This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit

OWASP Code Review Guide Table of Contents

Revision as of 10:50, 7 July 2007 by Adam Boulton (talk | contribs) (Examples by Vulnerability)

Jump to: navigation, search

Chapters Assigned

Foreword by OWASP Chair

1. Frontispiece

1.1 About the OWASP Code Review Project



Authors and Reviewers

Revision History


1.2 About The Open Web Application Security Project




Participation and Membership


OWASP Privacy Policy

Guide History

Long long ago...


  1. Introduction
  2. Steps and Roles
  3. Code Review Processes
  4. Transaction Analysis

Crawling Code

  1. Introduction
  2. First sweep of the code base
  3. Getting dug in

Design review

  1. Designing for security
    1. .NET
    2. Java
    3. PHP
    4. C
    5. C++
    6. MySQL
    7. AJAX

Examples by Vulnerability

  1. Reviewing Code for Buffer Overruns and Overflows
  2. Reviewing Code for OS Injection
  3. Reviewing Code for SQL Injection
  4. Reviewing Code for Data Validation
  5. Reviewing code for XSS issues
  6. Reviewing code for Cross-Site Request Forgery issues
  7. Reviewing Code for Error Handling
  8. Reviewing Code for Logging Issues
  9. Reviewing The Secure Code Environment
  10. Reviewing Code for Authorization Issues
  11. Reviewing Code for Authentication
  12. Reviewing Code for Session Integrity issues
  13. Reviewing Cryptographic Code
  14. Reviewing Code deployment: Dangerous HTTP Methods
  15. Reviewing Code for Race Conditions

Language specific best practice


  1. Java overview
  2. Java gotchas
  3. Java applet code review
  4. Java server (J2EE) code review




  1. Memory management
  2. String management
  3. Secure access to file system items


Automating Code Reviews

  1. Preface
  2. Reasons for using automated tools
  3. Education and cultural change
  4. Tool Deployment Model
  5. Code Auditor Workbench Tool