This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "The Owasp Code Review Scoring System"
From OWASP
m (Added navigation to facilitate sequential reading online) |
m (Removed "Preface" of this stub) |
||
| (One intermediate revision by the same user not shown) | |||
| Line 4: | Line 4: | ||
| usenext=NextLink | next=References | lblnext= | | usenext=NextLink | next=References | lblnext= | ||
}} | }} | ||
| − | |||
| − | |||
In this section, we will provide some common criteria to evaluate how much a source code matches the key points we set in the the Code review Top 10 section. | In this section, we will provide some common criteria to evaluate how much a source code matches the key points we set in the the Code review Top 10 section. | ||
Using these criteria, after a code review a score can be applied to a source in order to answer the question "how much is secure my code?" | Using these criteria, after a code review a score can be applied to a source in order to answer the question "how much is secure my code?" | ||
Latest revision as of 17:06, 9 September 2010
In this section, we will provide some common criteria to evaluate how much a source code matches the key points we set in the the Code review Top 10 section. Using these criteria, after a code review a score can be applied to a source in order to answer the question "how much is secure my code?"