This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Category:OWASP Orizon Project"
(→Goals: enhancing English grammar) |
|||
(46 intermediate revisions by 9 users not shown) | |||
Line 1: | Line 1: | ||
− | + | =Main= | |
− | [[: | + | {| |
− | + | |- | |
+ | ! width="700" align="center" | <br> | ||
+ | ! width="500" align="center" | <br> | ||
+ | |- | ||
+ | | align="right" | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] | ||
+ | | align="right" | | ||
− | + | |} | |
− | + | ==OWASP Orizon Project== | |
− | + | OWASP Orizon is a source code security scanner designed to spot vulnerabilities in J2EE web applications, Android code and generally speaking in Java written source code. | |
− | + | ==Description== | |
− | + | Owasp Orizon is a source code static analyzer tool designed to spot security issues in Java applications. | |
− | Orizon | + | Owasp Orizon mission is to provide people an opensource tool, helping them in reviewing: |
− | + | * single Java classes | |
+ | * Java standalone tools packed in JAR files | ||
+ | * web applications packed in EAR / WAR files | ||
+ | * Android APK applications | ||
− | + | It was a dark and stormy night in Milan, Italy. It was 2006 and I felt the need of something helping me in reviewing other people java source code. So Owasp Orizon born and grew up as security tool trying to parse Java source code, building an Abstract Syntax Tree and spot for unsafe calls in the code. | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | In the very beginning Owasp Orizon was a sort of enhanced grep tool. In 2008, I started supporting PHP programming language but the initial boost disappeared. After being in love with other programming languages and technolgies, eight years later, in 2017 I kickstarted the project again from scratch. | |
− | == | + | ==Licensing== |
+ | OWASP Orizon is an opensource tool. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2 License]. | ||
− | + | == Quick Start == | |
− | + | See project [https://github.com/thesp0nge/owasp-orizon GitHub home page] | |
− | |||
− | + | == Project Resources == | |
− | + | [https://owasporizon.wordpress.com Blog] | |
− | |||
− | |||
− | + | [https://github.com/thesp0nge/owasp-orizon Code] | [https://github.com/thesp0nge/owasp-orizon/releases Binaries] | |
− | + | [https://github.com/thesp0nge/owasp-orizon/issues Issue Tracker] | |
− | === | + | == Project Leader == |
− | |||
− | + | Paolo Perego<br/> | |
+ | [mailto:thesp0nge@owasp.org email] [https://twitter.com/thesp0nge/ twitter] [https://codiceinsicuro.it blog ] | ||
− | + | == News and Events == | |
+ | * [Spring 2017] - [http://owaspsummit.org/Working-Sessions/Project-Summit/Owasp-Orizon-Reboot.html Owasp Orizon kickstart session] | ||
+ | * [13 September 2016] - Paolo Perego take back project leadership, kickstarting Owasp Orizon again | ||
+ | * [February, 2014] - Greg Disney-Leugers adopted the OWASP Orizon project. | ||
+ | * [November 2009] - we started moving from current release to the next major bump (v2.0) that will happen next June 2010 during Owasp AppSEC conference in Stockholm. | ||
− | + | == Roadmap and Getting Involved== | |
− | |||
− | |||
− | + | Owasp Orizon kickstart is scheduled during the upcoming [http://owaspsummit.org/Working-Sessions/Project-Summit/Owasp-Orizon-Reboot.html Owasp Summit 2017] | |
− | |||
− | [http:// | ||
− | + | Some intended milestones to be putted in roadmap are: | |
− | + | * Spring 2017 - Defining the team and overall goals | |
+ | * Autumn 2017 - First alpha release | ||
+ | * Winter 2017 - Second alpha release | ||
+ | * January 2018 - First beta | ||
− | |||
− | == | + | ==Classifications== |
− | |||
− | |||
− | + | {| width="200" cellpadding="2" | |
+ | |- | ||
+ | | align="center" valign="top" width="50%" rowspan="2"| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]] | ||
+ | | align="center" valign="top" width="50%"| [[File:Owasp-builders-small.png|link=]] | ||
+ | |- | ||
+ | | align="center" valign="top" width="50%"| [[File:Owasp-defenders-small.png|link=]] | ||
+ | |- | ||
+ | | colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] | ||
+ | |- | ||
+ | | colspan="2" align="center" | [[File:Project_Type_Files_TOOL.jpg|link=]] | ||
+ | |} | ||
− | + | |} | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | = | + | =Project About= |
− | + | {{:Project Information:template Orizon Project}} | |
− | |||
− | |||
− | + | __NOTOC__ <headertabs /> | |
− | + | [[Category:OWASP Project]] [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] | |
− | [ | ||
− | |||
− | |||
− | [ | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | [[Category: | ||
− | [[Category: | ||
− | [[Category: |
Latest revision as of 15:15, 11 May 2017
|
|
---|---|
OWASP Orizon Project
OWASP Orizon is a source code security scanner designed to spot vulnerabilities in J2EE web applications, Android code and generally speaking in Java written source code.
Description
Owasp Orizon is a source code static analyzer tool designed to spot security issues in Java applications.
Owasp Orizon mission is to provide people an opensource tool, helping them in reviewing:
- single Java classes
- Java standalone tools packed in JAR files
- web applications packed in EAR / WAR files
- Android APK applications
It was a dark and stormy night in Milan, Italy. It was 2006 and I felt the need of something helping me in reviewing other people java source code. So Owasp Orizon born and grew up as security tool trying to parse Java source code, building an Abstract Syntax Tree and spot for unsafe calls in the code.
In the very beginning Owasp Orizon was a sort of enhanced grep tool. In 2008, I started supporting PHP programming language but the initial boost disappeared. After being in love with other programming languages and technolgies, eight years later, in 2017 I kickstarted the project again from scratch.
Licensing
OWASP Orizon is an opensource tool. It is licensed under the Apache 2 License.
Quick Start
See project GitHub home page
Project Resources
Project Leader
Paolo Perego
email twitter blog
News and Events
- [Spring 2017] - Owasp Orizon kickstart session
- [13 September 2016] - Paolo Perego take back project leadership, kickstarting Owasp Orizon again
- [February, 2014] - Greg Disney-Leugers adopted the OWASP Orizon project.
- [November 2009] - we started moving from current release to the next major bump (v2.0) that will happen next June 2010 during Owasp AppSEC conference in Stockholm.
Roadmap and Getting Involved
Owasp Orizon kickstart is scheduled during the upcoming Owasp Summit 2017
Some intended milestones to be putted in roadmap are:
- Spring 2017 - Defining the team and overall goals
- Autumn 2017 - First alpha release
- Winter 2017 - Second alpha release
- January 2018 - First beta
Classifications
|}
PROJECT IDENTIFICATION | |||||||
---|---|---|---|---|---|---|---|
Project Name | OWASP Orizon Project | ||||||
Short Project Description | This project born in 2006 in order to provide a framework to all Owasp projects developing code review services. The project is in a quite stable stage and it is usable for Java static code review and some dynamic tests against XSS. Owasp Orizon includes also APIs for code crawling, usable for code crawling tools. | ||||||
Key Project Information | Project Leader Paolo Perego |
Project Contributors See here |
Mailing list Subscribe here Use here |
Project Type |
Sponsor OWASP SoC 08 |
Release Status | Main Links | Related Projects |
---|---|---|
The Owasp OrizonProject in Power Point |
Pages in category "OWASP Orizon Project"
This category contains only the following page.