<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rba</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rba"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Rba"/>
		<updated>2026-04-25T19:29:45Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Rba&amp;diff=59736</id>
		<title>User talk:Rba</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Rba&amp;diff=59736"/>
				<updated>2009-04-30T17:51:12Z</updated>
		
		<summary type="html">&lt;p&gt;Rba: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Starting Out ==&lt;br /&gt;
&lt;br /&gt;
I have created my page and made my first contribution - an update to the [[Source Code Flaws Top 10 Project]]!&lt;/div&gt;</summary>
		<author><name>Rba</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Rba&amp;diff=59735</id>
		<title>User:Rba</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Rba&amp;diff=59735"/>
				<updated>2009-04-30T17:50:48Z</updated>
		
		<summary type="html">&lt;p&gt;Rba: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm Brad Andrews,  a creative thinker who is interested in far too many things.  My background is in computer science and software development, but I came over to the information security area several years ago.  My software development background and focus on information security makes me very interested in the work of OWASP and a good fit for the work here.&lt;br /&gt;
&lt;br /&gt;
I currently work at a large company on a team focused on security and compliance.&lt;br /&gt;
&lt;br /&gt;
I blog my security thoughts at [http://bradonsecurity.blogspot.com Brad on Security]&lt;/div&gt;</summary>
		<author><name>Rba</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Rba&amp;diff=59734</id>
		<title>User talk:Rba</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Rba&amp;diff=59734"/>
				<updated>2009-04-30T17:50:26Z</updated>
		
		<summary type="html">&lt;p&gt;Rba: Getting in the Pool&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Starting Out ==&lt;br /&gt;
&lt;br /&gt;
I have created my page and made my first contribution (an update to the [[Source Code Flaws Top 10 Project]]!&lt;/div&gt;</summary>
		<author><name>Rba</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Rba&amp;diff=59733</id>
		<title>User:Rba</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Rba&amp;diff=59733"/>
				<updated>2009-04-30T17:49:01Z</updated>
		
		<summary type="html">&lt;p&gt;Rba: Details About Brad Andrews&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm Brad Andrews,  a creative thinker who is interested in far too many things.  My background is in computer science and software development, but I came over to the information security area several years ago.  My software development background and focus on information security makes me very interested in the work of OWASP and a good fit for the work here.&lt;br /&gt;
&lt;br /&gt;
I currently work at a large company on a team focused on security and compliance.&lt;br /&gt;
&lt;br /&gt;
I blog my security thoughts at [[http://bradonsecurity.blogspot.com Brad on Security]]&lt;/div&gt;</summary>
		<author><name>Rba</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Rba&amp;diff=59732</id>
		<title>User talk:Rba</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Rba&amp;diff=59732"/>
				<updated>2009-04-30T17:48:08Z</updated>
		
		<summary type="html">&lt;p&gt;Rba: Details About Brad Andrews&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm Brad Andrews,  a creative thinker who is interested in far too many things.  My background is in computer science and software development, but I came over to the information security area several years ago.  My software development background and focus on information security makes me very interested in the work of OWASP and a good fit for the work here.&lt;br /&gt;
&lt;br /&gt;
I currently work at a large company on a team focused on security and compliance.&lt;br /&gt;
&lt;br /&gt;
I blog my security thoughts at [[http://bradonsecurity.blogspot.com Brad on Security]]&lt;/div&gt;</summary>
		<author><name>Rba</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:OWASP_Source_Code_Flaws_Top_10_Project_Index&amp;diff=59722</id>
		<title>Talk:OWASP Source Code Flaws Top 10 Project Index</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:OWASP_Source_Code_Flaws_Top_10_Project_Index&amp;diff=59722"/>
				<updated>2009-04-30T17:11:36Z</updated>
		
		<summary type="html">&lt;p&gt;Rba: New page: == Rewrote the Language ==  I rewrote some of the language in the descriptions.  This makes it sound better to me at least and it should get the point across better.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Rewrote the Language ==&lt;br /&gt;
&lt;br /&gt;
I rewrote some of the language in the descriptions.  This makes it sound better to me at least and it should get the point across better.&lt;/div&gt;</summary>
		<author><name>Rba</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Source_Code_Flaws_Top_10_Project&amp;diff=59721</id>
		<title>Project Information:template Source Code Flaws Top 10 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Source_Code_Flaws_Top_10_Project&amp;diff=59721"/>
				<updated>2009-04-30T17:04:09Z</updated>
		
		<summary type="html">&lt;p&gt;Rba: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Source Code Flaws Top 10 Project'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| &lt;br /&gt;
This project is about giving a taxonomy to describe the categories of the most dangerous security flaws you can find during a code review. For dynamic code review (web based application ethical hacking) the original Owasp Top 10 is the must have over each desk, in order to manage all the findings during the reporting phase. With the Source code flaws Top 10, you will have the same document but focused to source code.&lt;br /&gt;
&lt;br /&gt;
I started from venerable Gary McGraw work about the &amp;quot;seven kingdoms&amp;quot; trying to extend it to match the Top 10 schema and to include some ideas that came out to me during code reviews or static analysis.&lt;br /&gt;
&lt;br /&gt;
This project delivery will be a document very similar as outline to Owasp Top 10 most critical vulnerabilities in web applications. This taxonomy will be used in official Owasp Guide for static analysis, the Code review guide leaded by Eoin Keary and it will be used as cookbook list for Owasp Orizon static analysis engine default library. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Key Project Information'''&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Licensed under&amp;lt;br&amp;gt;[http://creativecommons.org/licenses/by-sa/3.0/:Creative Commons Attribution ShareAlike 3.0 license]&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[[User:Thesp0nge|'''Paolo Perego''']]&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;[[User:Rba|'''Brad Andrews''']]&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Mailing List&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/owasp-source-code-flaws-top-10 '''Subscribe here''']&amp;lt;br&amp;gt;[mailto:owasp-source-code-flaws-top-10(at)lists.owasp.org '''Use here''']&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[[User:name|'''Name''']]&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[[User:name|'''Name''']]&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[[User:name|'''Name''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
[[:OWASP Source Code Flaws Top 10 Project Index|'''Source Code Flaws Top 10 Index''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''RELATED PROJECTS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [[:Category:OWASP Orizon Project|OWASP Orizon Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
* [[:Category:OWASP Code Review_Project|OWASP Code Review Project]]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|No sponsors yet, drop [mailto:thesp0nge@owasp.org|'''me'''] a line if you want to be the first  &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[:Category:OWASP Source Code Flaws Top 10 Project Roadmap|'''Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''First Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Not yet''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Alpha Status''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Flaws Top 10 Project - First Review - Self Evaluation - A|See&amp;amp;Edit: First Review/SelfEvaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Not yet''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Alpha Status''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Flaws Top 10 Project - First Review - First Reviewer - B|See&amp;amp;Edit: First Review/1st Reviewer (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Alpha Status''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Flaws Top 10 Project - First Review - Second Reviewer - C|See&amp;amp;Edit: First Review/2nd Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Alpha Status''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Flaws Top 10 Project - First Review - OWASP Board Member - D|See/Edit: First Review/Board Member (D)]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Rba</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Source_Code_Flaws_Top_10_Project_Index&amp;diff=59720</id>
		<title>OWASP Source Code Flaws Top 10 Project Index</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Source_Code_Flaws_Top_10_Project_Index&amp;diff=59720"/>
				<updated>2009-04-30T16:45:46Z</updated>
		
		<summary type="html">&lt;p&gt;Rba: /* The OWASP Source Code Flaws Top 10 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= The OWASP Source Code Flaws Top 10 =&lt;br /&gt;
&lt;br /&gt;
{| border='1' cellpadding='2' &lt;br /&gt;
|-	&lt;br /&gt;
|[[Source_Code_Flaws_Top_10_2009-C1|C1 - Design Weakness]]&lt;br /&gt;
|A design weakness occurs when the logic used to create the application did not addressed a threat modeling activity so it may be easy for an attacker to subvert your application behavior. Design also covers an objects scope and visibility, so extra care must be taken to limit what your program expose to others.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Source_Code_Flaws_Top_10_2009-C2|C2 - Architectural Weakness]]&lt;br /&gt;
|Your application depends on many auxiliary system when it runs. It does not stand on its own. An architectural weakness occurs when your code interacts in a unsafe way with auxiliary systems.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Source_Code_Flaws_Top_10_2009-C3|C3 - Missing input validation]]&lt;br /&gt;
|Any input to a program must be processed through filtering and validation functions to ensure that is what is expected and to reduce the risk of malicious data.  Using incoming data that is not sanitized can lead to very dangerous runtime vulnerabilities such as cross Site scripting, injection flaws, and others.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Source_Code_Flaws_Top_10_2009-C4|C4 - Insecure communications]]&lt;br /&gt;
|Web applications use the TCP/IP stack to communicate to the world. An insecure communication vulnerability in the source code concerns how the operating system provided abstraction layer (sockets, ...) and communication layer provided by the framework (java sockets, ...) are used. This covers more than just checking about SSL usage, it is concerned with how the communication code is written.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Source_Code_Flaws_Top_10_2009-C5|C5 - Information leakage and improper error handling]]&lt;br /&gt;
|This is the same as the one listed in the original Top 10, just from a source code point of view. Missing exception handling or a too verbose logging string, for example, would be included in this flaw category.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Source_Code_Flaws_Top_10_2009-C6|C6 - Direct object reference]]&lt;br /&gt;
| This is the same as the one listed in the original Top 10, just from a source code point of view.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Source_Code_Flaws_Top_10_2009-C7|C7 - Misuse of local resources]]&lt;br /&gt;
|Operating system resources like memory, disk space and CPU time can often seem unlimited, but they are not.  A program should effectively manage these resources.  Poorly designed local resource utilization, can cause an application to have poor response time. It can also make it vulnerable to a denial of service by an attacker that causes the program to consume one or more type of these resources.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Source_Code_Flaws_Top_10_2009-C8|C8 - Usage of potentially dangerous APIs]]&lt;br /&gt;
|Frameworks and libraries evolve to solve security issues. Often they leave backward compatibility routines to give developers time to change their code. Developers frequently forget to transition their code to the new interface, leaving calls to the potentially dangerous APIs even if they have been deprecated.  All such potentially dangerous routine calls fit this category.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Source_Code_Flaws_Top_10_2009-C9|C9 - Documentation weakness]]&lt;br /&gt;
|Source code must be well documented to make it maintainable. Poor comments can make code hard to understand in the future, even after a short time.  It is easy to introduce security flaws or other bugs if the logic is not clear or even misunderstood.  Comments in the code must document anything needed to fully understand how the code works.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Source_Code_Flaws_Top_10_2009-C10|C10 - Best practices violation]]&lt;br /&gt;
|This category includes all generic best practices in source code development that are violated by the code. Anything missing from the previous categories would be covered by this category.&lt;br /&gt;
|}&lt;br /&gt;
'''&amp;lt;center&amp;gt;Table 1: Top 10 Source code flaws for 2009&amp;lt;/center&amp;gt;'''&lt;/div&gt;</summary>
		<author><name>Rba</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Source_Code_Flaws_Top_10_Project_Index&amp;diff=59719</id>
		<title>OWASP Source Code Flaws Top 10 Project Index</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Source_Code_Flaws_Top_10_Project_Index&amp;diff=59719"/>
				<updated>2009-04-30T16:45:12Z</updated>
		
		<summary type="html">&lt;p&gt;Rba: /* The OWASP Source Code Flaws Top 10 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= The OWASP Source Code Flaws Top 10 =&lt;br /&gt;
&lt;br /&gt;
{| border='1' cellpadding='2' &lt;br /&gt;
|-	&lt;br /&gt;
|[[Source_Code_Flaws_Top_10_2009-C1|C1 - Design Weakness]]&lt;br /&gt;
|A design weakness occurs when the logic used to create the application did not addressed a threat modeling activity so it may be easy for an attacker to subvert your application behavior. Design also covers an objects scope and visibility, so extra care must be taken to limit what your program expose to others.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Source_Code_Flaws_Top_10_2009-C2|C2 - Architectural Weakness]]&lt;br /&gt;
|Your application depends on many auxiliary system when it runs. It does not stand on its own. An architectural weakness occurs when your code interacts in a unsafe way with auxiliary systems.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Source_Code_Flaws_Top_10_2009-C3|C3 - Missing input validation]]&lt;br /&gt;
|Any input to a program must be processed through filtering and validation functions to ensure that is what is expected and to reduce the risk of malicious data.  Using incoming data that is not sanitized can lead to very dangerous runtime vulnerabilities such as cross Site scripting, injection flaws, and others.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Source_Code_Flaws_Top_10_2009-C4|C4 - Insecure communications]]&lt;br /&gt;
|Web applications use the TCP/IP stack to communicate to the world. An insecure communication vulnerability in the source code concerns how the operating system provided abstraction layer (sockets, ...) and communication layer provided by the framework (java sockets, ...) are used. This covers more than just checking about SSL usage, it is concerned with how the communication code is written.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Source_Code_Flaws_Top_10_2009-C5|C5 - Information leakage and improper error handling]]&lt;br /&gt;
|This is the same as the one listed in the original Top 10, just from a source code point of view. Missing exception handling or a too verbose logging string, for example, would be included in this flaw category.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Source_Code_Flaws_Top_10_2009-C6|C6 - Direct object reference]]&lt;br /&gt;
| This is the same as the one listed in the original Top 10, just from a source code point of view.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Source_Code_Flaws_Top_10_2009-C7|C7 - Misuse of local resources]]&lt;br /&gt;
|Operating system resources like memory, disk space and CPU time can often seem unlimited, but they are not.  A program should effectively manage these resources.  Poorly designed local resource utilization, can cause an application to have poor response time. It can also make it vulnerable to a denial of service by an attacker that causes the program to consume one or more type of these resources.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Source_Code_Flaws_Top_10_2009-C8|C8 - Usage of potentially dangerous APIs]]&lt;br /&gt;
|Frameworks and libraries evolve to solve security issues. Often they leave backward compatibility routines to give developers time to change their code. Developers frequently forget to transition their code to the new interface, leaving calls to the potentially dangerous APIs even if they have been deprecated.  All such potentially dangerous routine calls fit this category.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Source_Code_Flaws_Top_10_2009-C9|C9 - Documentation weakness]]&lt;br /&gt;
|Source code must be well documented to make it maintainable. Poor comments can make code hard to understand in the future, even after a short time.  It is easy to introduce security flaws or other bugs if the logic is not clear or even misunderstood.  Comments in the code must document anything needed to fully understand how the code works.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Source_Code_Flaws_Top_10_2009-C10|C10 - Best practices violation]]&lt;br /&gt;
|This category includes all generic best practices in source code development that are violated by the code. Anything missing from the previous categories would fall in this category.&lt;br /&gt;
|}&lt;br /&gt;
'''&amp;lt;center&amp;gt;Table 1: Top 10 Source code flaws for 2009&amp;lt;/center&amp;gt;'''&lt;/div&gt;</summary>
		<author><name>Rba</name></author>	</entry>

	</feed>