP CSRF Protector Project]] is a project started with the goal to help developer to mitigate CSRF in web applications with ease. It's based on [[Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet|Synchronizer Token Pattern]] and leverages an injected java-script code to provide CSRF mitigation without much developer intervention. So far it has been implemented as a [https://github.com/mebjas/CSRF-Protector-PHP PHP Library] and an [[CSRFProtector Project|Apache 2.2.x module]]. Although different libraries and frameworks provide CSRF mitigation these days - all of them require developer to explicitly inject tokens with every form. &lt;br /&gt;
===OWASP CSRF Protector - Extending the design as a python package to work with Flask and an Express JS (Node.JS) middleware===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The design of CSRF Protector involves a server side middle-ware that intercepts every incoming request and validates them for CSRF attacks. If the validation is successful the flow of control goes to business logic and the tokens are refreshed. In case of failed validation configured actions are taken. Post that, another middle ware takes care of injecting a JavaScript code (refer [https://github.com/mebjas/CSRF-Protector-PHP/blob/master/js/csrfprotector.js CSRF Protector PHP JS Code]) to HTML output. On the client side this code ensures that, for every request that require validation - the correct token is sent along with the request.&lt;br /&gt;
&lt;br /&gt;
Check [https://github.com/mebjas/CSRF-Protector-PHP/wiki GitHub Wiki] for some reference;&lt;br /&gt;
&lt;br /&gt;
The goal of this project would be to:&lt;br /&gt;
# Port this design to a python module that can be used easily with Flask - [https://github.com/mebjas/CSRF-Protector-py/projects/1?add_cards_query=is%3Aopen Kanban Board]&lt;br /&gt;
# Port this design to a node js module that can work well with express js (a popular Node.JS based framework). - [https://github.com/mebjas/CSRF-Protector-JS Initial Repo Link]&lt;br /&gt;
# Fix some outstanding issues with java-script code used in library: [https://github.com/mebjas/CSRF-Protector-PHP/issues?q=is%3Aopen+is%3Aissue+label%3AJS Issues] &lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: Clean, maintainable (ES6 compatible and using recommended design patterns) in case of Node.JS'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Javascript (Client Side), Python (having worked with flask preferable), Node.JS (having worked with node.js and middle wares preferable)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Contact: [mailto:minhaz@owasp.org;minhazv@microsoft.com Minhaz A V]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=236408</id>
		<title>GSOC2018 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=236408"/>
				<updated>2017-12-24T12:33:15Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: Added OWASP-SKF project to the GSOC list&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/Hackademic/hackademic github repository] and especially the [https://github.com/Hackademic/hackademic/issues open tickets]&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
===Zest Text Representation and Parser===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
&lt;br /&gt;
A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A documented definition of a text representation for Zest&lt;br /&gt;
* A parser that converts the text representation into a working Zest script&lt;br /&gt;
* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes ZAP even better&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== SAMPLE: OWASP Hackademic Challenges ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Hackademic Challenges Project]]  helps you test your knowledge on web application security. You can use it to actually attack web applications in a realistic but also controllable and safe environment. After a wonderfull 2016 GSoC with 100 new challenges and a couple of new plugins we're mainly looking to get new features in and maybe a couple of challenges. Bellow is a list of proposed features.&lt;br /&gt;
&lt;br /&gt;
=== REST API for the sandbox ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
During the last summer code sprint Hackademic got challenge sandboxing in the form of vagrant and docker wrappers as well as an engine to start and stop the container or vm instances.&lt;br /&gt;
What is needed now is a rest api which supports endpoint authentication and authorization which enables the sandbox engine to be completely independed from the rest of the project.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
Since the sandbox is written in python, you will be using Django to implement the api.&lt;br /&gt;
The endpoint authorization can be done via certificates or plain signature or username/password type authentication. We would like to see what's your idea on the matter.&lt;br /&gt;
However the communication between the two has to be over a secure channel.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A REST style api which allows an authenticated remote entity control the parts of the  sandbox engine it has access to.&lt;br /&gt;
* PEP8 compliant code&lt;br /&gt;
* Acceptable unit test coverage&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Since this has been a popular project here's a suggestion on how to get started.&lt;br /&gt;
* Check the excellent work done by mebjas and a0xnirudh in their respective brances in the project's repository&lt;br /&gt;
* Take a brief look at the code and try to get a feeling of the functionality included. (Essentially it's CRUD operations on vms or containers)&lt;br /&gt;
* Read on what Docker and Vagrant are and take a look at their respective py-libraries&lt;br /&gt;
* If you think that contributing helps perhaps it would be a good idea to start with lettuce tests on the current CRUD operations of the existing functionality(which won't change and can eventually be ported to the final project) &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Python, test driven development, some idea what REST is, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:konstantinos.papapanaqiotou@owasp.org Konstantinos Papapanagiotou][mailto:spyros.gasteratos@owasp.org Spyros Gasteratos] - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== New CMS ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The CMS part of the project is really old and has accumulated a significant amount of technical debt.&lt;br /&gt;
In addition many design decisions are either outdated or could be improved. &lt;br /&gt;
Therefore it may be a good idea to leverage the power of modern web frameworks to create a new CMS.&lt;br /&gt;
The new cms can be written in python using Django.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* New cms with same functionality as the old one (3 types of users -- student, teacher, admin--, 3 types of resources -- article challenge, class--, ACL type permissions, CRUD operations on every resource/user, all functionality can be extended by Plugins.&lt;br /&gt;
* REST endpoints in addition to classic ones&lt;br /&gt;
* tests covering all routes implemented, also complete ACL unit tests, it would be embarassing if a cms by OWASP has rights vulnerabilities.&lt;br /&gt;
* PEP 8 code&lt;br /&gt;
&lt;br /&gt;
''' Note: '''&lt;br /&gt;
This is a huge project, it is ok if the student implements a part of it. However whatever implemented must be up to spec.&lt;br /&gt;
If you decide to take on this project contact us and we can agree on a list of routes.&lt;br /&gt;
If you don't decide to take on this project contact us.&lt;br /&gt;
Generally contact us, we like it when students have insightful questions and the community is active&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting Started: '''&lt;br /&gt;
* Install and take a brief look around the old cms so you have an idea of the functionality needed&lt;br /&gt;
* It's ok to scream in frustration&lt;br /&gt;
* If you want to contribute to get a feeling of the platform a good idea would be lettuce tests for the current functionality (which won't change and you can port in the new cms eventually)&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Python, Django, what REST is, the technologies used, some security knowledge would be nice.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:konstantinos.papapanaqiotou@owasp.org Konstantinos Papapanagiotou][mailto:spyros.gasteratos@owasp.org Spyros Gasteratos] - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge framework==&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell'''&lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
*Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
===Expected Results===&lt;br /&gt;
*Adding features to SKF project&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/369&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/367&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/68&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/95&lt;br /&gt;
*Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
*Adding/updating knowledge base items&lt;br /&gt;
*Adding CWE references to knowledgebase items&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/35&lt;br /&gt;
*Improve unit testing of the Angular quality, currently only 68% of the front-end is unit tested automated &lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/352&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
*For helping in the development of new features and functions  you need Python flask and for the frond-end we use Angular 4.0&lt;br /&gt;
*For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
*For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
*For writing the verification guide you need some penetration testing experience.&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org] Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=232503</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=232503"/>
				<updated>2017-08-23T16:20:35Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: Clean up wiki page roadmap section.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Use SKF to gather the right security requirements for your projects&lt;br /&gt;
* SKF then gives extensive knowledgebase items that correlates to the security requirements&lt;br /&gt;
* Developers can close &amp;quot;tickets&amp;quot; and leave an audit trail to determine possible technical depts or improvements&lt;br /&gt;
* Security specialist can follow the &amp;quot;tickets&amp;quot; and audit trail and verify or Fail closed items and provide feedback.&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br /&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&lt;br /&gt;
* http://www.secureby.design&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Midlevel.png]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the detailed roadmap here: &lt;br /&gt;
&lt;br /&gt;
'''[https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== CI-Pipeline ==&lt;br /&gt;
&lt;br /&gt;
=== Travis-ci.org: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes! SKF Build details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://travis-ci.org/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Coveralls.io Python: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite. SKF Coveralls details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://coveralls.io/r/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== codecov.io for Angular: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Code coverage done right. Highly integrated with GitHub, Bitbucket and GitLab. SKF codecov details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://codecov.io/gh/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrutinizer-ci.com: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality. SKF Scrutinizer details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://scrutinizer-ci.com/g/blabla1337/skf-flask/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Bithound.io NPM packages: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;BitHound provides your Node team with comprehensive and prioritized issues in your code and npm packages. SKF Bithound details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://www.bithound.io/github/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Requires.io pip packages: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Stay Up-to-date! Stay secure! Requires.io monitors your Python projects dependencies, and notify you whenever any of your dependency is out-of-date. SKF Requires details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://requires.io/github/blabla1337/skf-flask/requirements/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Black Duck Security Risk: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Announcing Black Duck CoPilot, a new service helping open source project teams catalog and report on their project's dependencies. SKF Requires details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://copilot.blackducksoftware.com/github/groups/blabla1337/locations/skf-flask/public/results&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== uptimerobot.com: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&amp;lt;/code&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== ssllabs.com &amp;amp; sslbadge.org: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;ssllabs.org: Bringing you the best SSL/TLS and PKI testing tools and documentation. sslbadge.org: Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&amp;lt;/code&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Glenn_%26_Riccardo_ten_Cate&amp;diff=231726</id>
		<title>Glenn &amp; Riccardo ten Cate</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Glenn_%26_Riccardo_ten_Cate&amp;diff=231726"/>
				<updated>2017-07-17T07:11:23Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Project leaders of OWASP-SKF ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Security Knowledge Framework]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Glenn ten Cate.jpg|thumb]]&lt;br /&gt;
&lt;br /&gt;
'''About Glenn'''&lt;br /&gt;
&lt;br /&gt;
- Glenn ten Cate&amp;lt;br&amp;gt;&lt;br /&gt;
- From the Netherlands&amp;lt;br&amp;gt;&lt;br /&gt;
- More then 10 years active in Security / Hacking world&amp;lt;br&amp;gt;&lt;br /&gt;
- Specialized in web-application / server security&amp;lt;br&amp;gt;&lt;br /&gt;
- Coding experience in different languages&amp;lt;br&amp;gt;&lt;br /&gt;
- Developer / Contributor of multiple open-source security projects&amp;lt;br&amp;gt;&lt;br /&gt;
- Goal would be, creating an open-source SDLC with the tools and knowledge so everybody is empowered to do security by design and deliver high quality software&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Contact Info:'''glenn.ten.cate@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Riccardo_Ten_Cate_Profile_Picture.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''About Riccardo:'''&lt;br /&gt;
&lt;br /&gt;
As a freelance penetration tester and software developer from the Netherlands Riccardo specialises in web-application security and has extensive knowledge in securing web applications in multiple coding languages. &lt;br /&gt;
&lt;br /&gt;
'''Contract Info:''' riccardo.ten.cate@owasp.org&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WASPY_Awards_2017&amp;diff=231725</id>
		<title>WASPY Awards 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WASPY_Awards_2017&amp;diff=231725"/>
				<updated>2017-07-17T07:10:33Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: Added link to names&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:WASPY 2017 Banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
==Purpose of the Awards==&lt;br /&gt;
&lt;br /&gt;
Each year there are many individuals who do amazing work, dedicating countless hours to share, improve, and strengthen the OWASP mission. Some of these individuals are well known to the community while others are not. &lt;br /&gt;
&lt;br /&gt;
'''The purpose of these awards is to bring recognition to those who &amp;quot;FLY UNDER THE RADAR&amp;quot;. These are the individuals who are passionate about OWASP, who contribute hours of their own free time to the organization to help improve the cyber-security world, yet seem to go unrecognized.''' &lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
Call for Nominees Opens June 7, 2017  &lt;br /&gt;
&lt;br /&gt;
Call for Nominees Closes June 30, 2017 - CLOSED &lt;br /&gt;
&lt;br /&gt;
Announcement of Nominees per Category July 5, 2017 - DONE &lt;br /&gt;
&lt;br /&gt;
Deadline for Nominee Profile Picture and Bio to be created and added to the Nominees section July 10, 2017 &lt;br /&gt;
&lt;br /&gt;
Voting for Board &amp;amp; Staff Members Opens July 17, 2017 &lt;br /&gt;
&lt;br /&gt;
Voting for Board &amp;amp; Staff Members Closes July 24, 2017  &lt;br /&gt;
&lt;br /&gt;
Winners are Notified July 25, 2017 &lt;br /&gt;
&lt;br /&gt;
Announcement of Winners to the Community July 25, 2017 &lt;br /&gt;
&lt;br /&gt;
Award Ceremony at AppSecUSA 2017 in Orlando, FL September 21-22, 2017 &lt;br /&gt;
&lt;br /&gt;
==Categories==&lt;br /&gt;
The WASPYs celebrate the actors in our community who grow OWASP and drive innovation to the safety and security of the world’s software. This year we are excited to offer three categories.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Community Supporter''' - The WASPY for COMMUNITY honors members who create dynamic INTERACTION and LEARNING opportunities for the OWASP Community.  Nominees to the Community WASPY Award create collaborative and inclusive environments and grow the OWASP Community.  WASPYs focus on the unsung heros of the OWASP community.  Chapter Leaders and Community Members should especially consider leaders and volunteers who bring something extra to the environment, help the chapter reach out to new attendees, or carry out the tedious and repetitive tasks that make growing an OWASP Chapter possible.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Mission Outreach'''  - The WASPY for Mission Outreach honors community members who help the community GROW.  Growth can happen inside the larger OWASP community or outside it in the broader AppSec and development communities.   Leaders and Members should especially consider volunteers who pushed the boundaries of the audience and reach of OWASP to provide new exposure for OWASP’s projects and chapters.  New leaders and volunteers who help bring more people to your chapter, project, or actively represent OWASP at non-OWASP events, gatherings, and activities to build an active OWASP community are ideal candidates for the Mission Outreach WASPY award.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Innovator'''  - The WASPY for Innovation is given to a community member who has contributed to the TECHNICAL advancement of OWASP in the past year.  This advancement is usually through an [[:Category:OWASP Project|OWASP Project]] and can be in the form of code, an application, or anything that materially makes the AppSec community better in a unique way.  WASPYs focus on the unsung heros of the OWASP community who quietly go about making the world a bit better for their work.  Project Leaders and Community Members should especially consider nominating new projects, projects that have recently graduated, and project contributors for this WASPY.&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
'''Remember the purpose of these awards is to recognize the UNSUNG HEROS out there, that are barely recognized for their contributions to the OWASP Foundation.''' &lt;br /&gt;
&lt;br /&gt;
1. [https://www.owasp.org/index.php/About_OWASP#2015_Global_Board_Members Board members] may not be nominated &lt;br /&gt;
&lt;br /&gt;
2. [https://www.owasp.org/index.php/About_OWASP#Employees_and_Contractors_of_the_OWASP_Foundation Employees &amp;amp; Contractors] may not be nominated &lt;br /&gt;
&lt;br /&gt;
3. All nominees will remain anonymous until July 3, 2017&lt;br /&gt;
&lt;br /&gt;
4. Anyone can nominate an &amp;quot;unsung hero&amp;quot; who has contributed in some way to OWASP who they feel best fits each category &lt;br /&gt;
&lt;br /&gt;
5. You may only nominate one person per category &lt;br /&gt;
&lt;br /&gt;
=='''And the Nominees Are...'''==&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot; align=&amp;quot;center&amp;quot; scope=&amp;quot;col&amp;quot; |Name&lt;br /&gt;
! width=&amp;quot;800&amp;quot; align=&amp;quot;center&amp;quot; scope=&amp;quot;col&amp;quot; |Category &amp;amp; Citation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |Aatral Arasu&lt;br /&gt;
|'''''Best Community Supporter''''' &lt;br /&gt;
&amp;quot;A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Sean has not only worked as a volunteer in the local chapter building community, his code projects are useful to the mission and his outreach efforts have included funding requests for OWASP Foundation to grow its mission. Sean is a great example of a community member.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Nicole Becher&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Nicole has been an amazing chapter leader. She brings knowledge and experience teaching cybersecurity to the Mentor Initiative, WIA Committee, and projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Ken Belva&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Ken is a long time chapter leader of the NYC chapter and a former chapter leader of the Brooklyn Chapter. Ken is always willing to step in and volunteer to help with OWASP initiatives and is a frequent participant in OWASP events as both a volunteer and speaker. Ken has spoken at AppSec USA on XSS techniques (&amp;lt;nowiki&amp;gt;https://www.youtube.com/watch?v=G539NwvpL3I&amp;lt;/nowiki&amp;gt;) and is the project lead for the Basic Expression and Lexicon Variation Algorithms project (&amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Basic_Expression_%26_Lexicon_Variation_Algorithms_(BELVA)_Project)&amp;lt;/nowiki&amp;gt;.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tony Clarke&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Tony has selflessly brought the OWASP dublin chapter to great nights. He has nurtured the chapter to be inclusive and open whilst growing the average attendee count to hundreds. He has spread the word across both security industry and developer industry and has also managed to get various organisations to work together such as ISACA, IISF, ISSA and ISC2. He is a great leader and despite detractors has built the chapter and awareness of software security issues in a strong vendor neutral manner to a great place. Tony is a great example of OWASP and industry leadership.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Dinis Cruz&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Diniz is a fantastic innovator and motivator. As the mastermind and organizer behind the OWASP Summit he has managed to re-energize the OWASP community - many interesting projects would not have happened (or at least, not been that successful) without his passionate work. Besides organizing the event, he also consistently supported project leaders with his experience and ideas.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' Dinis put ridiculous effort (&amp;lt;nowiki&amp;gt;https://github.com/OWASP/owasp-summit-2017/commits?author=DinisCruz&amp;lt;/nowiki&amp;gt;) into the OWASP Summit 2017 and didn't tire promoting this event!&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Dune73|Christian Folini]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Christian Folini is very active in the Core Rule Set project community. He responds to a ton of questions submitted by newcomers when they are stuck and he answers expert level questions with stunning detail. He joined Chaim and Walter when they revived the project in 2016 and I heard he had the idea for the famous CRS3 release poster &amp;lt;nowiki&amp;gt;https://modsecurity.org/crs/poster&amp;lt;/nowiki&amp;gt; that was shared all over the net.  I think it's people like him that give OWASP a human face.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Fuentes.joaquin|Joaquin Fuentes]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;In 2015, Joaquin took it upon himself to revive the OWASP Phoenix Chapter. He created a meet-up group to gain broader visibility. Since 2015, the meeting attendance has grown from an average of 15 attendees to over 60! Joaquin dedicates a lot of time and effort into scheduling an impressive variety of presentation topics including safe hacking, vulnerability scanner deep dives, hands on web exploitation CTF, video game hacking and more. I learn something new and cool at every event.&lt;br /&gt;
&lt;br /&gt;
More importantly, Joaquin works hard to foster a friendly, inclusive environment. During our hands-on web exploitation session, Joaquin recruited co-works to assist participants with the Security Shephard challenges so no one felt overwhelmed or impossibly stuck. He always takes the time meet and welcome new members. For example, my 17-year-old son attends meetings with me. He looks up to Joaquin as a mentor for a future information security career because Joaquin encourages his learning and offers career guidance.&lt;br /&gt;
&lt;br /&gt;
I highly recommend Joaquin for a WASPY award!! He is a kind, soft spoken person with a passion for sharing information security and helping others!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;He resurrected the Phoenix chapter and has kept it going with great content.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation:''' &amp;quot;For all he has done to build up the Phoenix OWASP community. Prior to Joaquin taking point the community in Phoenix was dead. Meetings weren't happening on a regular basis. The prior leaders had done a great job but I think they had burnt out. Joaquin started the community back up and got corporate support from his employer to facilitate not only regular meetings but great meetings with great content. He also implemented MeetUp. I'm not a consistent attendee because of my work/life schedule but I always know when the meetings are happening and what the subject matter will be because of Joaquin utilizing MeetUp.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''4th Citation:''' &amp;quot;Put simply, due to the efforts of Joaquin Fuentes, the Phoenix chapter has risen from the ashes (some pun intended). Before Joaquin took over the chapter there were consistently between 5-10 persons in attendance, Joaquin himself being one of them, and the chapter only met about every 3 months or so. Since Joaquin took over the chapter, we have had fantastic presenters each month, paid for dinners, along with a collaborative, comfortable, and engaging environment to meet in. Even more impressive the attendance has grown to 60+ consistently. Joaquin isn't even done yet! He is more great ideas and plans for the chapter that will undoubtedly contribute to the continued growth and over all quality of this once fallen chapter. When he speaks of where this chapter has come from and his plans for the future, it is undeniable to all that he does so with the passion that a leader must possess to accomplish that which Joaquin has.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''5th Citation:''' &amp;quot;I am sure someone else will write in with Joaquin's email, but I felt the need to second his name on the list. The events he puts together are top notch, have excellent speakers, always have things to eat, and are generally excellent. I almost never miss them. He is actually so gracious about the entire chapter that I am sure he does not get the credit he deserves... the whole show is put on by just him, I think. Yay Joaquin!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''6th Citation:''' &amp;quot;A few years ago, the Phoenix (AZ) OWASP group was basically defunct. As the leader of the Phoenix OWASP group, not only has Joaquin helped to resurrect the group, but we've had great presentations on reverse engineering, secure coding, a hands-on CTF contest with Security Shepherd, etc. Joaquin is a very visible member of the security community being an employee at Early Warning, which not only hosts the OWASP meetings, but also is a sponsor and makes a strong showing at CactusCon every year, the biggest security conference in Arizona.&lt;br /&gt;
&lt;br /&gt;
Our local OWASP group is not strong, going from being non-existent a few years ago to now getting a regular attendance of 40-80 people. I've gotten to know Joaquin through OWASP meetings and other security events in the area I have crossed paths with him, and he is a fine representative and evangelist for the OWASP organization.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''7th Citation:''' &amp;quot;Joaquin is the Phoenix OWASP Chapter leader and regularly plans amazing talks with great speakers for the Phoenix Community. Frequently, the Phoenix OWASP talks will have over 50 attendees which Joaquin manages without a problem! Joaquin also pushes for candidates he is interviewing to be familiar with OWASP before their interview.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''8th Citation:''' &amp;quot;Joaquin is the leader for the Phoenix OWASP, and it is clear that through his leadership the Phoenix OWASP thrives. Joaquin organizes all the meetings, and is constantly working with folks to create an excellent sense of community in the Phoenix area.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''9th Citation:''' &amp;quot;Joaquin has taken the Phoenix OWASP chapter that had not been managed for years and brought it back to life. We consistently see 50+ members coming to our Meetups to talk about AppSec related topics. Joaquin is well connected to the InfoSec groups and has had great success in pulling in new speakers, we have already had a few speakers who are prepping their BlackHat and DefCon talks by giving their presentations to our local chapter. Finally Joaquin does a great job by reaching out to the local colleges and supporting CTF activities to garner interest in pen-testing and the OWASP community. He is a true community supporter and fully deserves a WASPY for his efforts...&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''10th Citation:''' &amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''11th Citation:''' &amp;quot;As a leader of Phoenix OWASP chapter, Joaquin strives to organize talks and trainings to make people in the valley learn InfoSec and AppSec from experienced individuals. He has always gone a step ahead to conduct OWASP meetings that are informative and hands on. Right from giving Arizona State University (ASU) students an overview of basic InfoSec and career opportunities to organizing a hands on hacking workshop for people in the community, Joaquin has always demonstrated passion and determination to take Phoenix to a better place in the field of Cyber Security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''12th Citation:''' &amp;quot;I've attended and participated in three OWASP meetings lead by Joaquin. They are always well organized, offer a great learning experience and considerably contribute to the community. His continuous interest and dedication to the Phoenix chapter do not go unnoticed and are appreciated by all who attend.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''13th Citation:''' &amp;quot;Joaquin restarted the OWASP chapter in Phoenix/Scottsdale. Chapter meetings have grown significantly to where there were about 65 attendees at the most recent meeting with hundreds more on the mailing list (I was at the meeting, but I've only heard about the mailing list). As someone who works with him, I know how dedicated he is to the work of IT security and he's been able to attract top-notch speakers for OWASP meetings.'&lt;br /&gt;
&lt;br /&gt;
'''14th Citation:''' &amp;quot;Joaquin had successfully revived the Phoenix OWASP Chapter. Since, the chapter has excelled from zero to filled audience bringing security talent from all around to speak and educate to security professionals on the many facets of security domains.&lt;br /&gt;
&lt;br /&gt;
Additionally, this has provided a great forum to network with the many security professionals around the community and share their knowledge and strengthen the security community. &lt;br /&gt;
&lt;br /&gt;
Joaquin has provided his unselfish time as an OWASP Chapter leader, and has breathed new life into the Chapter.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''15th Citation:''' &amp;quot;Joaquin does a bang up job of running the Phoenix OWASP chapter. He does a great job of raising awareness and bringing folks from the infosec community into the fold.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''16th Citation:''' &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''17th Citation:''' No citation was submitted&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/User:Brianglas Brian Glas]&lt;br /&gt;
|'''''Best Community Supporter''''' &lt;br /&gt;
&amp;quot;Brian has been paramount in 2 very strategic initiatives for OWASP. He is not only a Project Leader for the OWASP SAMM project but he has been instrumental in revamping the call for data and reorganizing the flagship OWASP Top Ten. Brian continues to support and speak about the benefits of supporting OWASP especially projects and participating in the Summit. Please consider Brian Glas as the Best Community Supporter for this year.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Brendan Gormley&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Throughout the Brendan has not only assisted in making the dublin chapter events happen but taken a lead role. Brendan has organised venues and speakers for these events often going above and beyond to ensure success. Brendan has also been involved in some of the outreach programs the Dublin chapter had been involved in. No task is too big or too small for Brendan and without him I don't believe the Dublin chapter would be what it is.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/User:Tanyajanca Tanya Janca]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Tanya Janca has been performing “outreach” and “recruitment of women” as her main chapter leader responsibilities for the Ottawa chapter since 2015. The chapter has not only grown by over 500% in that time, but female membership has grown from 2 female members to over 70 (the chapter has grown for many reasons, some of which are her promotional efforts). Activities include starting a mentoring program that matches senior AppSec members of the community with juniors or people who are hoping to get into Application Security; attending all sorts of technology meetups (but especially female-centric ones) to talk about OWASP and personally invite them to attend; bringing OWASP products, concepts and resources to the Canadian Government (and is currently attempting to sway policy to be more application security focused as we speak); as well as performing over 40 public speaking engagements that describe OWASP as “Your new BFF” as part of the application security lesson she has taught. She has also begun speaking at conferences semi-regularly, singing OWASP’s praises as part of every presentation. She also forms female groups to attend events together, to make them more accessible, such as her all-female team for the Ottawa iHack CTP and “Learn by Breaking things” event in June 2017 and her all female CTF team for OWASP Ottawa’s first CTF in 2015. Her claim of being an “application security evangelist” certainly seems fitting.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Jeremy_Long Jeremy Long]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Jeremy is a dedicated security engineer who contributes to the community as a developer, mentor, contributor and leader. He's one of the smartest people I know - and one of the few who has patience with &amp;quot;the rest of us&amp;quot;. He is generous with his time and knowledge, helping not only to contribute apps and resources, but to build up the community itself.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Makash|Akash Mahajan]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Akash has been backbone of OWASP bangalore chapter he has done lot of work for evangelizing OWASP. For more than 7 years now he has been working with the chapter and mentored lot of folks. No wonder he is called &amp;quot;the web app security guy&amp;quot;.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Dhiraj_Mishra Dhiraj Mishra]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Dhiraj Mishra - has been contributed and volunteered to, OWASP Mumbai Student chapter and Mumbai local chapter.&lt;br /&gt;
&lt;br /&gt;
He has endorse students to be part of multiple open community, however been an Sudent Chapter leader for OWASP he has discussed and shared multiple Information Security topics start from the scratch and spreading the idea's and awareness via chapter Meets, he has taken multiple session in NULL as well which runs with OWASP local chapter Mumbai, recently he invited Mozilla Club Mumbai to student chapter so that students can go to their area of interest, he always pushup/boost women in infosec. Apart from this he has taken various sessions in different colleges and have shared knowledge about Cyber Security.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Denise Murtagh-Dunne&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Denise has been a hugely active member of the Dublin chapter and has been involved in all chapter meeting throughout the year and is ever keen to role up her sleeves and get stuck into work that others shy away from. This includes everything from setting up the meeting tools, organising venues, working with sponsors, getting speakers and assisting speakers in the run up and during events. She's been a very positively influence on the community and chapter and has encouraged other people to get involved. She's constantly updating and posting content on our social media accounts and making sure our members get relevant and interesting content. While in full time employment, Denise gives up family time to contribute to the chapter and ensure OWASP Dublin remains a vibrant and relevant group that engages the developer and security community locally.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Owen_Pendlebury|Owen Pendlebury]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Owen Pendlebury has been a key local OWASP volunteer over the last number of years. From being on the local Dublin chapter board to leading the Dublin chapter he regularly hosted and spoke at numerous collaborative and insightful security meetups.&lt;br /&gt;
&lt;br /&gt;
He has also been involved in organising AppSec EU in Rome and more recently co-organised the Belfast conference which was the biggest ever EU conference. As part of organising the conference in Belfast he negotiated that all chapters within Ireland would benefit financially getting a percentage of the conference profits to allow the chapters to bring bigger, better and more collaborative meetings to the Irish OWASP community and grow the communities across the country. &lt;br /&gt;
&lt;br /&gt;
I don’t know where he has found the time but has also been part of the Women in AppSec committee mentoring a number of individuals throughout the year. He took part in the Women in AppSec events in Belfast giving some insightful opinions into how improve attendees career. Owen is an asset that helps to improve Ireland's security community’s capabilities with a real can-do attitude.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mick Ryan&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Mick always assists with chapter meetings and works to ensure we give the community good quality sessions. Mick assists will all areas including reaching out to potential speakers, getting info and bios from them, arranging dates and venues, posting on social media and the logistics of the meetings and ensuring speakers have the right cables, meetings run to time, that speakers are happy with everything, taking photos to promote the chapter on social media, encouraging people to speak, printing the chapter and getting people to events! Thanks Mick for your contribution in 2017!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Sriram Sriram]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;[https://www.owasp.org/index.php/Sriram Sriram] has been conducting awareness program to the college students. Sriram has created awareness among 12000 Students without the support of anyone. Sriram has been tremendously supporting the OWASP Chapter by giving trainings to various college student,  corporates and various chapters..&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Michelle Simpson&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Michelle has done an amazing job with the Belfast chapter and works tirelessly to improve the OWASP community and advocate strong app sec practices. This is very evident from the people attending the chapter events, organisations participating and the very successful AppSecEU conference that was held in Belfast in 2017. Michelle put a huge amount of work and effort into planning and preparation for AppSecEU to ensure the conference was of a high calibre. This was a sustained commitment over the majority of 2017 on top of local chapter commitments. I'd like to nominate Michelle for all the hard work and effort she puts into the chapter. Thanks Michelle!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Steve Springett&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Steve has been a tremendous supporter of the OWASP dependency-check project and leader on the related dependency-track platform. He is quick to respond to community question, answering with insightful and accurate responses assisting the community in their use of the dependency-check suite of tools.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/John_Vargas John Vargas]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;During the last 9 years John, together with a very small group of volunteers, has been making efforts to keep the chapter of Lima, Peru. Performing activities such as monthly meetings, internal trainings and participating actively in the OWASP Latam Tour. For the chapters in Latin America to keep afloat these activities with few resources is something very complicated and deserves recognition.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tara Williams&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Tara cares about integrity, inclusion and transparency, she is passionate about making OWASP a better place for all members of the community. With her talents in communications, she is getting the word out about OWASP's benefits to community members and attracting new members to chapter meetings, especially identifying successful pathways to transition meetup members to full members.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Aatral Arasu&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
'''&amp;quot;'''A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Sean mentors, is a speaker, leads projects, is an active chapter leader and chapter Treasurer, participating in meetup events and a great representative at global, regional and external events.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tony Clarke&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Tony has grown the chapter over the last year to a point where hundreds of people are attending meetings. The meetings are organised in advance now and have a theme. There were some really interesting people speaking at the chapter meetings including Simon Singh, James Lyne, Brian Honan and Jane Franklin. He has also engaged support from local companies with a lot more attending and sponsoring the chapter. There is a real buzz at chapter meetings and they're not just death by PowerPoint which they had been in the past.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:cfrenz|Christopher Frenz]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
'''&amp;quot;'''Christopher Frenz should be nominated for the Best Mission Outreach WASPY for his work as the Project Lead for the OWASP Anti-Ransomware Guide Project and the OWASP Secure Medical Device Deployment Standard Project. In the wake of WannaCry, anti-ransomware guidance has become more pertinent than ever and the project is regularly updated to keep abreast of the latest ransomware adaptations. Chris regularly shares his anti-ransomware knowledge with the security and healthcare communities and is an advocate for organizations conducting mock ransomware incidents. Chris has shared his knowledge of ransomware protections and of pertinent OWASP resources in numerous venues including articles (&amp;lt;nowiki&amp;gt;https://iapp.org/news/a/why-the-wannacry-outbreak-should-be-a-wake-up-call/&amp;lt;/nowiki&amp;gt;) and conference presentations at both the local and international level (&amp;lt;nowiki&amp;gt;https://iapp.org/conference/iapp-canada-privacy-symposium/sessions/?id=a191a000000zrqPAAQ&amp;lt;/nowiki&amp;gt;). A Spanish version of the guidance is also available. In addition, he has worked to call attention to the need for healthcare facilities to improve the security of their medical device implementations and is responsible for authoring version 1 of the OWASP Secure Medical Device Deployment Standard. The project has really worked to raise awareness of these issues and has been covered by CSO magazine (&amp;lt;nowiki&amp;gt;http://www.csoonline.com/article/3188230/security/how-to-securely-deploy-medical-devices.html&amp;lt;/nowiki&amp;gt;) and other news sources. Chris has given interviews on medical device security for the Cloud Security Alliance and others and will be speaking on medical device security at the Defcon BioHacking Village. Chris is always willing to share his knowledge with all who ask and is an active member of the NYC and Brooklyn OWASP chapters.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Fuentes.joaquin|Joaquin Fuentes]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;For all he has done to build up the Phoenix OWASP community. Prior to Joaquin taking point the community in Phoenix was dead. Meetings weren't happening on a regular basis. The prior leaders had done a great job but I think they had burnt out. Joaquin started the community back up and got corporate support from his employer to facilitate not only regular meetings but great meetings with great content. He also implemented MeetUp. I'm not a consistent attendee because of my work/life schedule but I always know when the meetings are happening and what the subject matter will be because of Joaquin utilizing MeetUp.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation''': &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''4th Citation''': &amp;quot;My job takes me to many different OWASP Chapters, along with ISSA, CSA, ISACA, etc.&lt;br /&gt;
The Phoenix OWASP Chapter was DEAD before Joaquin volunteered to lead the Chapter a few years ago.&lt;br /&gt;
It is now consistently one of the BEST ITSec community gatherings, and I go out of my way to be in Phoenix for their meetings.&lt;br /&gt;
To put it a different way, at my first Phoenix OWASP meeting there were less than 12 attendees, including myself and the speaker. Last week it was standing room only (75+) *and* there would have been more if Interstate 17 hadn't been closed in both directions at the start of rush-hour.&lt;br /&gt;
Part of the reason Joaquin deserves this award is that he is EXTREMELY knowledgeable about AppSec and many other aspects of data security and he is ALWAYS friendly and willing to share. His day-job is no picnic, but he finds the time to put together great meetings and do it in a way that everybody has a good time.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/User:Tanyajanca Tanya Janca]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Tanya has been instrumental in outreach in the Ottawa Ontario Canada region building membership and participation in the local OWASP chapter, as well as building bridges with other local organizations (Python user group, Ruby Rails user group, WIA, etc.). Tanya has also been a driver in getting a mentoring program setup via the Ottawa chapter. She has also encouraged participation in local CTF events, presented at local conferences (BSides, etc). Tanya's enthusiasm, support, and interaction is often contagious (in a good way :) ). Lastly, Tanya is a strong advocate or evangelist for OWASP projects, promoting such as appropriate per audience/presentation (including, but not limited to: ZAP, Top 10, SKF).&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Tanya Janca is an excellent ambassador for OWASP. Since her entry into the lead team of the OWASP Ottawa chapter, she has doubled the size of the chapter and developed the chapter into a meeting place for dozens of women interested in Application Security.&lt;br /&gt;
Tanya Janca is an energetic speaker who held a fantastic presentation at AppSecEU in Belfast. &amp;lt;nowiki&amp;gt;https://www.youtube.com/watch?v=mPTmuaC2lOI&amp;lt;/nowiki&amp;gt; She was subsequently invited to the Swiss Cyberstorm Conference where her addition to the rooster was explained in an admiring blogpost &amp;lt;nowiki&amp;gt;https://swisscyberstorm.com/2017/05/23/Introducing_Tany_Janca.html&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
Tanya Janca has the ability to talk security to techies and management alike. She is pushing for the adoption of OWASP practices and project by the government of Canada her employer. Having been nominated for the Government of Canada’s CIO Award for “Excellent in Security” in 2016 she refused to move into the private sector, but continues to support the security community inside the public sector, where her excellent know-how is very important.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation:''' &amp;quot;Tanya Janca has been performing “outreach” and “recruitment of women” as her main chapter leader responsibilities for the Ottawa chapter since 2015. The chapter has not only grown by over 500% in that time, but female membership has grown from 2 female members to over 70 (the chapter has grown for many reasons, some of which are her promotional efforts). Activities include starting a mentoring program that matches senior AppSec members of the community with juniors or people who are hoping to get into Application Security; attending all sorts of technology meetups (but especially female-centric ones) to talk about OWASP and personally invite them to attend; bringing OWASP products, concepts and resources to the Canadian Government (and is currently attempting to sway policy to be more application security focused as we speak); as well as performing over 40 public speaking engagements that describe OWASP as “Your new BFF” as part of the application security lesson she has taught. She has also begun speaking at conferences semi-regularly, singing OWASP’s praises as part of every presentation. She also forms female groups to attend events together, to make them more accessible, such as her all-female team for the Ottawa iHack CTP and “Learn by Breaking things” event in June 2017 and her all female CTF team for OWASP Ottawa’s first CTF in 2015. Her claim of being an “application security evangelist” certainly seems fitting.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Kitisak Jirawannakool&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Web security is notoriously bad in Thailand, so an actives security community is sorely needed. Kitisak is a central figure in that community. He has worked on establishing the OWASP Bangkok chapter for the past six years, organizing meetups, community outreach and engaging with security experts internationally. His work has played a pivotal role in creating IT security awareness in the fast-growing South-East-Asian country.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|James Manico&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Jim's influence on OWASP materials (and therefore on application security) is amazing - he's cited on nearly every cheat sheet on OWASP Top 10 document. His name is synonymous with application security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation: &amp;quot;'''While Jim may not be the &amp;quot;unsung hero&amp;quot; - he is the first and foremost cheerleader/champion of OWASP. His efforts and contributions are innumerable. As anyone who knows Jim - he is not a reserved individual when touting the resources available via OWASP. He has likely done more then anyone else working with OWASP to bring together, motivate, and get individuals to contribute to OWASP. From the immensely popular checklists to motivating individuals to contribute. OWASP would not be nearly as successful as it has been without Jim.&amp;quot; &lt;br /&gt;
|-&lt;br /&gt;
|Mateo Martinez&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Mateo is one of the leaders in Latin America more recognized, during the last years his efforts to join the chapters chapter along with other leaders of Latam made that the community grew and that today the Latam Tour 2017 has more than 15 participating countries. He also managed to spread the spirit of owasp and help establish new chapters in the region.&lt;br /&gt;
The effort to maintain more communication between OWASP GLobal and local communities is reflected in each activity that encourages other leaders to ensure that they strive every day to spread Owasp projects and to grow the community.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mark Miller&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The OWASP Podcast is a effort that is in line with the mission of OWASP raising visability for software security. This is a VERY powerful voice in the community globally and Mark Miller should be applauded for his efforts on this&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Podcast&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Dhiraj_Mishra Dhiraj Mishra]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Dhiraj was nominated for WASPY 2016, his contribution to the community is from past one 'n half year in various areas, start from the projects, local volunteering and what not, he was also listed in OWASP Hall Of Fame.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Owen_Pendlebury|Owen Pendlebury]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Owen is an active participator in OWASP meetings and has been a great inspiration to me.&lt;br /&gt;
He has shown himself to be a great leader and OWASP advocate.&lt;br /&gt;
Owen has recommended other AppSec communities in which I have become involved in since moving to Dublin. He is an evangelist for women in technology and I have witnessed this first hand.&lt;br /&gt;
I don't hesitate to recommend Owen for this award.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Owen has introduced me to the OWASP Community in Ireland and EU. Help me to get involve with Women in AppSec and participate in the AppSec EU event in Belfast. He is a great leader, who enjoys talking about OWASP and the great community behind it.&lt;br /&gt;
I've moved to Ireland a couple of months ago, and getting to know Owen and the OWASP community has completely changed my life, both professionally and personally. &lt;br /&gt;
So, yes, I would like to nominate Owen Pendlebury because he the proof that Women in AppSec is not just a women matter. :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Sriram Sriram Shyam]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Sriram has been conducting awareness program to the college students. Sriram has created awareness among 12000 Students without the support of anyone.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Nwhysel|Noreen Whysel]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Noreen is helping each day to improve OWASP members' experiences bringing her expertise and knowledge as a mentor and projects as a Chapter Leader, one member at a time. She understands what members want, how to improve member benefits and is applying that knowledge to improving local and global member experiences from the ground up. Her efforts are multiplied by her sharing of knowledge and grassroots approach creating a membership groundswell.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Aatral Arasu&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Sean leads the BLT Project and is a Team Leader for the Learning Gateway project. He has helped improve the quality of web experiences, including OWASP.org .&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Glenn_%26_Riccardo_ten_Cate Glenn &amp;amp; Riccardo ten Cate]&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;I am hereby nominating the brothers Glenn &amp;amp; Riccardo ten Cate from the Netherlands for the WASPY award in this category. They are known for their work on the open-source project SKF (Security Knowledge Framework). These are two guys who are dedicated to spreading security knowledge trough the means OWASP has to offer. You might have encountered them talking at seminars, promoting their project and OWASP, or different companies where they teach development teams how to integrate the OWASP core principles in their workflow using their project. Not only professional development teams but also students of security can only be amazed at the sheer knowledge they gathered and contribute to the global OWASP community trough open source. The sheer effort they put in this project teaches, guides, structures and shows by example how to test and write secure applications by design. There is no other software out there that does this. And that is why they deserve this nomination for best innovator 2017.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mark Deenihan&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Mark for his constant devotion and work on the OWASP security shepherd project and continuing to develop it and teach people globally about app sec.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Seba Deleersnyder&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;One of the main projects to date is SAMM. Seba with the support of project colliders has made this a flagship project of OWASP. The level of maturity and the number of improvements obtained indicates that this project is one of the most mature and a great projection to the future.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:cfrenz|Christopher Frenz]]&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Chris' projects are opening doors for OWASP in the standards development and getting the word out about important IoT with his Medical Device Deployment Standard: &amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Secure_Medical_Device_Deployment_Standard&amp;lt;/nowiki&amp;gt; which already has a Turkish translation and attracted attention from the Turkish public health department. He has delivered presentations at meetups, and presenting to the IDESG, www.idesg.org in July. He has a &amp;quot;soup label&amp;quot; tool that gives simple guidance for the implementation of the OSMDDS. This is not Chris' first project but it is surely one of the best OWASP innovations of the year.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Fuentes.joaquin|Joaquin Fuentes]]&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Evin Hernandez&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Evins focus on the core of the information security platform with Virtual Village has provided the global community with a place to experiment and leverage for testing... &amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Virtual_Village_Project&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Jeremy_Long Jeremy Long]&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Considering how often projects have a great start and plateau, we should recognize the ongoing effort and dedication given to one of the Flagship projects in our community.&lt;br /&gt;
Jeremy Long has continued to not only maintain the Dependency Check project but develop and improve it each year.&lt;br /&gt;
This year he added Improvements in the core dependency-check platform in terms of code quality, achieved 100% for the CII Best Practices for dependency-check, continued to develop the ODC community with several contributors submitting PRs, and over the last several months he's been working on platform maturity and will be releasing 2.0.0 in the first half of July 2017.&lt;br /&gt;
After 2.0 is released he has planned work on Python support and expanding the tool by integrating additional data-sources such as Artifactory, Redhat Victim's, OSS-Index, etc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Jeremy has been an avid contributor/leader for the OWASP dependency-check project. Under his leadership the project has garnered substantial community support in terms of pull requests, improved code quality via Sonarcloud, Coverity, Codacy, and CII Best Practices. While the last six months have been primarily around code quality and bug fixes; these improvements are setting the dependency-check project up for major enhancements over the coming months!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:DanielMiessler|Daniel Miessler]]&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Daniel seems to be everywhere at once - despite have a full-time job, he is leading or co-leading several OWASP projects, has created ideas for groups out of thin air, and has performed work in much needed areas.&lt;br /&gt;
This year, Daniel has lead or co-lead the Internet of Things security project, completed an IoT: Medical Devices attack surface overview, and created the Game Security project.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Dhiraj_Mishra Dhiraj Mishra]&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Dhiraj is one of the top contributor in OWASP Cheat Sheet Project, which have security guidance in an easy read format, his contribution for SQL Injection WAF Bypass and XSS Evasion - OWASP, was mostly recommended and used by Cyber Security professional, dhiraj has contributed to Benchmark project by contributing SQLi/XSS fuzz vectors as initial contribution towards adding support for WAF/RASP scoring and many such projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Bernhard Mueller&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;During the last 18 months Bernhard has been spearheading the OWASP Mobile Testing Guide Project. He has invested several man-months of writing, editing, reviewing, rallying authors, and pushing the project into new directions. This also resulted in the novel agile book writing process and book production pipeline which enables OWASP to produce a professional tech book. The project has produced a security standard and early-release ebook, and is on track become one of OWASP's main flagship projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Steve Springett&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Steve's work on dependency-track is fantastic - he's moved forward to address the next round of issues, with an innovative solution all companies can leverage.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|thc202&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Simon Bennets &amp;quot;wingman&amp;quot; in the ZAP project, by now even the top committer in the project! (&amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/graphs/contributors&amp;lt;/nowiki&amp;gt;) So &amp;quot;unsung of&amp;quot; that I do not even know his real name!&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Coming July 25, 2017&lt;br /&gt;
&lt;br /&gt;
==Sponsorship Opportunities==&lt;br /&gt;
The support from our sponsors, is what makes these awards truly successful!&lt;br /&gt;
&lt;br /&gt;
Sponsorships coming soon!&lt;br /&gt;
&lt;br /&gt;
==Communication==&lt;br /&gt;
# June 7, 2017 Email to the Leaders &amp;amp; Community list. Posted to the OWASP [https://owasp.blogspot.com/2017/06/nominations-are-now-being-accepted-for.html Blog]&lt;br /&gt;
# June 30, 2017 Email to the Leaders &amp;amp; Community list.&lt;br /&gt;
# July 5, 2017 Email to the Nominees&lt;br /&gt;
# July 5, 2017 Email to the Leaders &amp;amp; Community list, and Blog post announcing the nominees have been announced.&lt;br /&gt;
&lt;br /&gt;
=='''Past WASPY Awards'''==&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2016 2016]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2015 2015] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2014 2014] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2013 2013] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2012 2012] &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Glenn_%26_Riccardo_ten_Cate&amp;diff=231724</id>
		<title>Glenn &amp; Riccardo ten Cate</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Glenn_%26_Riccardo_ten_Cate&amp;diff=231724"/>
				<updated>2017-07-17T07:09:48Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: Update page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Project leaders of OWASP-SKF ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Security Knowledge Framework]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Glenn ten Cate.jpg|thumb]]&lt;br /&gt;
&lt;br /&gt;
'''About Glenn'''&lt;br /&gt;
- Glenn ten Cate&amp;lt;br&amp;gt;&lt;br /&gt;
- From the Netherlands&amp;lt;br&amp;gt;&lt;br /&gt;
- More then 10 years active in Security / Hacking world&amp;lt;br&amp;gt;&lt;br /&gt;
- Specialized in web-application / server security&amp;lt;br&amp;gt;&lt;br /&gt;
- Coding experience in different languages&amp;lt;br&amp;gt;&lt;br /&gt;
- Developer / Contributor of multiple open-source security projects&amp;lt;br&amp;gt;&lt;br /&gt;
- Goal would be, creating an open-source SDLC with the tools and knowledge so everybody is empowered to do security by design and deliver high quality software&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Contact Info:'''glenn.ten.cate@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Riccardo_Ten_Cate_Profile_Picture.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''About Riccardo:'''&lt;br /&gt;
&lt;br /&gt;
As a freelance penetration tester and software developer from the Netherlands Riccardo specialises in web-application security and has extensive knowledge in securing web applications in multiple coding languages. &lt;br /&gt;
&lt;br /&gt;
'''Contract Info:''' riccardo.ten.cate@owasp.org&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Foobar&amp;diff=231723</id>
		<title>User:Foobar</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Foobar&amp;diff=231723"/>
				<updated>2017-07-17T07:05:08Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: Polished my user page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Some background information:&lt;br /&gt;
[[File:Glenn ten Cate.jpg|thumb]]&lt;br /&gt;
&lt;br /&gt;
- Glenn ten Cate&amp;lt;br&amp;gt;&lt;br /&gt;
- From the Netherlands&amp;lt;br&amp;gt;&lt;br /&gt;
- More then 10 years active in Security / Hacking world&amp;lt;br&amp;gt;&lt;br /&gt;
- Specialized in web-application / server security&amp;lt;br&amp;gt;&lt;br /&gt;
- Coding experience in different languages&amp;lt;br&amp;gt;&lt;br /&gt;
- Developer / Contributor of multiple open-source security projects&amp;lt;br&amp;gt;&lt;br /&gt;
- Goal would be, creating an open-source SDLC with the tools and knowledge so everybody is empowered to do security by design and deliver high quality software&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Project leader of OWASP-SKF&lt;br /&gt;
&lt;br /&gt;
[[OWASP Security Knowledge Framework]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Glenn_ten_Cate.jpg&amp;diff=231722</id>
		<title>File:Glenn ten Cate.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Glenn_ten_Cate.jpg&amp;diff=231722"/>
				<updated>2017-07-17T07:02:17Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;It's me Glenn&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=231534</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=231534"/>
				<updated>2017-07-10T20:26:51Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* Project Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Use SKF to gather the right security requirements for your projects&lt;br /&gt;
* SKF then gives extensive knowledgebase items that correlates to the security requirements&lt;br /&gt;
* Developers can close &amp;quot;tickets&amp;quot; and leave an audit trail to determine possible technical depts or improvements&lt;br /&gt;
* Security specialist can follow the &amp;quot;tickets&amp;quot; and audit trail and verify or Fail closed items and provide feedback.&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br /&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&lt;br /&gt;
* http://www.secureby.design&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Midlevel.png]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add generic Selenium test cases for the pre-development and post-development security controls.&lt;br /&gt;
  - Add current code examples and refer them in the advices of the pre-development and post-development items.&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Explain the SDLC more in-depth on our website and OWASP wiki page.&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
&lt;br /&gt;
;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Midlevel.png&amp;diff=231533</id>
		<title>File:Midlevel.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Midlevel.png&amp;diff=231533"/>
				<updated>2017-07-10T20:26:38Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;midlevel&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225542</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225542"/>
				<updated>2017-01-24T08:41:30Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* Getting started */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field enumeration ===&lt;br /&gt;
&lt;br /&gt;
This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
&lt;br /&gt;
The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
''' Mentors '''&lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
&lt;br /&gt;
ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
* Helper classes with code completion for commonly required functionality&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes ZAP even better&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225541</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225541"/>
				<updated>2017-01-24T08:40:42Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field enumeration ===&lt;br /&gt;
&lt;br /&gt;
This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
&lt;br /&gt;
The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
''' Mentors '''&lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
&lt;br /&gt;
ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
* Helper classes with code completion for commonly required functionality&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes ZAP even better&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org or glenn.ten.cate@owasp.org and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC&amp;diff=211490</id>
		<title>GSoC</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC&amp;diff=211490"/>
				<updated>2016-03-20T13:51:32Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP is applying to be a Google Summer of Code (“GSoC”) mentoring organization in 2016!'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Open source software is changing the world and creating the future.&lt;br /&gt;
Want to help shaping it? We’re looking for students to join us in making 2016 the best Summer of Code yet! --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;'''STUDENTS: THE PROPOSAL SUBMISSION PERIOD WILL BE OPEN UNTIL MARCH 25TH'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://summerofcode.withgoogle.com/ '''Google Summer of Code Program Site''']&lt;br /&gt;
&lt;br /&gt;
OWASP is an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted.&lt;br /&gt;
&lt;br /&gt;
All students currently enrolled in an accredited institution are welcome to participate in the Google Summer of Code 2016 program, hopefully along with the OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
Below you could find all the instructions on how to participate.&lt;br /&gt;
&lt;br /&gt;
== What is GSOC? ==&lt;br /&gt;
&lt;br /&gt;
The Google Summer of Code program (“GSoC”) is designed to encourage student participation in open source development. Through GSoC, accepted student applicants will be paired with OWASP mentors that will guide them through their coding tasks.&lt;br /&gt;
&lt;br /&gt;
Benefits to students include:&lt;br /&gt;
&lt;br /&gt;
* Gaining exposure to real-world software development scenarios,&lt;br /&gt;
* An opportunity for employment in areas related to their academic pursuits and&lt;br /&gt;
* Google will be offering successful student contributors a 5,500 USD stipend, enabling them to focus on their coding projects for three months. &lt;br /&gt;
&lt;br /&gt;
This program is done completely online. Students and mentors from more than 100 countries have participated in past years.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Instructions common to all participants==&lt;br /&gt;
&lt;br /&gt;
All participants should take a look at the [https://developers.google.com/open-source/gsoc/faq Google Summer of Code Program Site] every now and then to be informed about updates and advice. It is also important to read the [https://developers.google.com/open-source/gsoc/faq Summer of Code FAQ], as it contains useful information.&lt;br /&gt;
All participants will need a Google account in order to join the program. You'll save some time if you create one now.&lt;br /&gt;
&lt;br /&gt;
===Programming Language===&lt;br /&gt;
&lt;br /&gt;
While the majority of OWASP tools are developed using C++/Java, we do accept other languages, including (but not limited to) Python, Ruby and C#. C++ will be accepted for any project. Submissions and ideas for projects in any other language should specifically mention the choice.&lt;br /&gt;
&lt;br /&gt;
==Instructions for students==&lt;br /&gt;
&lt;br /&gt;
Are you a student and want to code for an OWASP project? &lt;br /&gt;
Here are the steps and some tips on getting started:&lt;br /&gt;
&lt;br /&gt;
1) Think of a good idea – For reference see&lt;br /&gt;
[https://www.owasp.org/index.php/GSOC2016_Ideas GSoC 2016 Ideas]&lt;br /&gt;
&lt;br /&gt;
2) Do some research yourself based on the idea, write up a proposal draft &lt;br /&gt;
&lt;br /&gt;
3) Post it to the mailing list at https://groups.google.com/d/forum/owasp-gsoc for initial discussions with OWASP mentors.&lt;br /&gt;
&lt;br /&gt;
4) Based on feedback, write a full proposal – See template below:&lt;br /&gt;
https://www.owasp.org/index.php/GSoC_SAT&lt;br /&gt;
&lt;br /&gt;
5) Submit your proposal to Google from March 14th to March 25th 2016.&lt;br /&gt;
&lt;br /&gt;
Students wishing to participate in GSoC must realize this is a formal commitment to produce code for the selected OWASP Project during three months. You will also take some resources from OWASP project leaders, who will dedicate a portion of their time to mentor you. Therefore, we'd like to have candidates who are committed to helping OWASP mission. You don't have to be a proven developer -- in fact, this whole program is meant to facilitate joining OWASP and other Open Source communities. However, experience in coding and applications are welcome.&lt;br /&gt;
&lt;br /&gt;
You should start familiarising yourself with the components that you plan on working on before the start date. OWASP Project Mentors are available on the mailing list https://groups.google.com/d/forum/owasp-gsoc for help. &lt;br /&gt;
&lt;br /&gt;
===General instructions===&lt;br /&gt;
First of all, please read the instructions common to all participants and the [https://developers.google.com/open-source/gsoc/faq GSoC FAQ]. Pay special attention to the '''Eligibility''' section of the FAQ.&lt;br /&gt;
&lt;br /&gt;
===Getting in touch===&lt;br /&gt;
* Google Group: OWASP Organization Administrators and Mentors are available at https://groups.google.com/d/forum/owasp-gsoc ready to answer any questions and discuss any idea.&lt;br /&gt;
* Mailing list: Each project has its own development mailing list (eg. ESAPI: http://lists.owasp.org/pipermail/esapi-dev/). Feel free to subscribe in order to discuss your ideas directly with the project's contributors.&lt;br /&gt;
* IRC channel: You can find us at irc.freenode.net channel #owasp-gsoc&lt;br /&gt;
&lt;br /&gt;
===Recommended steps===&lt;br /&gt;
* Read Google's instructions for participating&lt;br /&gt;
* Take a look at the list of ideas&lt;br /&gt;
* Come up with project that you're interested in&lt;br /&gt;
* Write a first draft proposal and get someone to review it for you&lt;br /&gt;
* Submit it using Google's web interface&lt;br /&gt;
&lt;br /&gt;
Coming up with an interesting idea is probably the most difficult part of all. It should be something interesting for an OWASP Project, and more importantly for you. It also has to be something that you can realistically achieve in the time available to you.&lt;br /&gt;
&lt;br /&gt;
Finding out what the most pressing issues are in the projects you're interested in is a good start. You can optionally join the mailing lists for that project: you can make acquaintance with developers and your potential mentor, as well as start learning the codebase. We recommend strongly doing that and we will look favourably on applications from students who have started to act like Open Source developers.&lt;br /&gt;
&lt;br /&gt;
===Student proposal guidelines===&lt;br /&gt;
A project proposal is what you will be judged upon. So, as a general recommendation, write a clear proposal on what you plan to do, what your project is and what it is not, etc. Several websites now contain hints and other useful information on writing up such proposals.&lt;br /&gt;
OWASP does not require a specific format or specific list of information, but there is an application template on the OWASP page in Google Melange with some specific points that you should address in your application:&lt;br /&gt;
* Who are you? What are you studying?&lt;br /&gt;
* What exactly do you intend to do? What will not be done?&lt;br /&gt;
* Why are you the right person for this task?&lt;br /&gt;
* To what extent are you familiar with the software you're proposing to work with? Have you used it? Have you read the source? Have  you modified the source?&lt;br /&gt;
* How many hours are you going to work on this a week? 10? 20? 30? 40?&lt;br /&gt;
* Do you have other commitments that we should know about? If so, please suggest a way to compensate if it will take much time away from Summer of Code.&lt;br /&gt;
* Are you comfortable working independently under a supervisor or mentor who is several thousand miles away, not to mention 12 time zones away? How will you work with your mentor to track your work? Have you worked in this style before?&lt;br /&gt;
* If your native language is not English, are you comfortable working closely with a supervisor whose native language is English? What is your native language, as that may help us find a mentor who has the same native language?&lt;br /&gt;
* Where do you live, and can we assign a mentor who is local to you so you can meet in a coffee shop for lunch?&lt;br /&gt;
&lt;br /&gt;
After you have written your proposal, you should get it reviewed. Do not rely on the OWASP mentors to do it for you via the web interface: they will only send back a proposal if they find it lacking. Instead, ask a colleague or a developer to do it for you.&lt;br /&gt;
&lt;br /&gt;
===Hints===&lt;br /&gt;
'''Submit your proposal early:''' early submissions get more attention from developers for the simple fact that they have more time to dedicate to reading them. The more people see it, the more it'll get known.&lt;br /&gt;
&lt;br /&gt;
'''Do not leave it all to the last minute:''' while it is Google that is operating the webserver, it would be wise to expect a last-minute overload on the server. So, make sure you send your application before the final rush. Also, note that the applications submitted very late will get the least attention from mentors, so you may get a low vote because of that.&lt;br /&gt;
&lt;br /&gt;
'''Keep it simple:''' we don't need a 10-page essay on the project and on you (Google won't even let you submit a text that long). You just need to be concise and precise.&lt;br /&gt;
&lt;br /&gt;
'''Know what you are talking about:''' the last thing we need is for students to submit ideas that cannot be accomplished realistically or ideas that aren't even remotely related to OWASP Projects. If your idea is unusual, be sure to explain why you have chosen OWASP to be your mentoring organisation.&lt;br /&gt;
&lt;br /&gt;
'''Aim wide:''' submit more than one proposal, to different OWASP Projects. We also recommend submitting to more than one organisation too. This will increase your chances of being chosen.&lt;br /&gt;
&lt;br /&gt;
The PostgreSQL project has also released a list of [http://www.postgresql.org/developer/summerofcodeadvice.html hints] that you can take a look.&lt;br /&gt;
&lt;br /&gt;
==Instructions for mentors==&lt;br /&gt;
===Ideas===&lt;br /&gt;
If you're a developer and you wish to participate in Summer of Code, you can do it in two ways: the first and easiest is to make a proposal in the [https://www.owasp.org/index.php/GSOC2016_Ideas ideas] page. Take a look at what the different OWASP Projects needs or what you feel should have. Feel free to submit ideas even if you cannot elaborate too much on them.&lt;br /&gt;
&lt;br /&gt;
The second possibility is to be a mentor for a more specific idea. If you wish to do that, please read the instructions common to all participants and the Summer of Code FAQ. Also, please contact the project leader for your application or module and get the go-ahead from him/her. Then edit the ideas page, adding your idea.&lt;br /&gt;
&lt;br /&gt;
Your idea proposal should be a brief description of what the project is, what the desired goals would be, what the student should know and your email address for contact. Please note, though, that the students are not required to follow your idea to the letter, so regard your proposal as just a suggestion.&lt;br /&gt;
&lt;br /&gt;
===Mentoring===&lt;br /&gt;
If you wish to help us even more, you can be an OWASP mentor. We will potentially assign a student to you who has never worked on such a large project and will need some help. Make sure you're up for the task.&lt;br /&gt;
When subscribing yourself as a mentor, please make sure that your application or module maintainer is aware of that. Ask him/her to send the Summer of Code OWASP Administrators an email confirming to know you. This is just a formality to make sure you are a real person we can trust -- the administrators cannot know all active developers by their Google account ID.&lt;br /&gt;
&lt;br /&gt;
If you would like to get an idea of what is involved in being a good mentor, be sure to read the [http://write.flossmanuals.net/gsoc-mentoring/about-this-manual/ mentoring guide]. &lt;br /&gt;
&lt;br /&gt;
You will be subscribed to a mailing list to discuss ideas. We will also require you to read the proposals as they come in and you will be allowed to vote on the proposals, according to rules we will publish later.&lt;br /&gt;
&lt;br /&gt;
Finally, know that we will never assign you to a project you do not want to work on. We will not assign you more projects than you can/want to take on either. And you will have a backup mentor, just in case something unforeseen takes place.&lt;br /&gt;
&lt;br /&gt;
===Subscribing as mentor===&lt;br /&gt;
To subscribe as mentor, you need to complete a few easy steps.&lt;br /&gt;
* Contact the OWASP GSoC administrators to let them know which project you want to mentor for&lt;br /&gt;
* Log in to [https://summerofcode.withgoogle.com/ Google Summer of Code Program Site]&lt;br /&gt;
* Apply as a mentor for OWASP&lt;br /&gt;
* Subscribe to https://groups.google.com/d/forum/owasp-gsoc&lt;br /&gt;
&lt;br /&gt;
'''The current list of GSOC 2016 Mentors are:'''&lt;br /&gt;
* Abraham Aranguren&lt;br /&gt;
* Mennouchi Islam Azeddine&lt;br /&gt;
* Ryan Barnett&lt;br /&gt;
* Simon Bennetts&lt;br /&gt;
* Johanna Curiel&lt;br /&gt;
* Spyros Gasteratos&lt;br /&gt;
* Gareth Heyes&lt;br /&gt;
* Krzysztof Kotowicz&lt;br /&gt;
* Andres Morales&lt;br /&gt;
* Kostas Papapanagiotou&lt;br /&gt;
* Andres Riancho&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
* Prasad Shenoy&lt;br /&gt;
* Breno Silva&lt;br /&gt;
* Andrew van der Stock&lt;br /&gt;
* Kevin W. Wall&lt;br /&gt;
* Tom Brennan&lt;br /&gt;
* Glenn ten Cate&lt;br /&gt;
* Riccardo ten Cate&lt;br /&gt;
* Martin Knobloch&lt;br /&gt;
&lt;br /&gt;
==Instructions for OWASP Project Leaders==&lt;br /&gt;
If you are an OWASP Project Leader, you may be contacted by developers in your project about an idea he wants to submit. &lt;br /&gt;
You should judge whether the idea being proposed coincides with the general goals for your OWASP Project. If you feel that is not the case, you should reply to your developer and suggest that he modify the proposal.&lt;br /&gt;
You do not need yourself to be a mentor, but we would like you to.&lt;br /&gt;
&lt;br /&gt;
==Contact OWASP GSoC Admininstrators==&lt;br /&gt;
To reach the OWASP administrators for Summer of Code, please send an email to the GSOC Administrators below.&lt;br /&gt;
&lt;br /&gt;
'''The GSOC 2016 Administrators are:'''&lt;br /&gt;
&lt;br /&gt;
* Kostas Papapanagiotou (konstantinos@owasp.org)&lt;br /&gt;
* Claudia Casanovas (claudia.aviles-casanovas@owasp.org)&lt;br /&gt;
* Fabio Cerullo (fcerullo@owasp.org)&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=211075</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=211075"/>
				<updated>2016-03-14T13:40:08Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Security post-development functionality in SKF for verification with the OWASP ASVS&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide with Chef:&amp;lt;/b&amp;gt;&lt;br /&gt;
* https://skf.readme.io/docs/installation#section-automated-installation-with-chef&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide for AWS:&amp;lt;/b&amp;gt;&lt;br /&gt;
* https://skf.readme.io/docs/installation#section-aws-installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://www.secureby.design&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add generic Selenium test cases for the pre-development and post-development security controls.&lt;br /&gt;
  - Add current code examples and refer them in the advices of the pre-development and post-development items.&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Explain the SDLC more in-depth on our website and OWASP wiki page.&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
[[Link title]]==Contributors==&lt;br /&gt;
&lt;br /&gt;
;[[user:Foobar|Glenn ten Cate]]&lt;br /&gt;
;[[user:Riccardo_ten_Cate|Riccardo ten Cate]]&lt;br /&gt;
;Alexander Kaasjager&lt;br /&gt;
;John Haley&lt;br /&gt;
;Daniel Paulus&lt;br /&gt;
;Erik de Kuijper&lt;br /&gt;
;Roderick Schaefer&lt;br /&gt;
;[[user:Jmanico|Jim Manico]]&lt;br /&gt;
;Martijn Gijsberti Hodenpijl&lt;br /&gt;
;Bithin Alangot&lt;br /&gt;
;[[user:Knoblochmartin|Martin Knobloch]]&lt;br /&gt;
;Adam Fisher&lt;br /&gt;
;Tom wirschell&lt;br /&gt;
;Joerg Stephan&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2016_Ideas&amp;diff=209229</id>
		<title>GSOC2016 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2016_Ideas&amp;diff=209229"/>
				<updated>2016-02-20T14:37:53Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* OWASP-SKF (Security Knowledge Framework) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check the Hackademic wiki page linked above&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/Hackademic/hackademic github repository] and especially the [https://github.com/Hackademic/hackademic/issues open tickets]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Hackademic Challenges ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Hackademic Challenges Project]]  helps you test your knowledge on web application security. You can use it to actually attack web applications in a realistic but also controllable and safe environment. After a wonderfull 2014 GSoC with 100 new challenges and a couple of new plugins we're mainly looking to get new features in and maybe a couple of challenges. Bellow is a list of proposed features.&lt;br /&gt;
&lt;br /&gt;
=== REST API for the sandbox ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
During the last summer code sprint Hackademic got challenge sandboxing in the form of vagrant and docker wrappers as well as an engine to start and stop the container or vm instances.&lt;br /&gt;
What is needed now is a rest api which supports endpoint authentication and authorization which enables the sandbox engine to be completely independed from the rest of the project.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
Since the sandbox is written in python, you can use microframeworks such as flask to implement the api.&lt;br /&gt;
The endpoint authorization can be done via certificates or plain signature or username/password type authentication.&lt;br /&gt;
However the communication between the two has to be over a secure channel.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A REST style api which allows an authenticated remote entity control the sandbox engine.&lt;br /&gt;
* PEP8 compliant code&lt;br /&gt;
* Acceptable unit test coverage&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Python, test driven developmen, some idea what REST is, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== New CMS ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The CMS part of the project is really old and has accumulated a significant amount of technical debt.&lt;br /&gt;
In addition many design decisions are either outdated or could be improved. &lt;br /&gt;
Therefore it may be a good idea to leverage the power of modern web frameworks to create a new CMS.&lt;br /&gt;
The new cms can be written in php or python using any compoennts we agree are necesary and based on the framework we agree on.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* New cms with same functionality as the old one (3 types of users -- student, teacher, admin--, 3 types of resources -- article challenge, class--, ACL type permissions, CRUD operations on every resource/user, all functionality can be extended by Plugins.&lt;br /&gt;
* REST endpoints in addition to classic ones&lt;br /&gt;
* tests covering all routes implemented&lt;br /&gt;
* PSR/PEP 8 code&lt;br /&gt;
&lt;br /&gt;
''' Note: '''&lt;br /&gt;
This is a huge project, it is ok if the student implements a part of it. However whatever implemented must be up to spec.&lt;br /&gt;
If you decide to take on this project contact us and we can agree on a list of routes.&lt;br /&gt;
If you don't decide to take on this project contact us.&lt;br /&gt;
Generally contact us, we like it when students have insightful questions and the community is active&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Python or PHP, the framework suggested, what REST is, the technologies used, some security knowledge would be nice.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== First Course Type Challenge ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
We have a wonderful sandbox engine which allows for complex guided challenges to be implemented.&lt;br /&gt;
We'd like to build a challenge that guides the user through a series of steps to an end goal and teaches more information on the subject matter on the way.&lt;br /&gt;
This is a very open-ended project on purpose to allow creative student to come up with nice ideas.&lt;br /&gt;
Bellow you will find some examples that we thought might be interesting.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
* Purposefully vulnerable web page that guides the user via javascript tooltips and hints to exploiting it using ZAP. ( Bonus: using ZAP via the ZAP api). The challenge is solved when the the student submits the contents of a text file located on the disk (obtained by exploited an RCE)&lt;br /&gt;
&lt;br /&gt;
* Reversing a provided binary to extract information by providing step by step instructions to reversing using any popular reversing tool (well, you can't use IDA so gdb should have to do). Challenge is solved when the keys are extracted from the binary and submitted. Bonus points if each binary donwloaded has different keys.&lt;br /&gt;
&lt;br /&gt;
* Guide to exploiting the TOP10. (Using ZAP?)&lt;br /&gt;
&lt;br /&gt;
* Defensive Type challenges -- Here's how to create a patch for this kind of vulnerability -- Challenge is solved when the unit tests are run and the vulnerability isn't there.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
* One or more Course - style challenges provided either as a docker container or as a vagrant box.&lt;br /&gt;
* Concrete documentation on how to build a challenge like this.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
The technologies used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== Advanced Sandboxed Challenges ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
In the spirit of the challenges above, we're looking for true ctf type challenges.&lt;br /&gt;
This is an open ended task. We're expecting awesome fresh ideas.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
* An application vulnerable to one or more TOP 10 elements.&lt;br /&gt;
* A logic flaws based ctf&lt;br /&gt;
* Your idea here&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
Docker containers or Vagrant boxes that contain complete new challenges.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Knowledge of the technologies used&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Amazing students, in our experience the best, most creative and unique ideas show up when we let students suggest their own feature in relation to the project.&lt;br /&gt;
The above should give you a general idea where we're going but don't let them constrain you.&lt;br /&gt;
Do you wanna do something that would fit into Hackademic? Send us an email!&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
No idea, that's your turn to shine!&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
If it's code, code according to our coding standards.&lt;br /&gt;
If it's challenges, something new and interesting.&lt;br /&gt;
If it's something else, then written like the person who's going to maintain your code is a raging psychopath with an axe who knows where you live.&lt;br /&gt;
&lt;br /&gt;
In short we'd like some quality. ;-)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - VMS - OWTF Vulnerability Management System ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Background problem to solve:&lt;br /&gt;
&lt;br /&gt;
We are trying to reduce the human work burden where there will be hundreds of issues listing apache out of date or php out of date. &lt;br /&gt;
&lt;br /&gt;
Proposed solution:&lt;br /&gt;
&lt;br /&gt;
We can meta aggregate these duplicate issues into one issue of &amp;quot;outdated software / apache / php detected&amp;quot;. with XYZ list of issues in them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A separate set of scripts that allows for grouping and management of vulnerabilities (i.e. think huge assessments), to be usable *both* from inside + outside of OWTF in a separate sub-repo here: https://github.com/owtf &lt;br /&gt;
&lt;br /&gt;
VMS will have the following features:&lt;br /&gt;
* Vulnerability correlation engine which will allow for quick identification of unique vulnerability and deduplication.&lt;br /&gt;
* Vulnerability table optimization : combining redundant vulnerabilities like example : PHP &amp;lt;5.1 , PHP &amp;lt; 5.2 , PHP &amp;lt; 5.3 all suggest upgrade php so if multiple issues are reported they should be combined.&lt;br /&gt;
* Integration with existing bug tracking system like example bugzilla, jira : Should not be too hard as all such system have one or the other method exposed (REST API or similar)&lt;br /&gt;
* Fix Validation : Since we integrate with bug tracking once dev fixed the bug and code deployed we can run specific checks via * OWTF or other tool (may be specific nessus or nexpose plugin or similar.)&lt;br /&gt;
* Management Dashboard : Could be exposed to Pentester, Higher Management where stats are shown with lesser details but more of high level overview.&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/null0x00/nessus-and-reporting-karma Similar previous work for Nessus]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability -i.e. the Health Monitor cannot crash! :)-&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - HTTP Request Translator Improvements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Problem to solve:&lt;br /&gt;
&lt;br /&gt;
There are many situations in web app pentests where just no tool will do the job and you need to script something, or mess around with the command line (classic example: sequence of steps where each step requires input from the previous step). In these situations, translating an HTTP request or a sequence of HTTP requests, takes valuable time which the pentester might just not really have.&lt;br /&gt;
&lt;br /&gt;
Proposed solution:&lt;br /&gt;
&lt;br /&gt;
An HTTP request translator, a *standalone* *tool* that can:&lt;br /&gt;
&lt;br /&gt;
1) Be used from inside OR outside of OWTF.&lt;br /&gt;
&lt;br /&gt;
2) Translate raw HTTP requests into curl commands or bash/python/php/ruby/PowerShell scripts&lt;br /&gt;
&lt;br /&gt;
3) Provide essential quick and dirty transforms: base64 (encode/decode), urlencode (encode/decode)&lt;br /&gt;
* Transforms with boundary strings? (TBD)&lt;br /&gt;
* Individually or in bulk? (TBD)&lt;br /&gt;
&lt;br /&gt;
'''Essential Function: &amp;quot;--output&amp;quot; argument'''&lt;br /&gt;
&lt;br /&gt;
CRITICAL: The command/script should be generated so that the request is sent as literally as possible.&lt;br /&gt;
&lt;br /&gt;
Example: NO client specific headers are sent. IF the original request had &amp;quot;User-Agent: X&amp;quot;, the generated command/script should have EXACTLY that (i.e. NOT a curl user agent, etc.). Obviously, the same applies to ALL other headers.&lt;br /&gt;
&lt;br /&gt;
NOTE: Ideally the following should be implemented using an extensible plugin architecture (i.e. NEW plugins are EASY to add)&lt;br /&gt;
* http request in =&amp;gt; curl command out&lt;br /&gt;
* http request in =&amp;gt; bash script out&lt;br /&gt;
* http request in =&amp;gt; python script out&lt;br /&gt;
* http request in =&amp;gt; php script out&lt;br /&gt;
* http request in =&amp;gt; ruby script out&lt;br /&gt;
* http request in =&amp;gt; PowerShell script out&lt;br /&gt;
&lt;br /&gt;
'''Basic additional arguments:'''&lt;br /&gt;
&lt;br /&gt;
- &amp;quot;--proxy&amp;quot; argument: generates the command/script with the relevant proxy option&lt;br /&gt;
&lt;br /&gt;
		NOTE: With this the command/script may send requests through a MiTM proxy (i.e. OWTF, ZAP, Burp, etc.)&lt;br /&gt;
&lt;br /&gt;
- &amp;quot;--string-search&amp;quot; argument: generates the command/script so that it:&lt;br /&gt;
&lt;br /&gt;
		1) performs the request&lt;br /&gt;
&lt;br /&gt;
		2) then searches for something in the response (i.e. literal match)&lt;br /&gt;
&lt;br /&gt;
- &amp;quot;--regex-search&amp;quot; argument: generates the command/script so that it:&lt;br /&gt;
		1) performs the request&lt;br /&gt;
&lt;br /&gt;
		2) then searches for something in the response (i.e. regex match)&lt;br /&gt;
&lt;br /&gt;
'''OWTF integration'''&lt;br /&gt;
&lt;br /&gt;
The idea here, is to invoke this tool from:&lt;br /&gt;
&lt;br /&gt;
1) Single HTTP transactions:&lt;br /&gt;
&lt;br /&gt;
For example, have a button to &amp;quot;export http request&amp;quot; + then show options equivalent to the flags&lt;br /&gt;
&lt;br /&gt;
2) Multiple HTTP transactions:&lt;br /&gt;
&lt;br /&gt;
Same as with Single transactions, but letting the user &amp;quot;select a number of transactions&amp;quot; first (maybe a checkbox?).&lt;br /&gt;
&lt;br /&gt;
		&lt;br /&gt;
'''Desired input formats:'''&lt;br /&gt;
&lt;br /&gt;
* Read raw HTTP request from stdin -Suggested default behaviour! :)-&lt;br /&gt;
&lt;br /&gt;
	Example: cat path/to/http_request.txt | http-request-translator.py --output&lt;br /&gt;
&lt;br /&gt;
* Interactive mode: read raw HTTP request from keyboard + &amp;quot;hit enter when ready&amp;quot;&lt;br /&gt;
&lt;br /&gt;
	Suggestion: This could be a &amp;quot;-i&amp;quot; (for &amp;quot;interactive&amp;quot;) flag and/or the fallback option when &amp;quot;stdin is empty&amp;quot;&lt;br /&gt;
&lt;br /&gt;
	Example:&lt;br /&gt;
&lt;br /&gt;
	1) User runs tool with desired flags (i.e. &amp;quot;--output ruby --proxy 127.0.0.1:1234 ...&amp;quot;, etc.)&lt;br /&gt;
&lt;br /&gt;
	2) Tool prints: &amp;quot;Please paste a raw HTTP request and hit enter when ready&amp;quot;&lt;br /&gt;
&lt;br /&gt;
	3) User pastes a raw HTTP requests + hits enter&lt;br /&gt;
&lt;br /&gt;
	4) Tool outputs whatever is relevant for the flags + http request given&lt;br /&gt;
&lt;br /&gt;
* For bulk processing: Maybe a directory of raw http request files?&lt;br /&gt;
&lt;br /&gt;
'''Nice to have: Transforms'''&lt;br /&gt;
&lt;br /&gt;
In the context of translating raw HTTP requests into commands/scripts, what we want here is to provide some handy &amp;quot;macros&amp;quot; so that the relevant command/script is generated accordingly.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
&lt;br /&gt;
NOTE: Assume something like the following arguments: &amp;quot;--transform-boundary=@@@@@@@ --transform-language=php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Step 1) The user provides a raw HTTP request like this:&lt;br /&gt;
&lt;br /&gt;
  GET /path/to/urlencode@@@@@@@abc d@@@@@@@/test&lt;br /&gt;
  Host: target.com&lt;br /&gt;
  ...&lt;br /&gt;
&lt;br /&gt;
Step 2) The tool generates a bash script like the following:&lt;br /&gt;
&lt;br /&gt;
  #!/bin/bash&lt;br /&gt;
  &lt;br /&gt;
  PARAM1=$(echo 'abc d' | php -r &amp;quot;echo urlencode(fgets(STDIN));&amp;quot;)&lt;br /&gt;
  curl ...... &amp;quot;http://target.com/path/to/$PARAM1/test&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OR a &amp;quot;curl command&amp;quot; like the following:&lt;br /&gt;
  PARAM1=$(echo 'abc d' | php -r &amp;quot;echo urlencode(fgets(STDIN));&amp;quot;); curl ...... &amp;quot;http://target.com/path/to/$PARAM1/test&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This feature can be valuable to shave a bit more time in script writing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability -i.e. the Health Monitor cannot crash! :)-&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - JavaScript Library Sniper Improvements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
This is a project that tries to resolve a very common problem during penetration tests:&lt;br /&gt;
&lt;br /&gt;
The customer is running a number of outdated JavaScript Libraries, but there is just not enough time to determine if something useful -i.e. something *really* bad! :)- can be done with that or not.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To solve this problem, we propose a *standalone* *tool* that can:&lt;br /&gt;
&lt;br /&gt;
1) Be run BOTH from inside AND outside of OWTF&lt;br /&gt;
&lt;br /&gt;
2) Build and *update* a fingerprint JavaScript library database of:&lt;br /&gt;
* Library File hashes =&amp;gt; JavaScript Library version&lt;br /&gt;
* Library File lengths =&amp;gt; JavaScript Library version&lt;br /&gt;
* (Nice to have:) As above, but for each individual github commit (possible drawback: too big?)&lt;br /&gt;
&lt;br /&gt;
3) Build and *update* a vulnerability database of:&lt;br /&gt;
* JavaScript Library version =&amp;gt; CVE - CVSS score - Vulnerability info&lt;br /&gt;
&lt;br /&gt;
4) Given a [ JavaScript file OR hash OR length ], found in the database, provides:&lt;br /&gt;
* JavaScript Library version&lt;br /&gt;
* List of vulnerabilities sorted in descending CVSS score order&lt;br /&gt;
&lt;br /&gt;
5) (very cool to have) Given a list of JavaScript files (maybe a directory), provides:&lt;br /&gt;
* ALL Library/vulnerability matches described on 4)&lt;br /&gt;
	&lt;br /&gt;
Once the standalone tool is built and verified to be working, OWTF should be able to:&lt;br /&gt;
&lt;br /&gt;
Feature 1) GREP plugin improvement (Web Application Fingerprint):&lt;br /&gt;
&lt;br /&gt;
Step 1) Lookup file lengths and hashes in the &amp;quot;JavaScript library database&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Step 2) If a match is found: provide the list of known vulnerabilities against &amp;quot;JavaScript library X&amp;quot; to the user&lt;br /&gt;
&lt;br /&gt;
Feature 2) SEMI-PASSIVE plugin improvement (Web Application Fingerprint):&lt;br /&gt;
&lt;br /&gt;
1) Requests all referenced BUT missing JavaScript files -i.e. scanners won't load JavaScript files! :)-&lt;br /&gt;
&lt;br /&gt;
2) re-runs the GREP plugin on the new files (i.e. to avoid missing vulns due to unrequested JavaScript files)&lt;br /&gt;
&lt;br /&gt;
Potential projects worth having a look for potential overlap/inspiration:&lt;br /&gt;
* [https://owasp.org/index.php/OWASP_Dependency_Check OWASP Dependency Check?]&lt;br /&gt;
&lt;br /&gt;
How many JavaScript libraries should be included?&lt;br /&gt;
* As many as possible, but especially the major ones: jQuery, knockout, etc.&lt;br /&gt;
* &amp;quot;Nirvana&amp;quot; Nice to have: ALL Individual versions of ALL JavaScript files from ALL opensource projects, (ideally) even if the project is not a JavaScript library -i.e. JavaScript files from Joomla, Wordpress, etc.-&lt;br /&gt;
&lt;br /&gt;
Common JavaScript library fingerprinting techniques include:&lt;br /&gt;
* Parse the JavaScript file and grab the version from there&lt;br /&gt;
* Determine the JavaScript version based on a hash of the file&lt;br /&gt;
* Determine the JavaScript version based on the length of the file&lt;br /&gt;
&lt;br /&gt;
Other Challenges:&lt;br /&gt;
* &amp;quot;the file&amp;quot; could be &amp;quot;the minimised file&amp;quot;, &amp;quot;the expanded file&amp;quot; or even &amp;quot;a specific JavaScript file from Library X&amp;quot;&lt;br /&gt;
* When the JavaScript file does not match a specific version:&lt;br /&gt;
	1) The commit that matches the closest should (ideally) be found&lt;br /&gt;
	2) The NEXT library version after that commit (if present) should be found&lt;br /&gt;
	3) From there, it is about reusing the knowledge to figure out public vulnerabilities, CVSS scores, etc. again&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability -i.e. the Health Monitor cannot crash! :)-&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Off-line HTTP traffic uploader ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Although it is awesome that OWTF runs a lot of tools on behalf of the user, there are situations where uploading the HTTP traffic of another tool off-line can be very interesting for OWTF, for example:&lt;br /&gt;
&lt;br /&gt;
* Tools that OWTF has trouble proxying right now: skipfish, hoppy&lt;br /&gt;
* Tools that the user may have run manually OR even from a tool aggregator -very common! :)-&lt;br /&gt;
* Tools that we just don't run from OWTF: ZAP, Burp, Fiddler&lt;br /&gt;
&lt;br /&gt;
This project is about implementing an off-line utility able to parse HTTP traffic:&lt;br /&gt;
&lt;br /&gt;
1) Figure out how to read output files from various tools like:&lt;br /&gt;
skipfish, hoppy, w3af, arachni, etc.&lt;br /&gt;
Nice to have: ZAP database, Burp database&lt;br /&gt;
&lt;br /&gt;
2) Translate that into the following clearly defined fields:&lt;br /&gt;
&lt;br /&gt;
* HTTP request&lt;br /&gt;
* HTTP response status code&lt;br /&gt;
* HTTP response headers&lt;br /&gt;
* HTTP response body&lt;br /&gt;
&lt;br /&gt;
3) IMPORTANT: Implement a plugin-based uploader system&lt;br /&gt;
&lt;br /&gt;
4) IMPORTANT: Implement ONE plugin, that uploads that into the OWTF database&lt;br /&gt;
&lt;br /&gt;
5) IMPORTANT: OWTF should ideally be able to invoke the uploader right after running a tool&lt;br /&gt;
	Example: OWTF runs skipfish, skipfish finishes, OWTF runs the HTTP traffic uploader, all skipfish data is pushed to the OWTF DB.&lt;br /&gt;
&lt;br /&gt;
6) CRITICAL: The off-line HTTP traffic uploader should be smart enough to read + push 1-by-1 instead of *stupidly* trying to load everything into memory first, you have been warned! :)&lt;br /&gt;
&lt;br /&gt;
	Why? Because in a huge assessment, the output of &amp;quot;tool X&amp;quot; can be &amp;quot;10 GB&amp;quot;, which is *stupid* to load into memory, this is OWTF, we *really* try to foresee the crash before it happens! ;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CRITICAL: It is important to implement a plugin-based uploader system, so that other projects can benefit from this work (i.e. to be able to import third-party tool data to ZAP, Burp, and other tools in a similar fashion), and hence hopefully join us in maintaining this project moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability -i.e. the Health Monitor cannot crash! :)-&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Health Monitor ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
In some cases, especially on large assessments (think: &amp;gt; 30 URLs) a number of things often go wrong and OWTF needs to recover from everything, which is difficult.&lt;br /&gt;
&lt;br /&gt;
For this reason, OWTF needs an independent module, which is completely detached from OWTF (a different process), to ensure the health of the assessment is in check at all times, this includes the following:&lt;br /&gt;
&lt;br /&gt;
'''Feature 1) Alerting mechanisms'''&lt;br /&gt;
&lt;br /&gt;
When any of the monitor alerts (see below) is triggered. The OWTF user will be notified immediately through ALL of the following means:&lt;br /&gt;
* Playing an mp3 song (both local and possibly remote locations)&lt;br /&gt;
* Scan status overview on the CLI&lt;br /&gt;
* Scan status overview on the GUI&lt;br /&gt;
&lt;br /&gt;
NOTE: A configuration file from where the user can enable/disable/configure all these mechanisms is desired.&lt;br /&gt;
&lt;br /&gt;
'''Feature 2) Corrective mechanisms'''&lt;br /&gt;
&lt;br /&gt;
Corrective mechanisms are also expected in this project, these will be accomplished sending OWTF api messages such as:&lt;br /&gt;
* Stop this tool&lt;br /&gt;
* Freeze this process (to continue later)&lt;br /&gt;
* Freeze the whole scan (to continue later)&lt;br /&gt;
&lt;br /&gt;
Additional mechanisms:&lt;br /&gt;
* Show a ranking of files that take the most space&lt;br /&gt;
&lt;br /&gt;
'''Feature 3) Target monitor'''&lt;br /&gt;
&lt;br /&gt;
Brief overview:&lt;br /&gt;
&lt;br /&gt;
All target URLs are checked for availability periodically (i.e. once x 5 minutes?), if a URL in scope goes down the pentester is alerted (see above).&lt;br /&gt;
&lt;br /&gt;
Potential approach: Check if length of 1st page changes every 60 seconds.&lt;br /&gt;
&lt;br /&gt;
NOTE: It might be needed to change this on the fly.&lt;br /&gt;
&lt;br /&gt;
More background&lt;br /&gt;
&lt;br /&gt;
Consider the following scenario:&lt;br /&gt;
&lt;br /&gt;
Current Situation aka &amp;quot;problem to solve&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
1) Website X goes down during a scan&lt;br /&gt;
&lt;br /&gt;
2) the customer notices&lt;br /&gt;
&lt;br /&gt;
3) the customer tells the boss&lt;br /&gt;
&lt;br /&gt;
4) the boss tells the pentester&lt;br /&gt;
&lt;br /&gt;
5) the pentester stops the tool which was *still* trying to scan THAT target (!!!!)&lt;br /&gt;
&lt;br /&gt;
Desired situation aka &amp;quot;solution&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
It would be much more professional AND efficient that:&lt;br /&gt;
&lt;br /&gt;
1) The pentester notices&lt;br /&gt;
&lt;br /&gt;
2) The pentester tells the boss&lt;br /&gt;
&lt;br /&gt;
3) The boss tells the customer&lt;br /&gt;
&lt;br /&gt;
4) OWTF stops the tool because it knows that website is DEAD anyway&lt;br /&gt;
&lt;br /&gt;
A target monitor could easily do this with heartbeat requests + playing mp3s&lt;br /&gt;
&lt;br /&gt;
The target monitor will use the api to tell OWTF &amp;quot;this target is dead: freeze(stop?) current tests, skip target in future tests&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Feature 4) Disk space monitor'''&lt;br /&gt;
&lt;br /&gt;
Another problem that is relatively common in large assessments, is that all disk space is used and the scanning box becomes unresponsive or crashes. When this happens it is too late, the pentester may also see this coming but wonder “which are the biggest files in the filesystem that I can delete”, it is not ideal to have to look for these files in a moment when the scanning box is about to crash :).&lt;br /&gt;
&lt;br /&gt;
Proposed solution:&lt;br /&gt;
&lt;br /&gt;
Regularly monitor how much disk space is left, especially on the partition where OWTF is writing the review (but also tool directories such as /home/username/.w3af/tmp, etc.). Keep track of files created by OWTF and all called tools and sort them by size in descending order. Then when the disk space is going low (i.e. predefined threshold), an mp3 or similar is played and this list is displayed to the user, so that they know what to delete to survive :).&lt;br /&gt;
&lt;br /&gt;
'''Feature 5) Network/Internet Connectivity monitor'''&lt;br /&gt;
&lt;br /&gt;
Sometimes it may also happen that ISP, etc. connectivity go down in the middle of a scan, this is often a very unfortunate situation since most tools are scanning in parallel and they won’t be able to produce a report OR even resume (i.e. A LOT is lost). The goal here is that OWTF does all of the following automatically:&lt;br /&gt;
&lt;br /&gt;
1) Detects the lack of connectivity&lt;br /&gt;
&lt;br /&gt;
2) Freezes all the tools (read: processes) in progress&lt;br /&gt;
&lt;br /&gt;
3) Resumes the scan when the connectivity is back.&lt;br /&gt;
&lt;br /&gt;
'''Feature 6) Tool crash detection'''&lt;br /&gt;
&lt;br /&gt;
Sometimes, certain tools (most notably, ahem, w3af), when they crash they do NOT exit. This leaves OWTF in a difficult position where 1+ process is waiting for nothing, forever (i.e. because “Tool X” will never finish)&lt;br /&gt;
&lt;br /&gt;
'''Feature 7) Tool (Plugin?) CPU/RAM/Bandwidth abuse detection and correction'''&lt;br /&gt;
&lt;br /&gt;
OWTF needs to notice when some tools crash and/or “go beserk” with RAM/CPU/Bandwidth consumption, this is different from the existing built-in checks in OWTF like “do not launch a new tool if there is less than XYZ RAM free” and more like “if tool X is using &amp;gt; XYZ of the available RAM/CPU/Bandwidth” and this is (potentially) negatively affecting other tools/tests, then throttle it.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability -i.e. the Health Monitor cannot crash! :)-&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Installation Improvements and Package manager ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
This project is to implement what was suggested in the following github issue:&lt;br /&gt;
[https://github.com/owtf/owtf/issues/192 https://github.com/owtf/owtf/issues/192]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Recently i tried to make a fresh installation of OWTF. The installation process takes too much time. Is there any way to make the installation faster?&lt;br /&gt;
Having a private server with:&lt;br /&gt;
* pre-installed files for VMs&lt;br /&gt;
* pre-configured and patched tools&lt;br /&gt;
* Merged Lists&lt;br /&gt;
* Pre-configured certificates&lt;br /&gt;
Additionally a minimal installation which will install the core of OWTF with the option of update can increase the installation speed. The update procedure will start fetching the latest file versions from the server and copy them to the right path.&lt;br /&gt;
Additional ideas are welcome.&lt;br /&gt;
&lt;br /&gt;
-- They could be hosted on Dropbox or a private VPS :)&lt;br /&gt;
&lt;br /&gt;
2 Installation Modes&lt;br /&gt;
* For high speed connections (Downloading the files uncompressed)&lt;br /&gt;
* For low speed connections (Downloading the files compressed)&lt;br /&gt;
and the installation crashed because i runned out of space in the vm&lt;br /&gt;
IMPORTANT NOTE: OWTF should check the available disk space BEFORE installation starts + warn the user if problems are likely&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* Excellent reliability (i.e. proper exception handling, etc.)&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Testing Framework Improvements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
As OWASP OWTF grows it makes sense to build custom unit tests to automatically re-test that functionality has not been broken. In this project we would like to improve the existing unit testing framework so that creating OWASP OWTF unit tests is as simple as possible and all missing tests for new functionality are created. The goal of this project is to update the existing Unit Test Framework to create all missing tests as well as improve the existing ones to verify OWASP OWTF functionality in an automated fashion.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Top features'''&lt;br /&gt;
&lt;br /&gt;
In this improvement phase, the Testing Framework should:&lt;br /&gt;
* (Top Prio) Focus more on functional tests&lt;br /&gt;
For example: Improve coverage of OWASP Testing Guide, PTES, etc. (lots of room for improvement there!)&lt;br /&gt;
* (Top Prio) Put together a great wiki documentation section for contributors&lt;br /&gt;
The goal here is to help contributors write tests for the functionality that they implement. This should be as easy as possible.&lt;br /&gt;
* (Top Prio) Fix the current Travis issues :)&lt;br /&gt;
* (Nice to have) Bring the unit tests up to speed with the codebase&lt;br /&gt;
This will be challenging but very worth trying after top priorities.&lt;br /&gt;
The wiki should be heavily updated so that contributors create their own unit tests easily moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''General background'''&lt;br /&gt;
&lt;br /&gt;
The Unit Test Framework should be able to:&lt;br /&gt;
* Define test categories: For example, &amp;quot;all plugins&amp;quot;, &amp;quot;web plugins&amp;quot;, &amp;quot;aux plugins&amp;quot;, &amp;quot;test framework core&amp;quot;, etc. (please see [http://www.slideshare.net/abrahamaranguren/introducing-owasp-owtf-workshop-brucon-2012 this presentation] for more background)&lt;br /&gt;
* Allow to regression test isolated plugins (i.e. &amp;quot;only test _this_ plugin&amp;quot;)&lt;br /&gt;
* Allow to regression test by test categories (i.e. &amp;quot;test only web plugins&amp;quot;)&lt;br /&gt;
* Allow to regression test everything (i.e. plugins + framework core: &amp;quot;test all&amp;quot;)&lt;br /&gt;
* Produce meaningful statistics and easy to navigate logs to identify which tests failed and ideally also hints on how to potentially fix the problem where possible&lt;br /&gt;
* Allow for easy creation of _new_ unit tests specific to OWASP OWTF&lt;br /&gt;
* Allow for easy modification and maintenance of _existing_ unit tests specific to OWASP OWTF&lt;br /&gt;
* Perform well so that we can run as many tests as possible in a given period of time&lt;br /&gt;
* Potentially leverage the python unittest library: [http://docs.python.org/2/library/unittest.html http://docs.python.org/2/library/unittest.html]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* Performant and automated regression testing&lt;br /&gt;
* Unit tests for a wide coverage of OWASP OWTF, ideally leveraging the Unit Test Framework where possible&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with unit tests and automated regression testing would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Tool utilities module ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The spirit of this feature is something that may or may not be used from OWTF: These are utilities that may be chained together by OWTF OR a penetration tester using the command line. The idea is to automate mundane tasks that take time but may provide a lever to a penetration tester short on time.&lt;br /&gt;
&lt;br /&gt;
'''Feature 1) Vulnerable software version database:'''&lt;br /&gt;
&lt;br /&gt;
Implement a searchable vulnerable software version database so that a penetration tester enters a version and gets vulnerabilities sorted by criticality with MAX Impact vulnerabilities at the top (possibly: CVSS score in DESC order).&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
[http://www.cvedetails.com/vulnerability-list.php?vendor_id=74&amp;amp;product_id=128&amp;amp;version_id=149817&amp;amp;page=1&amp;amp;hasexp=0&amp;amp;opdos=0&amp;amp;opec=0&amp;amp;opov=0&amp;amp;opcsrf=0&amp;amp;opgpriv=0&amp;amp;opsqli=0&amp;amp;opxss=0&amp;amp;opdirt=0&amp;amp;opmemc=0&amp;amp;ophttprs=0&amp;amp;opbyp=0&amp;amp;opfileinc=0&amp;amp;opginf=0&amp;amp;cvssscoremin=0&amp;amp;cvssscoremax=0&amp;amp;year=0&amp;amp;month=0&amp;amp;cweid=0&amp;amp;order=3&amp;amp;trc=17&amp;amp;sha=0d26af6f3ba8ea20af18d089df40c252ea09b711 Vulnerabilities against specific software version]&lt;br /&gt;
&lt;br /&gt;
'''Feature 2) Nmap output file merger:'''&lt;br /&gt;
&lt;br /&gt;
Unify nmap files *without* losing data: XML, text and greppable formats&lt;br /&gt;
For example: Sometimes 2 scans pass through the same port, one returns the server version, the other does not, we obviously do not want to lose banner information :).&lt;br /&gt;
&lt;br /&gt;
'''Feature 3) Nmap output file vulnerability mapper'''&lt;br /&gt;
&lt;br /&gt;
From an nmap output file, get the unique software version banners, and provide a list of (maybe in tabs?):&lt;br /&gt;
&lt;br /&gt;
1) CVEs in reverse order of CVSS score, with links.&lt;br /&gt;
&lt;br /&gt;
2) Metasploit modules available for each CVE / issue&lt;br /&gt;
&lt;br /&gt;
NOTE: Can supply an *old* shell script for reference&lt;br /&gt;
&lt;br /&gt;
3) Servers/ports affected (i.e. all server / port combinations using that software version)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Feature 4) URL target list creator:'''&lt;br /&gt;
&lt;br /&gt;
Turn all “speaks http” ports (from any nmap format) into a list of URL targets for OWTF&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Feature 5) Hydra command creator:'''&lt;br /&gt;
&lt;br /&gt;
nmap file in =&amp;gt; Hydra command list out&lt;br /&gt;
&lt;br /&gt;
grep http auth / login pages in output files to identify login interfaces =&amp;gt; Hydra command list out&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Feature 6) WP-scan command creator:'''&lt;br /&gt;
&lt;br /&gt;
look at all URLs (i.e. nmap file), check if they might be running word press, generate a list of suggested wp-scan commands for all targets that might be running word press&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* Excellent reliability (i.e. proper exception handling, etc.)&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with unit tests and automated regression testing would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
''' OWASP Mentors '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
ZAP is one of the top OWASP projects and the most active open source web security tools. &lt;br /&gt;
&lt;br /&gt;
You can follow (and join in) the GSoC discussions on the ZAP Developer Group: https://groups.google.com/d/msg/zaproxy-develop/Uy0JPkzsI_s/Bj7OTSkISCIJ&lt;br /&gt;
&lt;br /&gt;
=== Bug tracker support ===&lt;br /&gt;
&lt;br /&gt;
This would allow ZAP users to raise issues in bug trackers directly within ZAP. Ideally it would be implemented as an extension with a generic framework and then adaptors for specific trackers, like github and bugzilla.&lt;br /&gt;
&lt;br /&gt;
The info included in the issues raised should be as configurable as possible so that users can include whatever they want, and set things like custom fields.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* Raise issues in github and bugzilla from alerts within the ZAP UI&lt;br /&gt;
* Support for raising alerts using the ZAP API&lt;br /&gt;
* High level of customization so that users can tune to their requirements&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
''' Mentors '''&lt;br /&gt;
Simon Bennetts and other members of the ZAP core team&lt;br /&gt;
&lt;br /&gt;
=== Field enumeration ===&lt;br /&gt;
&lt;br /&gt;
This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
&lt;br /&gt;
The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
''' Mentors '''&lt;br /&gt;
Simon Bennetts and other members of the ZAP core team&lt;br /&gt;
&lt;br /&gt;
=== Form Handling ===&lt;br /&gt;
&lt;br /&gt;
The ZAP traditional and Ajax spiders explore an application by putting basic default values in all forms. These may often not be valid values, for example using &amp;quot;ZAP&amp;quot; when an email address is required.&lt;br /&gt;
&lt;br /&gt;
The enhancement would allow the user to define default values based on pattern matching against the field names and/or ids.&lt;br /&gt;
&lt;br /&gt;
It would also be very useful if it could show the user all forms and their associated fields for an application, and then allow the user to update the default values.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* User able to specify default values for all forms used by the ZAP spiders&lt;br /&gt;
* Display all of the forms and fields for an application and allow the user to update the default values to be used&lt;br /&gt;
* Full support for defining default values via the API&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
''' Mentors '''&lt;br /&gt;
Simon Bennetts and other members of the ZAP core team&lt;br /&gt;
&lt;br /&gt;
=== Automated authentication detection and configuration ===&lt;br /&gt;
&lt;br /&gt;
ZAP has extensive support for supporting application authentication, but configuring this is a manual process which can be tricky to get right.&lt;br /&gt;
&lt;br /&gt;
The enhancement would allow ZAP to detect as many forms of authentication as possible and automatically configure them using the existing ZAP functionality.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* Automatically detect a wide range of authentication mechanisms&lt;br /&gt;
* Automatically configure ZAP to handle them&lt;br /&gt;
* Full support via the API&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
''' Mentors '''&lt;br /&gt;
Simon Bennetts and other members of the ZAP core team&lt;br /&gt;
&lt;br /&gt;
=== Advanced padding oracle testing and exploitation ===&lt;br /&gt;
&lt;br /&gt;
ZAP has currently has very minimal support in it's the (beta) [https://github.com/zaproxy/zap-extensions/blob/beta/src/org/zaproxy/zap/extension/ascanrulesBeta/PaddingOraclePlugin.java PaddingOraclePlugin] for identifying potential [https://en.wikipedia.org/wiki/Padding_oracle_attack padding oracle] vulnerabilities. Specifically, it only examines two indicators for possible oracles (changing the last byte of padding by XORing it with 0x1 and resubmitting the HTTP request with the new altered parameter to see if the HTTP response contains some error patter or to check if the returned HTTP status is a 500 error. Furthermore, it is limited to checking parameters, but encrypted values that may be susceptible to padding oracle attacks may also be in HTTP cookies or even HTTP request / response values. (In the latter case, these custom headers are usually manipulated via AJAX.) Lastly SOAP messages using [https://www.w3.org/TR/2002/REC-xmlenc-core-20021210/Overview.html W3C XML Encryption] and JSON are other potential sources of padding oracle vulnerabilities that might be examined.&lt;br /&gt;
&lt;br /&gt;
The enhancement would extend the support to more a broader attack surface such as new attack vectors like cookies, HTTP headers, and possibly XML or JSON and also expand the identification of potential new oracles to not just keywords, but to any minute difference in responses (at least for idempotent GETs) or significant variations in time. Lastly, we would like to add the ability to exploit padding oracle vulnerabilities discovered which could lead to whole lot of other interesting discoveries.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* Detect oracle padding vulnerabilities in more situations&lt;br /&gt;
** Expanded attack vectors: cookies, HTTP headers, XML, JSON&lt;br /&gt;
** Expanded variation of recognized potential oracles: ''any'' output differences when padding correct vs. incorrect (takes much more than flipping a single padding bit), significant differences in timing, etc.&lt;br /&gt;
* Add the option to actually attempt to exploit discovered potential padding oracle vulnerabilities and report additional subsequent findings once the ciphertext is actually decrypted.&lt;br /&gt;
* Build test code to illustrate a working proof of concept&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. Reading up on basic details of how padding oracle attacks operate would also be extremely helpful.&lt;br /&gt;
&lt;br /&gt;
''' Mentors '''&lt;br /&gt;
Kevin Wall (cryptography subject matter expert) and other members of the ZAP core team&lt;br /&gt;
&lt;br /&gt;
=== Zest text representation and parser ===&lt;br /&gt;
&lt;br /&gt;
Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
&lt;br /&gt;
A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* A documented definition of a text representation for Zest&lt;br /&gt;
* A parser that converts the text representation into a working Zest script&lt;br /&gt;
* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
''' Mentors '''&lt;br /&gt;
Simon Bennetts and other members of the ZAP core team&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
We're always open to students coming up with their own suggestions for ZAP projects, so if you have something you think would make ZAP better then please get in touch!&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* That depends on your project, but clearly defined goals will be necessary&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
''' Mentors '''&lt;br /&gt;
Simon Bennetts and other members of the ZAP core team&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSensor ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSensor Project]] provides real-time application layer intrusion detection. &lt;br /&gt;
&lt;br /&gt;
 * Check the AppSensor wiki page linked above&lt;br /&gt;
 * Contact us through the mailing list.&lt;br /&gt;
 * Check our [https://github.com/jtmelton/appsensor github repository] and the [https://github.com/jtmelton/appsensor/issues open tickets]&lt;br /&gt;
 * Also see our [http://www.appsensor.org appsensor website]&lt;br /&gt;
&lt;br /&gt;
=== Dashboard UI Expansion ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
AppSensor provides a solid base of functionality to applications, and we currently have a minimal application for data display. This project will involve expanding the default/standard UI for the AppSensor project. As part of the project, you will learn about the domain model, iterating your mockup designs and share those with the project leader(s) and the community for feedback. The existing stack is based on spring boot and reactjs. There are lots of features to be added, and you'll work with the project leader(s) and the community to build the most-needed and requested capabilities.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The existing dashboard application will be expanded and will involve features like: &lt;br /&gt;
* Search (could involve significant back-end work to configure indexing, etc.)&lt;br /&gt;
* Policy Management (edit server configuration in real-time)&lt;br /&gt;
* Data visualization / dashboarding&lt;br /&gt;
&lt;br /&gt;
Source code, tests, and associated documentation for both the back-end and UI will be delivered for this effort.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable with UI design and development, particularly building dashboards. Comfortable with Java (with some assistance). Basic familiarity with security concepts related to intrusion detection and prevention as this is the domain.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' John Melton - OWASP AppSensor Project Leader (Development)&lt;br /&gt;
&lt;br /&gt;
=== Trend Monitoring Analysis Engine ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
AppSensor currently supports a basic policy-driven analysis engine to determine if a series of events represents an attack (if a user triggers 5 of this type of event in 10 minutes, it's an attack). While this supports many use cases, there are times when it would be helpful to know trending information. If a particular function of the application begins to see 10 times its normal amount of traffic, that might represent an attack. This project would add an additional analysis engine to support &amp;quot;trend monitoring&amp;quot;. Development of this feature would require some initial research on alternative implementation strategies, followed by the development and testing of the feature in AppSensor. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The project should produce: &lt;br /&gt;
* A trend monitoring analysis engine to be used either in place of or in addition to the existing policy-driven analysis engine&lt;br /&gt;
* Associated configuration mechanism to specify the trending rules/policy&lt;br /&gt;
* A small full sample demo application showing usage of the trend monitoring feature&lt;br /&gt;
&lt;br /&gt;
Source code and associated tests for the feature will be created, along with the associated end user documentation for how to setup and configure it. &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in Java and unit testing.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' John Melton - OWASP AppSensor Project Leader (Development)&lt;br /&gt;
&lt;br /&gt;
=== Expand language support for clients ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
AppSensor supports various modes for communication with the server. The language and framework of the client application are required only to support the given mode. This flexibility is desirable, but having pre-built clients in various languages is useful for our user-base. This project would involve working with various popular languages and frameworks to build support for communicating with the appsensor server backend.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The project should produce: &lt;br /&gt;
* Clients in multiple popular languages for interaction with appsensor server&lt;br /&gt;
* Evaluate the possibility for generating clients from specification as opposed to writing and maintaining the code (ie. swagger for REST)&lt;br /&gt;
* At a minimum, coverage for the HTTP/REST mode should be supported. Other modes (thrift, soap, kafka, etc.) will be produced as time allows. &lt;br /&gt;
* Several small demo applications showing usage of the given APIs&lt;br /&gt;
&lt;br /&gt;
Source code and tests for the feature will be created, along with the associated end user documentation for how to setup and configure it. &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable working in multiple popular languages and unit testing.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' John Melton - OWASP AppSensor Project Leader (Development)&lt;br /&gt;
&lt;br /&gt;
=== Implement Detection Points in Reverse Proxy ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
AppSensor works by tracking events that are created by &amp;quot;detection points&amp;quot;, essentially locations in the processing pipeline where suspicious or malicious intent is observed. This often requires business-specific detection within the application. However, the project has defined a number of detection points (https://www.owasp.org/index.php/AppSensor_DetectionPoints) and responses (https://www.owasp.org/index.php/AppSensor_ResponseActions), some of which can be generically applied across a broader set of applications, including those that are common to an entire organization or even cross-organization. For that reason, a sub-project has been created (https://github.com/jtmelton/appsensor-reverse-proxy) that provides support for detection points and responses that are generic enough to be broadly applicable. This project would expand support for these detection points and responses.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The project should produce: &lt;br /&gt;
* New detection points and responses&lt;br /&gt;
* Documentation for how to deploy the project and any end-user considerations&lt;br /&gt;
* Load testing each function as this project front-ends applications, and traffic throughput characteristics are important to our user-base.&lt;br /&gt;
* A small sample demo application showing the utility of the proxy. A recording of the usage for community viewing would be beneficial.&lt;br /&gt;
&lt;br /&gt;
Source code and associated tests for the feature will be created, along with the associated end user documentation for how to setup and configure it. &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in golang and unit testing.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' John Melton - OWASP AppSensor Project Leader (Development)&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid [[OWASP_SeraphimDroid_Project| ]] ==&lt;br /&gt;
&lt;br /&gt;
=== Behavioral malware and intrusion analysis  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is an Android mobile app which already has a capability to statically analyze malware using machine learning (weka toolkit) relying on permissions. However, this is usually not enough and we intend to improve this with behavioral analysis. There are a number of paper in scientific literature describing how to detect malware and intrusions by dynamically analyzing its behavior (system calls, battery consumption, etc.). The idea of this project is to find the best approach that can be implemented on the device and implement it.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Reviewing scientific literature and find feasible approach we can take&lt;br /&gt;
*  Implement and possibly improve the approach in Seraphimdroid&lt;br /&gt;
*  Test the model and provide controls to switch algorithm on or off and possibly fine tune it&lt;br /&gt;
*  Documenting approach as a technical report&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
* Basic knowledge and interest in machine learning&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Framework for plugin development  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is well rounded security and privacy app, however, it lacks some components community can provide. We would like to provide community the way to develop plugins that can add features to OWASP Seraphimdroid app. However, the way of integrating external components into Android app may be challenge. The way of presenting GUI and integration between processes need to be examined and developed. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Examining the way of integrating third party apps through some provided API to OWASP Seraphimdroid&lt;br /&gt;
*  Providing GUI integration with third party components&lt;br /&gt;
*  Develop at least one test plugin&lt;br /&gt;
*  Document the development process and API&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Educational component  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is well rounded security and privacy app. The initial idea of the project was to provide educational platform for common users, where by using the application, users can learn about risks for their privacy and security. Some components already has some sort of explanation, which is educational. However, it lacks of uneatable knowledge source and some of the components that monitor user's behavior do not provide sufficient information. Idea of this project is to develop monitoring of user activity and an component that can warn user about risks if he does something risky. Also, mobile security knowledge base that can be updated remotely will be a huge new asset to the application.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Develop uneatable knowledge base and GUI for it&lt;br /&gt;
*  Develop web server where the knowledge base can be updated&lt;br /&gt;
*  Improve current educational reporting&lt;br /&gt;
*  Develop methodology for monitoring users and notifying them about risky activities&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZSC Tool ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_ZSC_Tool_Project|OWASP ZSC]] is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Please take a look of our TODO list in Github to get some ideas:&lt;br /&gt;
https://github.com/Ali-Razmjoo/OWASP-ZSC/issues&lt;br /&gt;
&lt;br /&gt;
Another ideas:&lt;br /&gt;
* Help us develop shellcode module for windows&lt;br /&gt;
* Develop shellcode module for OSX&lt;br /&gt;
&lt;br /&gt;
Read about the project here:&lt;br /&gt;
https://ali-razmjoo.gitbooks.io/owasp-zsc/content/&lt;br /&gt;
&lt;br /&gt;
Recommended reading:&lt;br /&gt;
http://www.vividmachines.com/shellcode/shellcode.html&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python&lt;br /&gt;
* Basic knowledge about Shellcode and assembly language&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
*Christo and Timo Goosen and Brian Beaudry- OWASP ZSC Contributors&lt;br /&gt;
&lt;br /&gt;
Contact us through our mailing list for questions:&lt;br /&gt;
https://groups.google.com/d/forum/owasp-zsc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP-SKF (Security Knowledge Framework) ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX under python.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
    Security Requirements OWASP ASVS for development and for third party vendor applications&lt;br /&gt;
    Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
    Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
    Security post-development functionality in SKF for verification with the OWASP ASVS&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
    More code examples for different languages&lt;br /&gt;
    Better quality of the knowledge base items&lt;br /&gt;
    More items in the pre-development phase&lt;br /&gt;
    Editable checklists in the post-development phase&lt;br /&gt;
&lt;br /&gt;
We really would love to improve the quality of the knowledge base items further, also we would love to have more code examples in the different languages like: Perl, Hack, Go, Node.js and more.&lt;br /&gt;
&lt;br /&gt;
Please take a look of our TODO list in Github to get some ideas:&lt;br /&gt;
https://github.com/blabla1337/skf-flask/issues&lt;br /&gt;
&lt;br /&gt;
Another ideas:&lt;br /&gt;
* Help us with stuff you think is missing in the SKF project&lt;br /&gt;
&lt;br /&gt;
Read about the project here:&lt;br /&gt;
https://skf.readme.io&lt;br /&gt;
&lt;br /&gt;
Recommended reading (here you find a link to the Online Demo):&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Knowledge_Framework&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python, PHP, Hack, .NET, GO, Ruby, Perl, Java, Node.js&lt;br /&gt;
* Basic knowledge about programming in one of the above languages&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
*Glenn and Riccardo ten Cate- OWASP-SKF project leaders&lt;br /&gt;
*Martin Knobloch Chapter leader of OWASP NL&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2016_Ideas&amp;diff=209220</id>
		<title>GSOC2016 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2016_Ideas&amp;diff=209220"/>
				<updated>2016-02-19T21:29:52Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check the Hackademic wiki page linked above&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/Hackademic/hackademic github repository] and especially the [https://github.com/Hackademic/hackademic/issues open tickets]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Hackademic Challenges ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Hackademic Challenges Project]]  helps you test your knowledge on web application security. You can use it to actually attack web applications in a realistic but also controllable and safe environment. After a wonderfull 2014 GSoC with 100 new challenges and a couple of new plugins we're mainly looking to get new features in and maybe a couple of challenges. Bellow is a list of proposed features.&lt;br /&gt;
&lt;br /&gt;
=== REST API for the sandbox ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
During the last summer code sprint Hackademic got challenge sandboxing in the form of vagrant and docker wrappers as well as an engine to start and stop the container or vm instances.&lt;br /&gt;
What is needed now is a rest api which supports endpoint authentication and authorization which enables the sandbox engine to be completely independed from the rest of the project.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
Since the sandbox is written in python, you can use microframeworks such as flask to implement the api.&lt;br /&gt;
The endpoint authorization can be done via certificates or plain signature or username/password type authentication.&lt;br /&gt;
However the communication between the two has to be over a secure channel.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A REST style api which allows an authenticated remote entity control the sandbox engine.&lt;br /&gt;
* PEP8 compliant code&lt;br /&gt;
* Acceptable unit test coverage&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Python, test driven developmen, some idea what REST is, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== New CMS ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The CMS part of the project is really old and has accumulated a significant amount of technical debt.&lt;br /&gt;
In addition many design decisions are either outdated or could be improved. &lt;br /&gt;
Therefore it may be a good idea to leverage the power of modern web frameworks to create a new CMS.&lt;br /&gt;
The new cms can be written in php or python using any compoennts we agree are necesary and based on the framework we agree on.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* New cms with same functionality as the old one (3 types of users -- student, teacher, admin--, 3 types of resources -- article challenge, class--, ACL type permissions, CRUD operations on every resource/user, all functionality can be extended by Plugins.&lt;br /&gt;
* REST endpoints in addition to classic ones&lt;br /&gt;
* tests covering all routes implemented&lt;br /&gt;
* PSR/PEP 8 code&lt;br /&gt;
&lt;br /&gt;
''' Note: '''&lt;br /&gt;
This is a huge project, it is ok if the student implements a part of it. However whatever implemented must be up to spec.&lt;br /&gt;
If you decide to take on this project contact us and we can agree on a list of routes.&lt;br /&gt;
If you don't decide to take on this project contact us.&lt;br /&gt;
Generally contact us, we like it when students have insightful questions and the community is active&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Python or PHP, the framework suggested, what REST is, the technologies used, some security knowledge would be nice.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== First Course Type Challenge ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
We have a wonderful sandbox engine which allows for complex guided challenges to be implemented.&lt;br /&gt;
We'd like to build a challenge that guides the user through a series of steps to an end goal and teaches more information on the subject matter on the way.&lt;br /&gt;
This is a very open-ended project on purpose to allow creative student to come up with nice ideas.&lt;br /&gt;
Bellow you will find some examples that we thought might be interesting.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
* Purposefully vulnerable web page that guides the user via javascript tooltips and hints to exploiting it using ZAP. ( Bonus: using ZAP via the ZAP api). The challenge is solved when the the student submits the contents of a text file located on the disk (obtained by exploited an RCE)&lt;br /&gt;
&lt;br /&gt;
* Reversing a provided binary to extract information by providing step by step instructions to reversing using any popular reversing tool (well, you can't use IDA so gdb should have to do). Challenge is solved when the keys are extracted from the binary and submitted. Bonus points if each binary donwloaded has different keys.&lt;br /&gt;
&lt;br /&gt;
* Guide to exploiting the TOP10. (Using ZAP?)&lt;br /&gt;
&lt;br /&gt;
* Defensive Type challenges -- Here's how to create a patch for this kind of vulnerability -- Challenge is solved when the unit tests are run and the vulnerability isn't there.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
* One or more Course - style challenges provided either as a docker container or as a vagrant box.&lt;br /&gt;
* Concrete documentation on how to build a challenge like this.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
The technologies used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== Advanced Sandboxed Challenges ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
In the spirit of the challenges above, we're looking for true ctf type challenges.&lt;br /&gt;
This is an open ended task. We're expecting awesome fresh ideas.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
* An application vulnerable to one or more TOP 10 elements.&lt;br /&gt;
* A logic flaws based ctf&lt;br /&gt;
* Your idea here&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
Docker containers or Vagrant boxes that contain complete new challenges.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Knowledge of the technologies used&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Amazing students, in our experience the best, most creative and unique ideas show up when we let students suggest their own feature in relation to the project.&lt;br /&gt;
The above should give you a general idea where we're going but don't let them constrain you.&lt;br /&gt;
Do you wanna do something that would fit into Hackademic? Send us an email!&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
No idea, that's your turn to shine!&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
If it's code, code according to our coding standards.&lt;br /&gt;
If it's challenges, something new and interesting.&lt;br /&gt;
If it's something else, then written like the person who's going to maintain your code is a raging psychopath with an axe who knows where you live.&lt;br /&gt;
&lt;br /&gt;
In short we'd like some quality. ;-)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - VMS - OWTF Vulnerability Management System ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Background problem to solve:&lt;br /&gt;
&lt;br /&gt;
We are trying to reduce the human work burden where there will be hundreds of issues listing apache out of date or php out of date. &lt;br /&gt;
&lt;br /&gt;
Proposed solution:&lt;br /&gt;
&lt;br /&gt;
We can meta aggregate these duplicate issues into one issue of &amp;quot;outdated software / apache / php detected&amp;quot;. with XYZ list of issues in them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A separate set of scripts that allows for grouping and management of vulnerabilities (i.e. think huge assessments), to be usable *both* from inside + outside of OWTF in a separate sub-repo here: https://github.com/owtf &lt;br /&gt;
&lt;br /&gt;
VMS will have the following features:&lt;br /&gt;
* Vulnerability correlation engine which will allow for quick identification of unique vulnerability and deduplication.&lt;br /&gt;
* Vulnerability table optimization : combining redundant vulnerabilities like example : PHP &amp;lt;5.1 , PHP &amp;lt; 5.2 , PHP &amp;lt; 5.3 all suggest upgrade php so if multiple issues are reported they should be combined.&lt;br /&gt;
* Integration with existing bug tracking system like example bugzilla, jira : Should not be too hard as all such system have one or the other method exposed (REST API or similar)&lt;br /&gt;
* Fix Validation : Since we integrate with bug tracking once dev fixed the bug and code deployed we can run specific checks via * OWTF or other tool (may be specific nessus or nexpose plugin or similar.)&lt;br /&gt;
* Management Dashboard : Could be exposed to Pentester, Higher Management where stats are shown with lesser details but more of high level overview.&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/null0x00/nessus-and-reporting-karma Similar previous work for Nessus]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability -i.e. the Health Monitor cannot crash! :)-&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - HTTP Request Translator Improvements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Problem to solve:&lt;br /&gt;
&lt;br /&gt;
There are many situations in web app pentests where just no tool will do the job and you need to script something, or mess around with the command line (classic example: sequence of steps where each step requires input from the previous step). In these situations, translating an HTTP request or a sequence of HTTP requests, takes valuable time which the pentester might just not really have.&lt;br /&gt;
&lt;br /&gt;
Proposed solution:&lt;br /&gt;
&lt;br /&gt;
An HTTP request translator, a *standalone* *tool* that can:&lt;br /&gt;
&lt;br /&gt;
1) Be used from inside OR outside of OWTF.&lt;br /&gt;
&lt;br /&gt;
2) Translate raw HTTP requests into curl commands or bash/python/php/ruby/PowerShell scripts&lt;br /&gt;
&lt;br /&gt;
3) Provide essential quick and dirty transforms: base64 (encode/decode), urlencode (encode/decode)&lt;br /&gt;
* Transforms with boundary strings? (TBD)&lt;br /&gt;
* Individually or in bulk? (TBD)&lt;br /&gt;
&lt;br /&gt;
'''Essential Function: &amp;quot;--output&amp;quot; argument'''&lt;br /&gt;
&lt;br /&gt;
CRITICAL: The command/script should be generated so that the request is sent as literally as possible.&lt;br /&gt;
&lt;br /&gt;
Example: NO client specific headers are sent. IF the original request had &amp;quot;User-Agent: X&amp;quot;, the generated command/script should have EXACTLY that (i.e. NOT a curl user agent, etc.). Obviously, the same applies to ALL other headers.&lt;br /&gt;
&lt;br /&gt;
NOTE: Ideally the following should be implemented using an extensible plugin architecture (i.e. NEW plugins are EASY to add)&lt;br /&gt;
* http request in =&amp;gt; curl command out&lt;br /&gt;
* http request in =&amp;gt; bash script out&lt;br /&gt;
* http request in =&amp;gt; python script out&lt;br /&gt;
* http request in =&amp;gt; php script out&lt;br /&gt;
* http request in =&amp;gt; ruby script out&lt;br /&gt;
* http request in =&amp;gt; PowerShell script out&lt;br /&gt;
&lt;br /&gt;
'''Basic additional arguments:'''&lt;br /&gt;
&lt;br /&gt;
- &amp;quot;--proxy&amp;quot; argument: generates the command/script with the relevant proxy option&lt;br /&gt;
&lt;br /&gt;
		NOTE: With this the command/script may send requests through a MiTM proxy (i.e. OWTF, ZAP, Burp, etc.)&lt;br /&gt;
&lt;br /&gt;
- &amp;quot;--string-search&amp;quot; argument: generates the command/script so that it:&lt;br /&gt;
&lt;br /&gt;
		1) performs the request&lt;br /&gt;
&lt;br /&gt;
		2) then searches for something in the response (i.e. literal match)&lt;br /&gt;
&lt;br /&gt;
- &amp;quot;--regex-search&amp;quot; argument: generates the command/script so that it:&lt;br /&gt;
		1) performs the request&lt;br /&gt;
&lt;br /&gt;
		2) then searches for something in the response (i.e. regex match)&lt;br /&gt;
&lt;br /&gt;
'''OWTF integration'''&lt;br /&gt;
&lt;br /&gt;
The idea here, is to invoke this tool from:&lt;br /&gt;
&lt;br /&gt;
1) Single HTTP transactions:&lt;br /&gt;
&lt;br /&gt;
For example, have a button to &amp;quot;export http request&amp;quot; + then show options equivalent to the flags&lt;br /&gt;
&lt;br /&gt;
2) Multiple HTTP transactions:&lt;br /&gt;
&lt;br /&gt;
Same as with Single transactions, but letting the user &amp;quot;select a number of transactions&amp;quot; first (maybe a checkbox?).&lt;br /&gt;
&lt;br /&gt;
		&lt;br /&gt;
'''Desired input formats:'''&lt;br /&gt;
&lt;br /&gt;
* Read raw HTTP request from stdin -Suggested default behaviour! :)-&lt;br /&gt;
&lt;br /&gt;
	Example: cat path/to/http_request.txt | http-request-translator.py --output&lt;br /&gt;
&lt;br /&gt;
* Interactive mode: read raw HTTP request from keyboard + &amp;quot;hit enter when ready&amp;quot;&lt;br /&gt;
&lt;br /&gt;
	Suggestion: This could be a &amp;quot;-i&amp;quot; (for &amp;quot;interactive&amp;quot;) flag and/or the fallback option when &amp;quot;stdin is empty&amp;quot;&lt;br /&gt;
&lt;br /&gt;
	Example:&lt;br /&gt;
&lt;br /&gt;
	1) User runs tool with desired flags (i.e. &amp;quot;--output ruby --proxy 127.0.0.1:1234 ...&amp;quot;, etc.)&lt;br /&gt;
&lt;br /&gt;
	2) Tool prints: &amp;quot;Please paste a raw HTTP request and hit enter when ready&amp;quot;&lt;br /&gt;
&lt;br /&gt;
	3) User pastes a raw HTTP requests + hits enter&lt;br /&gt;
&lt;br /&gt;
	4) Tool outputs whatever is relevant for the flags + http request given&lt;br /&gt;
&lt;br /&gt;
* For bulk processing: Maybe a directory of raw http request files?&lt;br /&gt;
&lt;br /&gt;
'''Nice to have: Transforms'''&lt;br /&gt;
&lt;br /&gt;
In the context of translating raw HTTP requests into commands/scripts, what we want here is to provide some handy &amp;quot;macros&amp;quot; so that the relevant command/script is generated accordingly.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
&lt;br /&gt;
NOTE: Assume something like the following arguments: &amp;quot;--transform-boundary=@@@@@@@ --transform-language=php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Step 1) The user provides a raw HTTP request like this:&lt;br /&gt;
&lt;br /&gt;
  GET /path/to/urlencode@@@@@@@abc d@@@@@@@/test&lt;br /&gt;
  Host: target.com&lt;br /&gt;
  ...&lt;br /&gt;
&lt;br /&gt;
Step 2) The tool generates a bash script like the following:&lt;br /&gt;
&lt;br /&gt;
  #!/bin/bash&lt;br /&gt;
  &lt;br /&gt;
  PARAM1=$(echo 'abc d' | php -r &amp;quot;echo urlencode(fgets(STDIN));&amp;quot;)&lt;br /&gt;
  curl ...... &amp;quot;http://target.com/path/to/$PARAM1/test&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OR a &amp;quot;curl command&amp;quot; like the following:&lt;br /&gt;
  PARAM1=$(echo 'abc d' | php -r &amp;quot;echo urlencode(fgets(STDIN));&amp;quot;); curl ...... &amp;quot;http://target.com/path/to/$PARAM1/test&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This feature can be valuable to shave a bit more time in script writing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability -i.e. the Health Monitor cannot crash! :)-&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - JavaScript Library Sniper Improvements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
This is a project that tries to resolve a very common problem during penetration tests:&lt;br /&gt;
&lt;br /&gt;
The customer is running a number of outdated JavaScript Libraries, but there is just not enough time to determine if something useful -i.e. something *really* bad! :)- can be done with that or not.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To solve this problem, we propose a *standalone* *tool* that can:&lt;br /&gt;
&lt;br /&gt;
1) Be run BOTH from inside AND outside of OWTF&lt;br /&gt;
&lt;br /&gt;
2) Build and *update* a fingerprint JavaScript library database of:&lt;br /&gt;
* Library File hashes =&amp;gt; JavaScript Library version&lt;br /&gt;
* Library File lengths =&amp;gt; JavaScript Library version&lt;br /&gt;
* (Nice to have:) As above, but for each individual github commit (possible drawback: too big?)&lt;br /&gt;
&lt;br /&gt;
3) Build and *update* a vulnerability database of:&lt;br /&gt;
* JavaScript Library version =&amp;gt; CVE - CVSS score - Vulnerability info&lt;br /&gt;
&lt;br /&gt;
4) Given a [ JavaScript file OR hash OR length ], found in the database, provides:&lt;br /&gt;
* JavaScript Library version&lt;br /&gt;
* List of vulnerabilities sorted in descending CVSS score order&lt;br /&gt;
&lt;br /&gt;
5) (very cool to have) Given a list of JavaScript files (maybe a directory), provides:&lt;br /&gt;
* ALL Library/vulnerability matches described on 4)&lt;br /&gt;
	&lt;br /&gt;
Once the standalone tool is built and verified to be working, OWTF should be able to:&lt;br /&gt;
&lt;br /&gt;
Feature 1) GREP plugin improvement (Web Application Fingerprint):&lt;br /&gt;
&lt;br /&gt;
Step 1) Lookup file lengths and hashes in the &amp;quot;JavaScript library database&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Step 2) If a match is found: provide the list of known vulnerabilities against &amp;quot;JavaScript library X&amp;quot; to the user&lt;br /&gt;
&lt;br /&gt;
Feature 2) SEMI-PASSIVE plugin improvement (Web Application Fingerprint):&lt;br /&gt;
&lt;br /&gt;
1) Requests all referenced BUT missing JavaScript files -i.e. scanners won't load JavaScript files! :)-&lt;br /&gt;
&lt;br /&gt;
2) re-runs the GREP plugin on the new files (i.e. to avoid missing vulns due to unrequested JavaScript files)&lt;br /&gt;
&lt;br /&gt;
Potential projects worth having a look for potential overlap/inspiration:&lt;br /&gt;
* [https://owasp.org/index.php/OWASP_Dependency_Check OWASP Dependency Check?]&lt;br /&gt;
&lt;br /&gt;
How many JavaScript libraries should be included?&lt;br /&gt;
* As many as possible, but especially the major ones: jQuery, knockout, etc.&lt;br /&gt;
* &amp;quot;Nirvana&amp;quot; Nice to have: ALL Individual versions of ALL JavaScript files from ALL opensource projects, (ideally) even if the project is not a JavaScript library -i.e. JavaScript files from Joomla, Wordpress, etc.-&lt;br /&gt;
&lt;br /&gt;
Common JavaScript library fingerprinting techniques include:&lt;br /&gt;
* Parse the JavaScript file and grab the version from there&lt;br /&gt;
* Determine the JavaScript version based on a hash of the file&lt;br /&gt;
* Determine the JavaScript version based on the length of the file&lt;br /&gt;
&lt;br /&gt;
Other Challenges:&lt;br /&gt;
* &amp;quot;the file&amp;quot; could be &amp;quot;the minimised file&amp;quot;, &amp;quot;the expanded file&amp;quot; or even &amp;quot;a specific JavaScript file from Library X&amp;quot;&lt;br /&gt;
* When the JavaScript file does not match a specific version:&lt;br /&gt;
	1) The commit that matches the closest should (ideally) be found&lt;br /&gt;
	2) The NEXT library version after that commit (if present) should be found&lt;br /&gt;
	3) From there, it is about reusing the knowledge to figure out public vulnerabilities, CVSS scores, etc. again&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability -i.e. the Health Monitor cannot crash! :)-&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Off-line HTTP traffic uploader ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Although it is awesome that OWTF runs a lot of tools on behalf of the user, there are situations where uploading the HTTP traffic of another tool off-line can be very interesting for OWTF, for example:&lt;br /&gt;
&lt;br /&gt;
* Tools that OWTF has trouble proxying right now: skipfish, hoppy&lt;br /&gt;
* Tools that the user may have run manually OR even from a tool aggregator -very common! :)-&lt;br /&gt;
* Tools that we just don't run from OWTF: ZAP, Burp, Fiddler&lt;br /&gt;
&lt;br /&gt;
This project is about implementing an off-line utility able to parse HTTP traffic:&lt;br /&gt;
&lt;br /&gt;
1) Figure out how to read output files from various tools like:&lt;br /&gt;
skipfish, hoppy, w3af, arachni, etc.&lt;br /&gt;
Nice to have: ZAP database, Burp database&lt;br /&gt;
&lt;br /&gt;
2) Translate that into the following clearly defined fields:&lt;br /&gt;
&lt;br /&gt;
* HTTP request&lt;br /&gt;
* HTTP response status code&lt;br /&gt;
* HTTP response headers&lt;br /&gt;
* HTTP response body&lt;br /&gt;
&lt;br /&gt;
3) IMPORTANT: Implement a plugin-based uploader system&lt;br /&gt;
&lt;br /&gt;
4) IMPORTANT: Implement ONE plugin, that uploads that into the OWTF database&lt;br /&gt;
&lt;br /&gt;
5) IMPORTANT: OWTF should ideally be able to invoke the uploader right after running a tool&lt;br /&gt;
	Example: OWTF runs skipfish, skipfish finishes, OWTF runs the HTTP traffic uploader, all skipfish data is pushed to the OWTF DB.&lt;br /&gt;
&lt;br /&gt;
6) CRITICAL: The off-line HTTP traffic uploader should be smart enough to read + push 1-by-1 instead of *stupidly* trying to load everything into memory first, you have been warned! :)&lt;br /&gt;
&lt;br /&gt;
	Why? Because in a huge assessment, the output of &amp;quot;tool X&amp;quot; can be &amp;quot;10 GB&amp;quot;, which is *stupid* to load into memory, this is OWTF, we *really* try to foresee the crash before it happens! ;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CRITICAL: It is important to implement a plugin-based uploader system, so that other projects can benefit from this work (i.e. to be able to import third-party tool data to ZAP, Burp, and other tools in a similar fashion), and hence hopefully join us in maintaining this project moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability -i.e. the Health Monitor cannot crash! :)-&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Health Monitor ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
In some cases, especially on large assessments (think: &amp;gt; 30 URLs) a number of things often go wrong and OWTF needs to recover from everything, which is difficult.&lt;br /&gt;
&lt;br /&gt;
For this reason, OWTF needs an independent module, which is completely detached from OWTF (a different process), to ensure the health of the assessment is in check at all times, this includes the following:&lt;br /&gt;
&lt;br /&gt;
'''Feature 1) Alerting mechanisms'''&lt;br /&gt;
&lt;br /&gt;
When any of the monitor alerts (see below) is triggered. The OWTF user will be notified immediately through ALL of the following means:&lt;br /&gt;
* Playing an mp3 song (both local and possibly remote locations)&lt;br /&gt;
* Scan status overview on the CLI&lt;br /&gt;
* Scan status overview on the GUI&lt;br /&gt;
&lt;br /&gt;
NOTE: A configuration file from where the user can enable/disable/configure all these mechanisms is desired.&lt;br /&gt;
&lt;br /&gt;
'''Feature 2) Corrective mechanisms'''&lt;br /&gt;
&lt;br /&gt;
Corrective mechanisms are also expected in this project, these will be accomplished sending OWTF api messages such as:&lt;br /&gt;
* Stop this tool&lt;br /&gt;
* Freeze this process (to continue later)&lt;br /&gt;
* Freeze the whole scan (to continue later)&lt;br /&gt;
&lt;br /&gt;
Additional mechanisms:&lt;br /&gt;
* Show a ranking of files that take the most space&lt;br /&gt;
&lt;br /&gt;
'''Feature 3) Target monitor'''&lt;br /&gt;
&lt;br /&gt;
Brief overview:&lt;br /&gt;
&lt;br /&gt;
All target URLs are checked for availability periodically (i.e. once x 5 minutes?), if a URL in scope goes down the pentester is alerted (see above).&lt;br /&gt;
&lt;br /&gt;
Potential approach: Check if length of 1st page changes every 60 seconds.&lt;br /&gt;
&lt;br /&gt;
NOTE: It might be needed to change this on the fly.&lt;br /&gt;
&lt;br /&gt;
More background&lt;br /&gt;
&lt;br /&gt;
Consider the following scenario:&lt;br /&gt;
&lt;br /&gt;
Current Situation aka &amp;quot;problem to solve&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
1) Website X goes down during a scan&lt;br /&gt;
&lt;br /&gt;
2) the customer notices&lt;br /&gt;
&lt;br /&gt;
3) the customer tells the boss&lt;br /&gt;
&lt;br /&gt;
4) the boss tells the pentester&lt;br /&gt;
&lt;br /&gt;
5) the pentester stops the tool which was *still* trying to scan THAT target (!!!!)&lt;br /&gt;
&lt;br /&gt;
Desired situation aka &amp;quot;solution&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
It would be much more professional AND efficient that:&lt;br /&gt;
&lt;br /&gt;
1) The pentester notices&lt;br /&gt;
&lt;br /&gt;
2) The pentester tells the boss&lt;br /&gt;
&lt;br /&gt;
3) The boss tells the customer&lt;br /&gt;
&lt;br /&gt;
4) OWTF stops the tool because it knows that website is DEAD anyway&lt;br /&gt;
&lt;br /&gt;
A target monitor could easily do this with heartbeat requests + playing mp3s&lt;br /&gt;
&lt;br /&gt;
The target monitor will use the api to tell OWTF &amp;quot;this target is dead: freeze(stop?) current tests, skip target in future tests&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Feature 4) Disk space monitor'''&lt;br /&gt;
&lt;br /&gt;
Another problem that is relatively common in large assessments, is that all disk space is used and the scanning box becomes unresponsive or crashes. When this happens it is too late, the pentester may also see this coming but wonder “which are the biggest files in the filesystem that I can delete”, it is not ideal to have to look for these files in a moment when the scanning box is about to crash :).&lt;br /&gt;
&lt;br /&gt;
Proposed solution:&lt;br /&gt;
&lt;br /&gt;
Regularly monitor how much disk space is left, especially on the partition where OWTF is writing the review (but also tool directories such as /home/username/.w3af/tmp, etc.). Keep track of files created by OWTF and all called tools and sort them by size in descending order. Then when the disk space is going low (i.e. predefined threshold), an mp3 or similar is played and this list is displayed to the user, so that they know what to delete to survive :).&lt;br /&gt;
&lt;br /&gt;
'''Feature 5) Network/Internet Connectivity monitor'''&lt;br /&gt;
&lt;br /&gt;
Sometimes it may also happen that ISP, etc. connectivity go down in the middle of a scan, this is often a very unfortunate situation since most tools are scanning in parallel and they won’t be able to produce a report OR even resume (i.e. A LOT is lost). The goal here is that OWTF does all of the following automatically:&lt;br /&gt;
&lt;br /&gt;
1) Detects the lack of connectivity&lt;br /&gt;
&lt;br /&gt;
2) Freezes all the tools (read: processes) in progress&lt;br /&gt;
&lt;br /&gt;
3) Resumes the scan when the connectivity is back.&lt;br /&gt;
&lt;br /&gt;
'''Feature 6) Tool crash detection'''&lt;br /&gt;
&lt;br /&gt;
Sometimes, certain tools (most notably, ahem, w3af), when they crash they do NOT exit. This leaves OWTF in a difficult position where 1+ process is waiting for nothing, forever (i.e. because “Tool X” will never finish)&lt;br /&gt;
&lt;br /&gt;
'''Feature 7) Tool (Plugin?) CPU/RAM/Bandwidth abuse detection and correction'''&lt;br /&gt;
&lt;br /&gt;
OWTF needs to notice when some tools crash and/or “go beserk” with RAM/CPU/Bandwidth consumption, this is different from the existing built-in checks in OWTF like “do not launch a new tool if there is less than XYZ RAM free” and more like “if tool X is using &amp;gt; XYZ of the available RAM/CPU/Bandwidth” and this is (potentially) negatively affecting other tools/tests, then throttle it.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability -i.e. the Health Monitor cannot crash! :)-&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Installation Improvements and Package manager ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
This project is to implement what was suggested in the following github issue:&lt;br /&gt;
[https://github.com/owtf/owtf/issues/192 https://github.com/owtf/owtf/issues/192]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Recently i tried to make a fresh installation of OWTF. The installation process takes too much time. Is there any way to make the installation faster?&lt;br /&gt;
Having a private server with:&lt;br /&gt;
* pre-installed files for VMs&lt;br /&gt;
* pre-configured and patched tools&lt;br /&gt;
* Merged Lists&lt;br /&gt;
* Pre-configured certificates&lt;br /&gt;
Additionally a minimal installation which will install the core of OWTF with the option of update can increase the installation speed. The update procedure will start fetching the latest file versions from the server and copy them to the right path.&lt;br /&gt;
Additional ideas are welcome.&lt;br /&gt;
&lt;br /&gt;
-- They could be hosted on Dropbox or a private VPS :)&lt;br /&gt;
&lt;br /&gt;
2 Installation Modes&lt;br /&gt;
* For high speed connections (Downloading the files uncompressed)&lt;br /&gt;
* For low speed connections (Downloading the files compressed)&lt;br /&gt;
and the installation crashed because i runned out of space in the vm&lt;br /&gt;
IMPORTANT NOTE: OWTF should check the available disk space BEFORE installation starts + warn the user if problems are likely&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* Excellent reliability (i.e. proper exception handling, etc.)&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Testing Framework Improvements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
As OWASP OWTF grows it makes sense to build custom unit tests to automatically re-test that functionality has not been broken. In this project we would like to improve the existing unit testing framework so that creating OWASP OWTF unit tests is as simple as possible and all missing tests for new functionality are created. The goal of this project is to update the existing Unit Test Framework to create all missing tests as well as improve the existing ones to verify OWASP OWTF functionality in an automated fashion.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Top features'''&lt;br /&gt;
&lt;br /&gt;
In this improvement phase, the Testing Framework should:&lt;br /&gt;
* (Top Prio) Focus more on functional tests&lt;br /&gt;
For example: Improve coverage of OWASP Testing Guide, PTES, etc. (lots of room for improvement there!)&lt;br /&gt;
* (Top Prio) Put together a great wiki documentation section for contributors&lt;br /&gt;
The goal here is to help contributors write tests for the functionality that they implement. This should be as easy as possible.&lt;br /&gt;
* (Top Prio) Fix the current Travis issues :)&lt;br /&gt;
* (Nice to have) Bring the unit tests up to speed with the codebase&lt;br /&gt;
This will be challenging but very worth trying after top priorities.&lt;br /&gt;
The wiki should be heavily updated so that contributors create their own unit tests easily moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''General background'''&lt;br /&gt;
&lt;br /&gt;
The Unit Test Framework should be able to:&lt;br /&gt;
* Define test categories: For example, &amp;quot;all plugins&amp;quot;, &amp;quot;web plugins&amp;quot;, &amp;quot;aux plugins&amp;quot;, &amp;quot;test framework core&amp;quot;, etc. (please see [http://www.slideshare.net/abrahamaranguren/introducing-owasp-owtf-workshop-brucon-2012 this presentation] for more background)&lt;br /&gt;
* Allow to regression test isolated plugins (i.e. &amp;quot;only test _this_ plugin&amp;quot;)&lt;br /&gt;
* Allow to regression test by test categories (i.e. &amp;quot;test only web plugins&amp;quot;)&lt;br /&gt;
* Allow to regression test everything (i.e. plugins + framework core: &amp;quot;test all&amp;quot;)&lt;br /&gt;
* Produce meaningful statistics and easy to navigate logs to identify which tests failed and ideally also hints on how to potentially fix the problem where possible&lt;br /&gt;
* Allow for easy creation of _new_ unit tests specific to OWASP OWTF&lt;br /&gt;
* Allow for easy modification and maintenance of _existing_ unit tests specific to OWASP OWTF&lt;br /&gt;
* Perform well so that we can run as many tests as possible in a given period of time&lt;br /&gt;
* Potentially leverage the python unittest library: [http://docs.python.org/2/library/unittest.html http://docs.python.org/2/library/unittest.html]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* Performant and automated regression testing&lt;br /&gt;
* Unit tests for a wide coverage of OWASP OWTF, ideally leveraging the Unit Test Framework where possible&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with unit tests and automated regression testing would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Tool utilities module ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The spirit of this feature is something that may or may not be used from OWTF: These are utilities that may be chained together by OWTF OR a penetration tester using the command line. The idea is to automate mundane tasks that take time but may provide a lever to a penetration tester short on time.&lt;br /&gt;
&lt;br /&gt;
'''Feature 1) Vulnerable software version database:'''&lt;br /&gt;
&lt;br /&gt;
Implement a searchable vulnerable software version database so that a penetration tester enters a version and gets vulnerabilities sorted by criticality with MAX Impact vulnerabilities at the top (possibly: CVSS score in DESC order).&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
[http://www.cvedetails.com/vulnerability-list.php?vendor_id=74&amp;amp;product_id=128&amp;amp;version_id=149817&amp;amp;page=1&amp;amp;hasexp=0&amp;amp;opdos=0&amp;amp;opec=0&amp;amp;opov=0&amp;amp;opcsrf=0&amp;amp;opgpriv=0&amp;amp;opsqli=0&amp;amp;opxss=0&amp;amp;opdirt=0&amp;amp;opmemc=0&amp;amp;ophttprs=0&amp;amp;opbyp=0&amp;amp;opfileinc=0&amp;amp;opginf=0&amp;amp;cvssscoremin=0&amp;amp;cvssscoremax=0&amp;amp;year=0&amp;amp;month=0&amp;amp;cweid=0&amp;amp;order=3&amp;amp;trc=17&amp;amp;sha=0d26af6f3ba8ea20af18d089df40c252ea09b711 Vulnerabilities against specific software version]&lt;br /&gt;
&lt;br /&gt;
'''Feature 2) Nmap output file merger:'''&lt;br /&gt;
&lt;br /&gt;
Unify nmap files *without* losing data: XML, text and greppable formats&lt;br /&gt;
For example: Sometimes 2 scans pass through the same port, one returns the server version, the other does not, we obviously do not want to lose banner information :).&lt;br /&gt;
&lt;br /&gt;
'''Feature 3) Nmap output file vulnerability mapper'''&lt;br /&gt;
&lt;br /&gt;
From an nmap output file, get the unique software version banners, and provide a list of (maybe in tabs?):&lt;br /&gt;
&lt;br /&gt;
1) CVEs in reverse order of CVSS score, with links.&lt;br /&gt;
&lt;br /&gt;
2) Metasploit modules available for each CVE / issue&lt;br /&gt;
&lt;br /&gt;
NOTE: Can supply an *old* shell script for reference&lt;br /&gt;
&lt;br /&gt;
3) Servers/ports affected (i.e. all server / port combinations using that software version)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Feature 4) URL target list creator:'''&lt;br /&gt;
&lt;br /&gt;
Turn all “speaks http” ports (from any nmap format) into a list of URL targets for OWTF&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Feature 5) Hydra command creator:'''&lt;br /&gt;
&lt;br /&gt;
nmap file in =&amp;gt; Hydra command list out&lt;br /&gt;
&lt;br /&gt;
grep http auth / login pages in output files to identify login interfaces =&amp;gt; Hydra command list out&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Feature 6) WP-scan command creator:'''&lt;br /&gt;
&lt;br /&gt;
look at all URLs (i.e. nmap file), check if they might be running word press, generate a list of suggested wp-scan commands for all targets that might be running word press&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* Excellent reliability (i.e. proper exception handling, etc.)&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with unit tests and automated regression testing would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
''' OWASP Mentors '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
ZAP is one of the top OWASP projects and the most active open source web security tools. &lt;br /&gt;
&lt;br /&gt;
You can follow (and join in) the GSoC discussions on the ZAP Developer Group: https://groups.google.com/d/msg/zaproxy-develop/Uy0JPkzsI_s/Bj7OTSkISCIJ&lt;br /&gt;
&lt;br /&gt;
=== Bug tracker support ===&lt;br /&gt;
&lt;br /&gt;
This would allow ZAP users to raise issues in bug trackers directly within ZAP. Ideally it would be implemented as an extension with a generic framework and then adaptors for specific trackers, like github and bugzilla.&lt;br /&gt;
&lt;br /&gt;
The info included in the issues raised should be as configurable as possible so that users can include whatever they want, and set things like custom fields.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* Raise issues in github and bugzilla from alerts within the ZAP UI&lt;br /&gt;
* Support for raising alerts using the ZAP API&lt;br /&gt;
* High level of customization so that users can tune to their requirements&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
''' Mentors '''&lt;br /&gt;
Simon Bennetts and other members of the ZAP core team&lt;br /&gt;
&lt;br /&gt;
=== Field enumeration ===&lt;br /&gt;
&lt;br /&gt;
This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
&lt;br /&gt;
The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
''' Mentors '''&lt;br /&gt;
Simon Bennetts and other members of the ZAP core team&lt;br /&gt;
&lt;br /&gt;
=== Form Handling ===&lt;br /&gt;
&lt;br /&gt;
The ZAP traditional and Ajax spiders explore an application by putting basic default values in all forms. These may often not be valid values, for example using &amp;quot;ZAP&amp;quot; when an email address is required.&lt;br /&gt;
&lt;br /&gt;
The enhancement would allow the user to define default values based on pattern matching against the field names and/or ids.&lt;br /&gt;
&lt;br /&gt;
It would also be very useful if it could show the user all forms and their associated fields for an application, and then allow the user to update the default values.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* User able to specify default values for all forms used by the ZAP spiders&lt;br /&gt;
* Display all of the forms and fields for an application and allow the user to update the default values to be used&lt;br /&gt;
* Full support for defining default values via the API&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
''' Mentors '''&lt;br /&gt;
Simon Bennetts and other members of the ZAP core team&lt;br /&gt;
&lt;br /&gt;
=== Automated authentication detection and configuration ===&lt;br /&gt;
&lt;br /&gt;
ZAP has extensive support for supporting application authentication, but configuring this is a manual process which can be tricky to get right.&lt;br /&gt;
&lt;br /&gt;
The enhancement would allow ZAP to detect as many forms of authentication as possible and automatically configure them using the existing ZAP functionality.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* Automatically detect a wide range of authentication mechanisms&lt;br /&gt;
* Automatically configure ZAP to handle them&lt;br /&gt;
* Full support via the API&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
''' Mentors '''&lt;br /&gt;
Simon Bennetts and other members of the ZAP core team&lt;br /&gt;
&lt;br /&gt;
=== Advanced padding oracle testing and exploitation ===&lt;br /&gt;
&lt;br /&gt;
ZAP has support for finding padding oracle vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The enhancement would extend the support to more input vectors and add the ability to exploit vulnerabilities discovered which could lead to whole lot of other interesting discoveries.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* Detect oracle padding vulnerabilities in more situations&lt;br /&gt;
* Exploit the vulnerabilities and report additional findings&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
''' Mentors '''&lt;br /&gt;
Kevin Wall and other members of the ZAP core team&lt;br /&gt;
&lt;br /&gt;
=== Zest text representation and parser ===&lt;br /&gt;
&lt;br /&gt;
Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
&lt;br /&gt;
A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* A documented definition of a text representation for Zest&lt;br /&gt;
* A parser that converts the text representation into a working Zest script&lt;br /&gt;
* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
''' Mentors '''&lt;br /&gt;
Simon Bennetts and other members of the ZAP core team&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
We're always open to students coming up with their own suggestions for ZAP projects, so if you have something you think would make ZAP better then please get in touch!&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* That depends on your project, but clearly defined goals will be necessary&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
''' Mentors '''&lt;br /&gt;
Simon Bennetts and other members of the ZAP core team&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSensor ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSensor Project]] provides real-time application layer intrusion detection. &lt;br /&gt;
&lt;br /&gt;
 * Check the AppSensor wiki page linked above&lt;br /&gt;
 * Contact us through the mailing list.&lt;br /&gt;
 * Check our [https://github.com/jtmelton/appsensor github repository] and the [https://github.com/jtmelton/appsensor/issues open tickets]&lt;br /&gt;
 * Also see our [http://www.appsensor.org appsensor website]&lt;br /&gt;
&lt;br /&gt;
=== Dashboard UI Expansion ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
AppSensor provides a solid base of functionality to applications, and we currently have a minimal application for data display. This project will involve expanding the default/standard UI for the AppSensor project. As part of the project, you will learn about the domain model, iterating your mockup designs and share those with the project leader(s) and the community for feedback. The existing stack is based on spring boot and reactjs. There are lots of features to be added, and you'll work with the project leader(s) and the community to build the most-needed and requested capabilities.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The existing dashboard application will be expanded and will involve features like: &lt;br /&gt;
* Search (could involve significant back-end work to configure indexing, etc.)&lt;br /&gt;
* Policy Management (edit server configuration in real-time)&lt;br /&gt;
* Data visualization / dashboarding&lt;br /&gt;
&lt;br /&gt;
Source code, tests, and associated documentation for both the back-end and UI will be delivered for this effort.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable with UI design and development, particularly building dashboards. Comfortable with Java (with some assistance). Basic familiarity with security concepts related to intrusion detection and prevention as this is the domain.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' John Melton - OWASP AppSensor Project Leader (Development)&lt;br /&gt;
&lt;br /&gt;
=== Trend Monitoring Analysis Engine ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
AppSensor currently supports a basic policy-driven analysis engine to determine if a series of events represents an attack (if a user triggers 5 of this type of event in 10 minutes, it's an attack). While this supports many use cases, there are times when it would be helpful to know trending information. If a particular function of the application begins to see 10 times its normal amount of traffic, that might represent an attack. This project would add an additional analysis engine to support &amp;quot;trend monitoring&amp;quot;. Development of this feature would require some initial research on alternative implementation strategies, followed by the development and testing of the feature in AppSensor. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The project should produce: &lt;br /&gt;
* A trend monitoring analysis engine to be used either in place of or in addition to the existing policy-driven analysis engine&lt;br /&gt;
* Associated configuration mechanism to specify the trending rules/policy&lt;br /&gt;
* A small full sample demo application showing usage of the trend monitoring feature&lt;br /&gt;
&lt;br /&gt;
Source code and associated tests for the feature will be created, along with the associated end user documentation for how to setup and configure it. &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in Java and unit testing.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' John Melton - OWASP AppSensor Project Leader (Development)&lt;br /&gt;
&lt;br /&gt;
=== Expand language support for clients ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
AppSensor supports various modes for communication with the server. The language and framework of the client application are required only to support the given mode. This flexibility is desirable, but having pre-built clients in various languages is useful for our user-base. This project would involve working with various popular languages and frameworks to build support for communicating with the appsensor server backend.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The project should produce: &lt;br /&gt;
* Clients in multiple popular languages for interaction with appsensor server&lt;br /&gt;
* Evaluate the possibility for generating clients from specification as opposed to writing and maintaining the code (ie. swagger for REST)&lt;br /&gt;
* At a minimum, coverage for the HTTP/REST mode should be supported. Other modes (thrift, soap, kafka, etc.) will be produced as time allows. &lt;br /&gt;
* Several small demo applications showing usage of the given APIs&lt;br /&gt;
&lt;br /&gt;
Source code and tests for the feature will be created, along with the associated end user documentation for how to setup and configure it. &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable working in multiple popular languages and unit testing.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' John Melton - OWASP AppSensor Project Leader (Development)&lt;br /&gt;
&lt;br /&gt;
=== Implement Detection Points in Reverse Proxy ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
AppSensor works by tracking events that are created by &amp;quot;detection points&amp;quot;, essentially locations in the processing pipeline where suspicious or malicious intent is observed. This often requires business-specific detection within the application. However, the project has defined a number of detection points (https://www.owasp.org/index.php/AppSensor_DetectionPoints) and responses (https://www.owasp.org/index.php/AppSensor_ResponseActions), some of which can be generically applied across a broader set of applications, including those that are common to an entire organization or even cross-organization. For that reason, a sub-project has been created (https://github.com/jtmelton/appsensor-reverse-proxy) that provides support for detection points and responses that are generic enough to be broadly applicable. This project would expand support for these detection points and responses.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The project should produce: &lt;br /&gt;
* New detection points and responses&lt;br /&gt;
* Documentation for how to deploy the project and any end-user considerations&lt;br /&gt;
* Load testing each function as this project front-ends applications, and traffic throughput characteristics are important to our user-base.&lt;br /&gt;
* A small sample demo application showing the utility of the proxy. A recording of the usage for community viewing would be beneficial.&lt;br /&gt;
&lt;br /&gt;
Source code and associated tests for the feature will be created, along with the associated end user documentation for how to setup and configure it. &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in golang and unit testing.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' John Melton - OWASP AppSensor Project Leader (Development)&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid [[OWASP_SeraphimDroid_Project| ]] ==&lt;br /&gt;
&lt;br /&gt;
=== Behavioral malware and intrusion analysis  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is an Android mobile app which already has a capability to statically analyze malware using machine learning (weka toolkit) relying on permissions. However, this is usually not enough and we intend to improve this with behavioral analysis. There are a number of paper in scientific literature describing how to detect malware and intrusions by dynamically analyzing its behavior (system calls, battery consumption, etc.). The idea of this project is to find the best approach that can be implemented on the device and implement it.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Reviewing scientific literature and find feasible approach we can take&lt;br /&gt;
*  Implement and possibly improve the approach in Seraphimdroid&lt;br /&gt;
*  Test the model and provide controls to switch algorithm on or off and possibly fine tune it&lt;br /&gt;
*  Documenting approach as a technical report&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
* Basic knowledge and interest in machine learning&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Framework for plugin development  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is well rounded security and privacy app, however, it lacks some components community can provide. We would like to provide community the way to develop plugins that can add features to OWASP Seraphimdroid app. However, the way of integrating external components into Android app may be challenge. The way of presenting GUI and integration between processes need to be examined and developed. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Examining the way of integrating third party apps through some provided API to OWASP Seraphimdroid&lt;br /&gt;
*  Providing GUI integration with third party components&lt;br /&gt;
*  Develop at least one test plugin&lt;br /&gt;
*  Document the development process and API&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Educational component  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is well rounded security and privacy app. The initial idea of the project was to provide educational platform for common users, where by using the application, users can learn about risks for their privacy and security. Some components already has some sort of explanation, which is educational. However, it lacks of uneatable knowledge source and some of the components that monitor user's behavior do not provide sufficient information. Idea of this project is to develop monitoring of user activity and an component that can warn user about risks if he does something risky. Also, mobile security knowledge base that can be updated remotely will be a huge new asset to the application.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Develop uneatable knowledge base and GUI for it&lt;br /&gt;
*  Develop web server where the knowledge base can be updated&lt;br /&gt;
*  Improve current educational reporting&lt;br /&gt;
*  Develop methodology for monitoring users and notifying them about risky activities&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZSC Tool ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_ZSC_Tool_Project|OWASP ZSC]] is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Please take a look of our TODO list in Github to get some ideas:&lt;br /&gt;
https://github.com/Ali-Razmjoo/OWASP-ZSC/issues&lt;br /&gt;
&lt;br /&gt;
Another ideas:&lt;br /&gt;
* Help us develop shellcode module for windows&lt;br /&gt;
* Develop shellcode module for OSX&lt;br /&gt;
&lt;br /&gt;
Read about the project here:&lt;br /&gt;
https://ali-razmjoo.gitbooks.io/owasp-zsc/content/&lt;br /&gt;
&lt;br /&gt;
Recommended reading:&lt;br /&gt;
http://www.vividmachines.com/shellcode/shellcode.html&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python&lt;br /&gt;
* Basic knowledge about Shellcode and assembly language&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
*Christo and Timo Goosen and Brian Beaudry- OWASP ZSC Contributors&lt;br /&gt;
&lt;br /&gt;
Contact us through our mailing list for questions:&lt;br /&gt;
https://groups.google.com/d/forum/owasp-zsc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP-SKF (Security Knowledge Framework) ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX under python.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
    Security Requirements OWASP ASVS for development and for third party vendor applications&lt;br /&gt;
    Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
    Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
    Security post-development functionality in SKF for verification with the OWASP ASVS&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
    More code examples for different languages&lt;br /&gt;
    Better quality of the knowledge base items&lt;br /&gt;
    More items in the pre-development phase&lt;br /&gt;
    Editable checklists in the post-development phase&lt;br /&gt;
&lt;br /&gt;
We really would love to improve the quality of the knowledge base items further, also we would love to have more code examples in the different languages like: Perl, Hack, Go, Node.js and more.&lt;br /&gt;
&lt;br /&gt;
Please take a look of our TODO list in Github to get some ideas:&lt;br /&gt;
https://github.com/blabla1337/skf-flask/issues&lt;br /&gt;
&lt;br /&gt;
Another ideas:&lt;br /&gt;
* Help us with stuff you think is missing in the SKF project&lt;br /&gt;
&lt;br /&gt;
Read about the project here:&lt;br /&gt;
https://skf.readme.io&lt;br /&gt;
&lt;br /&gt;
Recommended reading (here you find a link to the Online Demo):&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Knowledge_Framework&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python, PHP, Hack, .NET, GO, Ruby, Perl, Java, Node.js&lt;br /&gt;
* Basic knowledge about programming in one of the above languages&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
*Glenn and Riccardo ten Cate- OWASP-SKF project leaders&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Github_Documentation&amp;diff=208970</id>
		<title>Category:OWASP Github Documentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Github_Documentation&amp;diff=208970"/>
				<updated>2016-02-15T21:46:24Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* Volunteers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Proposal to transport OWASP wiki content Documentation to a centralize system==&lt;br /&gt;
&lt;br /&gt;
===Problem Definition===&lt;br /&gt;
The issues that can arise from our current method of developing our various docs include:&lt;br /&gt;
*Draft content that exists in the wiki.  This may be in varying states (correct, incorrect, lousy, confused, etc.) and is visible to the internet and typically not clearly labelled as draft.  Google ‘owasp purple monkey dishwasher’ for an example of a draft wiki page visible to the internet.  This content also needs to get cleaned up after a project release.&lt;br /&gt;
*Substandard descriptions/content can get into our docs.  Getting people to review every line/example/diagram/appendix is difficult with a volunteer organization (as other threads have discussed)&lt;br /&gt;
*Duplications happen, as 10 different projects create/copy/paste their definitions of topics such as XSS, SQLi, CSRF, etc.  This wastes effort in an organization already constrained of active volunteers.&lt;br /&gt;
*Content gets out-of-date.  The work to create a new version of a doc project takes years.&lt;br /&gt;
&lt;br /&gt;
==Proposal Details==&lt;br /&gt;
* We dump all of the content from our wiki, current docs, descriptions in code tools, etc.  We put it into markup (as some projects are already doing) and add it to source code repositories.&lt;br /&gt;
* We share doc markup files across ALL docs and code projects.  For example, imagine we have a folder for SQLi.  This directory contains the OWASP ‘golden source’ for SQLi definition, examples, code, tests, etc.  * Repeat for all other AppSec issues (CSRF, cert pinning, etc.).  We use a mechanism to ‘compile’ these markdown files into PDFs and integrate into code project HTML pages.&lt;br /&gt;
* Similar to good coding projects, we control who can edit the files under certain directories – people we know have expertise in an area.  Edits get peer reviewed before submission.  Other people can suggest edits and prove their experience to the existing team to join it.&lt;br /&gt;
*We allow anyone to ‘include’ this markup file into their project.  So if the Code Review Guide wants to add a section on SQLi, and needs a definition, I don’t write it (or copy from wiki), I simply include the relevant markup file.  Same for testing guide, dev guide, ZAP hints page, security shepherd info page, cheetsheet, and on and on.&lt;br /&gt;
*We allow all of our docs, plus the wiki, plus all code projects, to dynamically use an markup file update.  We make this ‘real time’.  This needs an example.  Say in March a massive change occurs in the world of SQLi.  Right now any project that talks about SQLi would need to manually go in and update, and those updates will be of varying quality and content.  If, instead, one (true) source file was update, all those other projects could spot the change and automatically rebuild themselves, meaning the next person to download a development guide PDF, or view the wiki, would get the updated SQLi information.&lt;br /&gt;
&lt;br /&gt;
This is a big change.  This may be a controversial change.  However it would greatly reduce our workload (only one markup document needs to get updated).  It will also greatly reduce review tasks, as everyone is sharing core content which is reviewed once.  It also improves our image to the world, as all projects have the same great descriptions and content.&lt;br /&gt;
  This change also improves our responsiveness.  Imagine a heartbleed type issue being reflected in all OWASP code and documentation projects, as well as the wiki/cheetsheets, within a few days?  (simply the time for the team to agree updates to the text/examples/descriptions, review, and submit)&lt;br /&gt;
 We should also make these markup files available to anyone on the internet (read only).  This way the source descriptions become an OWASP resource it itself, and anyone out there needing to spread the word on AppSec has easy access to rock solid, up-to-date definitions.&lt;br /&gt;
This changes the model, from people like myself who run ‘projects’, to smaller expert teams who know ‘technologies’ (such as SQLi or IIS secure configuration).  It focuses people where they want to be on docs projects, but easily shares that knowledge across all OWASP (and more) projects.  It also means there’d never be another need to clean-up the wiki – it would always be based off the markup content.&lt;br /&gt;
&lt;br /&gt;
Big downside: there’s a large piece of work to start it off.  All content would need to get organized, put into sensible structure, converted to markdown, argued over, ‘experts’ defined and assigned, etc.  I doubt this would be a volunteer effort, and may need contractor involvement.  Could this be combined with the OWASP wiki redesign?&lt;br /&gt;
&lt;br /&gt;
==Draft Plan==&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
Gary Robinson&lt;br /&gt;
&lt;br /&gt;
Enrico Branca&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&lt;br /&gt;
&lt;br /&gt;
==Participating Document Projects==&lt;br /&gt;
&lt;br /&gt;
Code Review Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Knowledge_Framework OWASP Security Knowledge Framework]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Github_Documentation&amp;diff=208968</id>
		<title>Category:OWASP Github Documentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Github_Documentation&amp;diff=208968"/>
				<updated>2016-02-15T21:45:53Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* Participating Document Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Proposal to transport OWASP wiki content Documentation to a centralize system==&lt;br /&gt;
&lt;br /&gt;
===Problem Definition===&lt;br /&gt;
The issues that can arise from our current method of developing our various docs include:&lt;br /&gt;
*Draft content that exists in the wiki.  This may be in varying states (correct, incorrect, lousy, confused, etc.) and is visible to the internet and typically not clearly labelled as draft.  Google ‘owasp purple monkey dishwasher’ for an example of a draft wiki page visible to the internet.  This content also needs to get cleaned up after a project release.&lt;br /&gt;
*Substandard descriptions/content can get into our docs.  Getting people to review every line/example/diagram/appendix is difficult with a volunteer organization (as other threads have discussed)&lt;br /&gt;
*Duplications happen, as 10 different projects create/copy/paste their definitions of topics such as XSS, SQLi, CSRF, etc.  This wastes effort in an organization already constrained of active volunteers.&lt;br /&gt;
*Content gets out-of-date.  The work to create a new version of a doc project takes years.&lt;br /&gt;
&lt;br /&gt;
==Proposal Details==&lt;br /&gt;
* We dump all of the content from our wiki, current docs, descriptions in code tools, etc.  We put it into markup (as some projects are already doing) and add it to source code repositories.&lt;br /&gt;
* We share doc markup files across ALL docs and code projects.  For example, imagine we have a folder for SQLi.  This directory contains the OWASP ‘golden source’ for SQLi definition, examples, code, tests, etc.  * Repeat for all other AppSec issues (CSRF, cert pinning, etc.).  We use a mechanism to ‘compile’ these markdown files into PDFs and integrate into code project HTML pages.&lt;br /&gt;
* Similar to good coding projects, we control who can edit the files under certain directories – people we know have expertise in an area.  Edits get peer reviewed before submission.  Other people can suggest edits and prove their experience to the existing team to join it.&lt;br /&gt;
*We allow anyone to ‘include’ this markup file into their project.  So if the Code Review Guide wants to add a section on SQLi, and needs a definition, I don’t write it (or copy from wiki), I simply include the relevant markup file.  Same for testing guide, dev guide, ZAP hints page, security shepherd info page, cheetsheet, and on and on.&lt;br /&gt;
*We allow all of our docs, plus the wiki, plus all code projects, to dynamically use an markup file update.  We make this ‘real time’.  This needs an example.  Say in March a massive change occurs in the world of SQLi.  Right now any project that talks about SQLi would need to manually go in and update, and those updates will be of varying quality and content.  If, instead, one (true) source file was update, all those other projects could spot the change and automatically rebuild themselves, meaning the next person to download a development guide PDF, or view the wiki, would get the updated SQLi information.&lt;br /&gt;
&lt;br /&gt;
This is a big change.  This may be a controversial change.  However it would greatly reduce our workload (only one markup document needs to get updated).  It will also greatly reduce review tasks, as everyone is sharing core content which is reviewed once.  It also improves our image to the world, as all projects have the same great descriptions and content.&lt;br /&gt;
  This change also improves our responsiveness.  Imagine a heartbleed type issue being reflected in all OWASP code and documentation projects, as well as the wiki/cheetsheets, within a few days?  (simply the time for the team to agree updates to the text/examples/descriptions, review, and submit)&lt;br /&gt;
 We should also make these markup files available to anyone on the internet (read only).  This way the source descriptions become an OWASP resource it itself, and anyone out there needing to spread the word on AppSec has easy access to rock solid, up-to-date definitions.&lt;br /&gt;
This changes the model, from people like myself who run ‘projects’, to smaller expert teams who know ‘technologies’ (such as SQLi or IIS secure configuration).  It focuses people where they want to be on docs projects, but easily shares that knowledge across all OWASP (and more) projects.  It also means there’d never be another need to clean-up the wiki – it would always be based off the markup content.&lt;br /&gt;
&lt;br /&gt;
Big downside: there’s a large piece of work to start it off.  All content would need to get organized, put into sensible structure, converted to markdown, argued over, ‘experts’ defined and assigned, etc.  I doubt this would be a volunteer effort, and may need contractor involvement.  Could this be combined with the OWASP wiki redesign?&lt;br /&gt;
&lt;br /&gt;
==Draft Plan==&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
Gary Robinson&lt;br /&gt;
Enrico Branca&lt;br /&gt;
&lt;br /&gt;
==Participating Document Projects==&lt;br /&gt;
&lt;br /&gt;
Code Review Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Knowledge_Framework OWASP Security Knowledge Framework]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=206005</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=206005"/>
				<updated>2016-01-06T20:28:16Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* Roadmap */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Security post-development functionality in SKF for verification with the OWASP ASVS&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide with Chef:&amp;lt;/b&amp;gt;&lt;br /&gt;
* https://skf.readme.io/docs/installation#section-automated-installation-with-chef&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide for AWS:&amp;lt;/b&amp;gt;&lt;br /&gt;
* https://skf.readme.io/docs/installation#section-aws-installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://www.secureby.design&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add generic Selenium test cases for the pre-development and post-development security controls.&lt;br /&gt;
  - Add current code examples and refer them in the advices of the pre-development and post-development items.&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Explain the SDLC more in-depth on our website and OWASP wiki page.&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
Bithin Alangot&amp;lt;br /&amp;gt;&lt;br /&gt;
Martin Knobloch&amp;lt;br /&amp;gt;&lt;br /&gt;
Adam Fisher&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=206004</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=206004"/>
				<updated>2016-01-06T20:25:25Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Security post-development functionality in SKF for verification with the OWASP ASVS&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide with Chef:&amp;lt;/b&amp;gt;&lt;br /&gt;
* https://skf.readme.io/docs/installation#section-automated-installation-with-chef&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide for AWS:&amp;lt;/b&amp;gt;&lt;br /&gt;
* https://skf.readme.io/docs/installation#section-aws-installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://www.secureby.design&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
Bithin Alangot&amp;lt;br /&amp;gt;&lt;br /&gt;
Martin Knobloch&amp;lt;br /&amp;gt;&lt;br /&gt;
Adam Fisher&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=206003</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=206003"/>
				<updated>2016-01-06T20:24:01Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Security post-development functionality in SKF for verification with the OWASP ASVS&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide with Chef:&amp;lt;/b&amp;gt;&lt;br /&gt;
* https://skf.readme.io/docs/installation#section-automated-installation-with-chef&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide for AWS:&amp;lt;/b&amp;gt;&lt;br /&gt;
* https://skf.readme.io/docs/installation#section-aws-installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://www.secureby.design&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
Bithin Alangot&amp;lt;br /&amp;gt;&lt;br /&gt;
Martin Knobloch&lt;br /&gt;
Adam Fisher&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=205938</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=205938"/>
				<updated>2016-01-06T10:18:21Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Security post-development functionality in SKF for verification with the OWASP ASVS&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide with Chef:&amp;lt;/b&amp;gt;&lt;br /&gt;
* https://skf.readme.io/docs/installation#section-automated-installation-with-chef&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://www.secureby.design&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
Bithin Alangot&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=202229</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=202229"/>
				<updated>2015-10-17T22:50:00Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
- Security Requirements OWASP ASVS for development and for third party vendor applications &amp;lt;br&amp;gt;&lt;br /&gt;
- Security knowledge reference (Code examples/ Knowledge Base items)&amp;lt;br&amp;gt;&lt;br /&gt;
- Security is part of design with the pre-development functionality in SKF&amp;lt;br&amp;gt;&lt;br /&gt;
- Security post-development functionality in SKF for verification with the OWASP ASVS &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
Bithin Alangot&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=197211</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=197211"/>
				<updated>2015-07-09T12:01:57Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Local News  =&lt;br /&gt;
=='''News'''==&lt;br /&gt;
:: &amp;lt;b&amp;gt;Call for participation!&amp;lt;/b&amp;gt; For those who want to getting involved in the OWASP Netherlands Chapter, we meet:&lt;br /&gt;
::;[[Netherlands_June_25th_2015 | OWASP NL Chapter participation meeting, June 25th]] - [https://www.eventbrite.nl/e/tickets-owasp-netherlands-chapter-chapter-participation-meeting-juni-25th-2015-17423391834 Click here for Registration]&lt;br /&gt;
&lt;br /&gt;
=='''Provisional 2014 Chapter Event Calendar'''==&lt;br /&gt;
:: &amp;lt;strike&amp;gt;[[Netherlands March 19th, 2015 | March 19th 2015 - HvA]]&amp;lt;/strike&amp;gt;&lt;br /&gt;
:: &amp;lt;strike&amp;gt;[[Netherlands_April_30th,_2015 | April 30th - UWV Amsterdam]]&amp;lt;/strike&amp;gt;&lt;br /&gt;
:: &amp;lt;strike&amp;gt;[http://appsec.eu OWASP Appsec-Eu/Research 2015] &amp;lt;/strike&amp;gt;&lt;br /&gt;
:: [[Netherlands_June_25th_2015 | OWASP NL Chapter participation meeting, June 25th]]&lt;br /&gt;
:: [[Netherlands_September_17th_2015 | September 17th Radboud University Nijmegen]]&lt;br /&gt;
::;Slide Decks from past Chapter meetings can be downloaded from the [https://www.owasp.org/index.php/Netherlands#tab=Past_Events Past Events page].&lt;br /&gt;
&lt;br /&gt;
=='''Other OWASP Events'''==&lt;br /&gt;
::;'''[https://www.owasp.org/index.php/OWASP_Events/upcoming_events OWASP Upcoming Events]'''&lt;br /&gt;
&lt;br /&gt;
=='''Call for Presentations'''==&lt;br /&gt;
::;[https://docs.google.com/a/owasp.org/spreadsheet/viewform?formkey=dGs1UFN0Ul9YR1pRcGdYRmtYallraUE6MQ#gid=0 OWASP NL Chapter Call For Presentation]&lt;br /&gt;
&lt;br /&gt;
=='''Stay in contact:'''==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://lists.owasp.org/mailman/listinfo/owasp-netherlands]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://www.twitter.com/owasp_NL]]&lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://www.linkedin.com/groups/OWASP-Netherlands-Chapter-1987229/about]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Sponsors'''==&lt;br /&gt;
Interested in Sponsoring the Netherlands OWASP Chapter, email netherlands '@' owasp.org &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
::;Our structural Chapter and OWASP Benelux Days 2013 supporters: &lt;br /&gt;
[http://www.cigital.com https://www.owasp.org/images/7/73/AppSecDC2012-Cigital.jpg]&lt;br /&gt;
[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]&lt;br /&gt;
[[File:Deloitte.jpg||170px|link=http://www.deloitte.com/view/en_NL/nl]]&lt;br /&gt;
[http://www8.hp.com/us/en/software-solutions/software-security/index.html https://www.owasp.org/images/a/af/HP_Blue_RGB_150_LG-200.png]&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
[http://www.northwave.nl https://www.owasp.org/images/4/4c/LogoNorthwave.jpg]&lt;br /&gt;
[http://www.securify.nl https://www.owasp.org/images/7/7a/Securify_BV_logo.png]&lt;br /&gt;
[[File:Logo secwatch.jpg||170px|link=http://www.secwatch.nl]]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=  Calendar  =&lt;br /&gt;
== Provisional Chapter Event Calendar 2015 ==&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align:center;&amp;quot;|&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Link&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Flyer&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| March 19th 2015&lt;br /&gt;
| [[Netherlands March 19th, 2015 | Agenda]]&lt;br /&gt;
| [[Media:OWASP Netherlands Chapter Meeting 2015-03-19.pdf | Flyer]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| April 30th, 2015&lt;br /&gt;
| [[Netherlands April 30th, 2015 | Agenda]]&lt;br /&gt;
| [[Media:OWASP_Netherlands_Chapter_Meeting_2015-04-30.pdf| Flyer]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| May 19th to 22nd, 2015&lt;br /&gt;
| [http://appsec.eu OWASP AppSec-EU/Research 2015 ]&lt;br /&gt;
| N/A&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| June 25th, 2015&lt;br /&gt;
| [[Netherlands_June_25th_2015 | Agenda]]&lt;br /&gt;
| N/A&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| September 17th, 2015&lt;br /&gt;
| [[Netherlands_September_17th_2015 | Agenda]]&lt;br /&gt;
| [[Media:OWASP_Netherlands_Chapter_Meeting_2015-09-17.pdf| Flyer TBD]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2015|2015]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2014|2014]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2013|2013]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2012|2012]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2011|2011]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2010|2010]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2009|2009]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2005|2005]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
The Netherlands Chapter is supported by the following board: &lt;br /&gt;
*[https://www.owasp.org/index.php/User:Ferdinand_Vroom Ferdinand Vroom]&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Knoblochmartin Martin Knobloch], PervaSec&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
*[mailto:netherlands@owasp.org OWASP Netherlands], OWASP Netherlands board email adres&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth and last tab --&amp;gt;&lt;br /&gt;
= Chapter Support  =&lt;br /&gt;
=== Chapter Sponsoring  ===&lt;br /&gt;
OWASP Netherlands is looking for organizations to sponsor our chapter. &lt;br /&gt;
If you are interested in sponsoring the Netherlands chapter please contact us via email: [mailto:netherlands@owasp.org netherlands 'at' owasp.org]. &lt;br /&gt;
&lt;br /&gt;
=== Donation ===&lt;br /&gt;
If you would like to donate to our chapter, please use the PayPal link at the top of this page.&lt;br /&gt;
;Thank you!&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers  ===&lt;br /&gt;
We are continuously looking for speakers.&amp;lt;br&amp;gt;'''Presentations:''' Are you working on an interesting subject, would you like to share your experience with the OWASP community and do you have presentation skills. Please let us know! Any topic related to web application security will be appreciated!&amp;lt;br&amp;gt;'''VAC, Vulnerability, Attack, Countermeasure:''' The VAC is a re occuring part of the chapter meetings. The VAC is a half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-weight: bold;&amp;quot;&amp;gt;Links: &amp;lt;/span&amp;gt; &lt;br /&gt;
[http://www.owasp.org/index.php/Speaker_Agreement Speaker Agreement] &lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt Template] &lt;br /&gt;
Interested in presenting at a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
=== Call for Location  ===&lt;br /&gt;
For the OWASP Netherlands chapter meetings to come, we are continuously looking for locations! &lt;br /&gt;
Most preferable, the location is good accessible with public transport and by car. Free parking should be provided. &lt;br /&gt;
What do we expect: &lt;br /&gt;
*meeting room for at least 50 people &lt;br /&gt;
*lunch for attendees &lt;br /&gt;
**drinks, sandwiches... &lt;br /&gt;
*a small present for the speakers &lt;br /&gt;
**(e.g. bottle of wine, for speakers from aboard alcohol might be less practical if flying in only with hand luggage)&lt;br /&gt;
Interested in sponsoring a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=197210</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=197210"/>
				<updated>2015-07-09T12:00:08Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Local News  =&lt;br /&gt;
=='''News'''==&lt;br /&gt;
:: &amp;lt;b&amp;gt;Call for participation!&amp;lt;/b&amp;gt; For those who want to getting involved in the OWASP Netherlands Chapter, we meet:&lt;br /&gt;
::;[[Netherlands_June_25th_2015 | OWASP NL Chapter participation meeting, June 25th]] - [https://www.eventbrite.nl/e/tickets-owasp-netherlands-chapter-chapter-participation-meeting-juni-25th-2015-17423391834 Click here for Registration]&lt;br /&gt;
&lt;br /&gt;
=='''Provisional 2014 Chapter Event Calendar'''==&lt;br /&gt;
:: &amp;lt;strike&amp;gt;[[Netherlands March 19th, 2015 | March 19th 2015 - HvA]]&amp;lt;/strike&amp;gt;&lt;br /&gt;
:: &amp;lt;strike&amp;gt;[[Netherlands_April_30th,_2015 | April 30th - UWV Amsterdam]]&amp;lt;/strike&amp;gt;&lt;br /&gt;
:: &amp;lt;strike&amp;gt;[http://appsec.eu OWASP Appsec-Eu/Research 2015] &amp;lt;/strike&amp;gt;&lt;br /&gt;
:: [[Netherlands_June_25th_2015 | OWASP NL Chapter participation meeting, June 25th]]&lt;br /&gt;
:: [[Netherlands_September_17th_2015 | September 17th Radboud University Nijmegen]]&lt;br /&gt;
::;Slide Decks from past Chapter meetings can be downloaded from the [https://www.owasp.org/index.php/Netherlands#tab=Past_Events Past Events page].&lt;br /&gt;
&lt;br /&gt;
=='''Other OWASP Events'''==&lt;br /&gt;
::;'''[https://www.owasp.org/index.php/OWASP_Events/upcoming_events OWASP Upcoming Events]'''&lt;br /&gt;
&lt;br /&gt;
=='''Call for Presentations'''==&lt;br /&gt;
::;[https://docs.google.com/a/owasp.org/spreadsheet/viewform?formkey=dGs1UFN0Ul9YR1pRcGdYRmtYallraUE6MQ#gid=0 OWASP NL Chapter Call For Presentation]&lt;br /&gt;
&lt;br /&gt;
=='''Stay in contact:'''==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://lists.owasp.org/mailman/listinfo/owasp-netherlands]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://www.twitter.com/owasp_NL]]&lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://www.linkedin.com/groups/OWASP-Netherlands-Chapter-1987229/about]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Sponsors'''==&lt;br /&gt;
Interested in Sponsoring the Netherlands OWASP Chapter, email netherlands '@' owasp.org &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
::;Our structural Chapter and OWASP Benelux Days 2013 supporters: &lt;br /&gt;
[http://www.cigital.com https://www.owasp.org/images/7/73/AppSecDC2012-Cigital.jpg]&lt;br /&gt;
[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]&lt;br /&gt;
[[File:Deloitte.jpg||170px|link=http://www.deloitte.com/view/en_NL/nl]]&lt;br /&gt;
[http://www8.hp.com/us/en/software-solutions/software-security/index.html https://www.owasp.org/images/a/af/HP_Blue_RGB_150_LG-200.png]&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
[http://www.northwave.nl https://www.owasp.org/images/4/4c/LogoNorthwave.jpg]&lt;br /&gt;
[http://www.securify.nl https://www.owasp.org/images/7/7a/Securify_BV_logo.png]&lt;br /&gt;
[[File:Logo secwatch.jpg||170px|link=http://www.secwatch.nl]]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=  Calendar  =&lt;br /&gt;
== Provisional Chapter Event Calendar 2015 ==&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align:center;&amp;quot;|&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Link&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Flyer&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| March 19th 2015&lt;br /&gt;
| [[Netherlands March 19th, 2015 | Agenda]]&lt;br /&gt;
| [[Media:OWASP Netherlands Chapter Meeting 2015-03-19.pdf | Flyer]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| April 30th, 2015&lt;br /&gt;
| [[Netherlands April 30th, 2015 | Agenda]]&lt;br /&gt;
| [[Media:OWASP_Netherlands_Chapter_Meeting_2015-04-30.pdf| Flyer]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| May 19th to 22nd, 2015&lt;br /&gt;
| [http://appsec.eu OWASP AppSec-EU/Research 2015 ]&lt;br /&gt;
| N/A&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| June 25th, 2015&lt;br /&gt;
| [[Netherlands_June_25th_2015 | Agenda]]&lt;br /&gt;
| N/A&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| September 17th, 2015&lt;br /&gt;
| [[Netherlands_September_17th_2015 | Agenda]]&lt;br /&gt;
| [[Media:OWASP_Netherlands_Chapter_Meeting_2015-09-17.pdf| Flyer TBD]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| October 22th, 2015&lt;br /&gt;
| [[Netherlands_October_22th_2015 | Agenda]]&lt;br /&gt;
  N/A&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2015|2015]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2014|2014]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2013|2013]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2012|2012]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2011|2011]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2010|2010]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2009|2009]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2005|2005]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
The Netherlands Chapter is supported by the following board: &lt;br /&gt;
*[https://www.owasp.org/index.php/User:Ferdinand_Vroom Ferdinand Vroom]&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Knoblochmartin Martin Knobloch], PervaSec&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
*[mailto:netherlands@owasp.org OWASP Netherlands], OWASP Netherlands board email adres&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth and last tab --&amp;gt;&lt;br /&gt;
= Chapter Support  =&lt;br /&gt;
=== Chapter Sponsoring  ===&lt;br /&gt;
OWASP Netherlands is looking for organizations to sponsor our chapter. &lt;br /&gt;
If you are interested in sponsoring the Netherlands chapter please contact us via email: [mailto:netherlands@owasp.org netherlands 'at' owasp.org]. &lt;br /&gt;
&lt;br /&gt;
=== Donation ===&lt;br /&gt;
If you would like to donate to our chapter, please use the PayPal link at the top of this page.&lt;br /&gt;
;Thank you!&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers  ===&lt;br /&gt;
We are continuously looking for speakers.&amp;lt;br&amp;gt;'''Presentations:''' Are you working on an interesting subject, would you like to share your experience with the OWASP community and do you have presentation skills. Please let us know! Any topic related to web application security will be appreciated!&amp;lt;br&amp;gt;'''VAC, Vulnerability, Attack, Countermeasure:''' The VAC is a re occuring part of the chapter meetings. The VAC is a half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-weight: bold;&amp;quot;&amp;gt;Links: &amp;lt;/span&amp;gt; &lt;br /&gt;
[http://www.owasp.org/index.php/Speaker_Agreement Speaker Agreement] &lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt Template] &lt;br /&gt;
Interested in presenting at a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
=== Call for Location  ===&lt;br /&gt;
For the OWASP Netherlands chapter meetings to come, we are continuously looking for locations! &lt;br /&gt;
Most preferable, the location is good accessible with public transport and by car. Free parking should be provided. &lt;br /&gt;
What do we expect: &lt;br /&gt;
*meeting room for at least 50 people &lt;br /&gt;
*lunch for attendees &lt;br /&gt;
**drinks, sandwiches... &lt;br /&gt;
*a small present for the speakers &lt;br /&gt;
**(e.g. bottle of wine, for speakers from aboard alcohol might be less practical if flying in only with hand luggage)&lt;br /&gt;
Interested in sponsoring a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=197209</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=197209"/>
				<updated>2015-07-09T11:59:36Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Local News  =&lt;br /&gt;
=='''News'''==&lt;br /&gt;
:: &amp;lt;b&amp;gt;Call for participation!&amp;lt;/b&amp;gt; For those who want to getting involved in the OWASP Netherlands Chapter, we meet:&lt;br /&gt;
::;[[Netherlands_June_25th_2015 | OWASP NL Chapter participation meeting, June 25th]] - [https://www.eventbrite.nl/e/tickets-owasp-netherlands-chapter-chapter-participation-meeting-juni-25th-2015-17423391834 Click here for Registration]&lt;br /&gt;
&lt;br /&gt;
=='''Provisional 2014 Chapter Event Calendar'''==&lt;br /&gt;
:: &amp;lt;strike&amp;gt;[[Netherlands March 19th, 2015 | March 19th 2015 - HvA]]&amp;lt;/strike&amp;gt;&lt;br /&gt;
:: &amp;lt;strike&amp;gt;[[Netherlands_April_30th,_2015 | April 30th - UWV Amsterdam]]&amp;lt;/strike&amp;gt;&lt;br /&gt;
:: &amp;lt;strike&amp;gt;[http://appsec.eu OWASP Appsec-Eu/Research 2015] &amp;lt;/strike&amp;gt;&lt;br /&gt;
:: [[Netherlands_June_25th_2015 | OWASP NL Chapter participation meeting, June 25th]]&lt;br /&gt;
:: [[Netherlands_September_17th_2015 | September 17th Radboud University Nijmegen]]&lt;br /&gt;
::;Slide Decks from past Chapter meetings can be downloaded from the [https://www.owasp.org/index.php/Netherlands#tab=Past_Events Past Events page].&lt;br /&gt;
&lt;br /&gt;
=='''Other OWASP Events'''==&lt;br /&gt;
::;'''[https://www.owasp.org/index.php/OWASP_Events/upcoming_events OWASP Upcoming Events]'''&lt;br /&gt;
&lt;br /&gt;
=='''Call for Presentations'''==&lt;br /&gt;
::;[https://docs.google.com/a/owasp.org/spreadsheet/viewform?formkey=dGs1UFN0Ul9YR1pRcGdYRmtYallraUE6MQ#gid=0 OWASP NL Chapter Call For Presentation]&lt;br /&gt;
&lt;br /&gt;
=='''Stay in contact:'''==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://lists.owasp.org/mailman/listinfo/owasp-netherlands]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://www.twitter.com/owasp_NL]]&lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://www.linkedin.com/groups/OWASP-Netherlands-Chapter-1987229/about]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Sponsors'''==&lt;br /&gt;
Interested in Sponsoring the Netherlands OWASP Chapter, email netherlands '@' owasp.org &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
::;Our structural Chapter and OWASP Benelux Days 2013 supporters: &lt;br /&gt;
[http://www.cigital.com https://www.owasp.org/images/7/73/AppSecDC2012-Cigital.jpg]&lt;br /&gt;
[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]&lt;br /&gt;
[[File:Deloitte.jpg||170px|link=http://www.deloitte.com/view/en_NL/nl]]&lt;br /&gt;
[http://www8.hp.com/us/en/software-solutions/software-security/index.html https://www.owasp.org/images/a/af/HP_Blue_RGB_150_LG-200.png]&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
[http://www.northwave.nl https://www.owasp.org/images/4/4c/LogoNorthwave.jpg]&lt;br /&gt;
[http://www.securify.nl https://www.owasp.org/images/7/7a/Securify_BV_logo.png]&lt;br /&gt;
[[File:Logo secwatch.jpg||170px|link=http://www.secwatch.nl]]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=  Calendar  =&lt;br /&gt;
== Provisional Chapter Event Calendar 2015 ==&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align:center;&amp;quot;|&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Link&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Flyer&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| March 19th 2015&lt;br /&gt;
| [[Netherlands March 19th, 2015 | Agenda]]&lt;br /&gt;
| [[Media:OWASP Netherlands Chapter Meeting 2015-03-19.pdf | Flyer]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| April 30th, 2015&lt;br /&gt;
| [[Netherlands April 30th, 2015 | Agenda]]&lt;br /&gt;
| [[Media:OWASP_Netherlands_Chapter_Meeting_2015-04-30.pdf| Flyer]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| May 19th to 22nd, 2015&lt;br /&gt;
| [http://appsec.eu OWASP AppSec-EU/Research 2015 ]&lt;br /&gt;
| N/A&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| June 25th, 2015&lt;br /&gt;
| [[Netherlands_June_25th_2015 | Agenda]]&lt;br /&gt;
| N/A&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| September 17th, 2015&lt;br /&gt;
| [[Netherlands_September_17th_2015 | Agenda]]&lt;br /&gt;
| [[Media:OWASP_Netherlands_Chapter_Meeting_2015-09-17.pdf| Flyer TBD]]&lt;br /&gt;
|}&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| October 22th, 2015&lt;br /&gt;
| [[Netherlands_October_22th_2015 | Agenda]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2015|2015]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2014|2014]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2013|2013]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2012|2012]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2011|2011]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2010|2010]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2009|2009]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2005|2005]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
The Netherlands Chapter is supported by the following board: &lt;br /&gt;
*[https://www.owasp.org/index.php/User:Ferdinand_Vroom Ferdinand Vroom]&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Knoblochmartin Martin Knobloch], PervaSec&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
*[mailto:netherlands@owasp.org OWASP Netherlands], OWASP Netherlands board email adres&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth and last tab --&amp;gt;&lt;br /&gt;
= Chapter Support  =&lt;br /&gt;
=== Chapter Sponsoring  ===&lt;br /&gt;
OWASP Netherlands is looking for organizations to sponsor our chapter. &lt;br /&gt;
If you are interested in sponsoring the Netherlands chapter please contact us via email: [mailto:netherlands@owasp.org netherlands 'at' owasp.org]. &lt;br /&gt;
&lt;br /&gt;
=== Donation ===&lt;br /&gt;
If you would like to donate to our chapter, please use the PayPal link at the top of this page.&lt;br /&gt;
;Thank you!&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers  ===&lt;br /&gt;
We are continuously looking for speakers.&amp;lt;br&amp;gt;'''Presentations:''' Are you working on an interesting subject, would you like to share your experience with the OWASP community and do you have presentation skills. Please let us know! Any topic related to web application security will be appreciated!&amp;lt;br&amp;gt;'''VAC, Vulnerability, Attack, Countermeasure:''' The VAC is a re occuring part of the chapter meetings. The VAC is a half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-weight: bold;&amp;quot;&amp;gt;Links: &amp;lt;/span&amp;gt; &lt;br /&gt;
[http://www.owasp.org/index.php/Speaker_Agreement Speaker Agreement] &lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt Template] &lt;br /&gt;
Interested in presenting at a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
=== Call for Location  ===&lt;br /&gt;
For the OWASP Netherlands chapter meetings to come, we are continuously looking for locations! &lt;br /&gt;
Most preferable, the location is good accessible with public transport and by car. Free parking should be provided. &lt;br /&gt;
What do we expect: &lt;br /&gt;
*meeting room for at least 50 people &lt;br /&gt;
*lunch for attendees &lt;br /&gt;
**drinks, sandwiches... &lt;br /&gt;
*a small present for the speakers &lt;br /&gt;
**(e.g. bottle of wine, for speakers from aboard alcohol might be less practical if flying in only with hand luggage)&lt;br /&gt;
Interested in sponsoring a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=196866</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=196866"/>
				<updated>2015-07-01T21:53:50Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
- Security Requirements OWASP ASVS for development and for third party vendor applications &amp;lt;br&amp;gt;&lt;br /&gt;
- Security knowledge reference (Code examples/ Knowledge Base items)&amp;lt;br&amp;gt;&lt;br /&gt;
- Security is part of design with the pre-development functionality in SKF&amp;lt;br&amp;gt;&lt;br /&gt;
- Security post-development functionality in SKF for verification with the OWASP ASVS &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
Bithin Alangot&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=196615</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=196615"/>
				<updated>2015-06-26T20:32:04Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* Documentation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
- Security Requirements OWASP ASVS for development and for third party vendor applications &amp;lt;br&amp;gt;&lt;br /&gt;
- Security knowledge reference (Code examples/ Knowledge Base items)&amp;lt;br&amp;gt;&lt;br /&gt;
- Security is part of design with the pre-development functionality in SKF&amp;lt;br&amp;gt;&lt;br /&gt;
- Security post-development functionality in SKF for verification with the OWASP ASVS &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=196614</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=196614"/>
				<updated>2015-06-26T20:30:14Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* Documentation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
- Security Requirements OWASP ASVS for development and for third party vendor applications &amp;lt;br&amp;gt;&lt;br /&gt;
- Security knowledge reference (Code examples/ Knowledge Base items)&amp;lt;br&amp;gt;&lt;br /&gt;
- Security is part of design with the pre-development functionality in SKF&amp;lt;br&amp;gt;&lt;br /&gt;
- Security post-development functionality in SKF for verification with the OWASP ASVS &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of DevOpsDays Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Skf-design-workshop.pptx.pdf&amp;diff=196613</id>
		<title>File:Skf-design-workshop.pptx.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Skf-design-workshop.pptx.pdf&amp;diff=196613"/>
				<updated>2015-06-26T20:30:01Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: DevOpsDays Amsterdam 2015 Workshop OWASP-SKF&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;DevOpsDays Amsterdam 2015 Workshop OWASP-SKF&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=196612</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=196612"/>
				<updated>2015-06-26T20:18:06Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* Documentation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
- Security Requirements OWASP ASVS for development and for third party vendor applications &amp;lt;br&amp;gt;&lt;br /&gt;
- Security knowledge reference (Code examples/ Knowledge Base items)&amp;lt;br&amp;gt;&lt;br /&gt;
- Security is part of design with the pre-development functionality in SKF&amp;lt;br&amp;gt;&lt;br /&gt;
- Security post-development functionality in SKF for verification with the OWASP ASVS &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of DevOpsDays Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/2/24/Skfpptx-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=196611</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=196611"/>
				<updated>2015-06-26T20:17:05Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* Documentation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
- Security Requirements OWASP ASVS for development and for third party vendor applications &amp;lt;br&amp;gt;&lt;br /&gt;
- Security knowledge reference (Code examples/ Knowledge Base items)&amp;lt;br&amp;gt;&lt;br /&gt;
- Security is part of design with the pre-development functionality in SKF&amp;lt;br&amp;gt;&lt;br /&gt;
- Security post-development functionality in SKF for verification with the OWASP ASVS &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of DevOpsDays Amsterdam:&lt;br /&gt;
https://www.owasp.org/images/2/24/Skfpptx-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Skfpptx-design-workshop.pptx.pdf&amp;diff=196610</id>
		<title>File:Skfpptx-design-workshop.pptx.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Skfpptx-design-workshop.pptx.pdf&amp;diff=196610"/>
				<updated>2015-06-26T20:11:19Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: Workshop slides given @ DevOpsDays Amsterdam 2015&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Workshop slides given @ DevOpsDays Amsterdam 2015&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=196526</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=196526"/>
				<updated>2015-06-23T19:17:50Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
- Security Requirements OWASP ASVS for development and for third party vendor applications &amp;lt;br&amp;gt;&lt;br /&gt;
- Security knowledge reference (Code examples/ Knowledge Base items)&amp;lt;br&amp;gt;&lt;br /&gt;
- Security is part of design with the pre-development functionality in SKF&amp;lt;br&amp;gt;&lt;br /&gt;
- Security post-development functionality in SKF for verification with the OWASP ASVS &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=196071</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=196071"/>
				<updated>2015-06-12T17:31:02Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework Project==&lt;br /&gt;
The OWASP Security Knowledge Framework Project is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
- Security Requirements OWASP ASVS for development and for third party vendor applications &amp;lt;br&amp;gt;&lt;br /&gt;
- Security knowledge reference (Code examples/ Knowledge Base items)&amp;lt;br&amp;gt;&lt;br /&gt;
- Security is part of design with the pre-development functionality in SKF&amp;lt;br&amp;gt;&lt;br /&gt;
- Security post-development functionality in SKF for verification with the OWASP ASVS &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=195856</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=195856"/>
				<updated>2015-06-07T17:34:56Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* SKF SDLC */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework Project==&lt;br /&gt;
The OWASP Security Knowledge Framework Project is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
- Security Requirements OWASP ASVS for development and for third party vendor applications &amp;lt;br&amp;gt;&lt;br /&gt;
- Security knowledge reference (Code examples/ Knowledge Base items)&amp;lt;br&amp;gt;&lt;br /&gt;
- Security is part of design with the pre-development functionality in SKF&amp;lt;br&amp;gt;&lt;br /&gt;
- Security post-development functionality in SKF for verification with the OWASP ASVS &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=195855</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=195855"/>
				<updated>2015-06-07T16:24:17Z</updated>
		
		<summary type="html">&lt;p&gt;Foobar: /* SKF SDLC */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework Project==&lt;br /&gt;
The OWASP Security Knowledge Framework Project is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
- Security Requirements OWASP ASVS for development and for third party vendor applications &amp;lt;br&amp;gt;&lt;br /&gt;
- Security knowledge reference (Code examples/ Knowledge Base items)&amp;lt;br&amp;gt;&lt;br /&gt;
- Security is part of design with the pre-development functionality in SKF&amp;lt;br&amp;gt;&lt;br /&gt;
- Security post-development functionality in SKF for verification with the OWASP ASVS &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Foobar</name></author>	</entry>

	</feed>