This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Code Review Guide Table of Contents"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
 
==[[Code Review Introduction|Introduction]] ==
 
==[[Code Review Introduction|Introduction]] ==
 
+
==[[Code Review Processes]]==
[[Category:OWASP Code Review Project]]
+
==Checklists==
 
+
#[[Buffer Overruns and Overflows|Buffer Overruns and Overflows]]
==[[Buffer Overruns and Overflows|Buffer Overruns and Overflows]] ==
+
#[[OS Injection]]
 
+
#[[SQL Injection]]
==[[OS Injection]] ==
+
#[[Data Validation (Code Review)|Data Validation]]
 
+
#[[Error Handling]]
==[[SQL Injection]] ==
+
#[[The Secure Code Environment]]
 
+
#[[Transaction Analysis]]
==[[Data Validation (Code Review)|Data Validation]] ==
 
==[[Error Handling]]==
 
==[[The Secure Code Environment]] ==
 
==[[Transaction Analysis]] ==
 
 
==[[Automating Code Reviews]] ==
 
==[[Automating Code Reviews]] ==
 
==[[References]]==
 
==[[References]]==
  
 
[[Category:OWASP Code Review Project]]
 
[[Category:OWASP Code Review Project]]

Revision as of 12:27, 28 June 2006

Introduction

Code Review Processes

Checklists

  1. Buffer Overruns and Overflows
  2. OS Injection
  3. SQL Injection
  4. Data Validation
  5. Error Handling
  6. The Secure Code Environment
  7. Transaction Analysis

Automating Code Reviews

References