This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

OWASP DefectDojo Project

From OWASP
Revision as of 02:37, 22 April 2016 by Devgreg (talk | contribs) (OWASP DefectDojo Tool Project)

Jump to: navigation, search
OWASP Project Header.jpg


OWASP DefectDojo Tool Project

An open source vulnerability management tool that streamlines the testing process by offering templating, report generation, metrics, and baseline self-service tools.

DefectDojo is a tracking tool written in Python / Django. DefectDojo was created in 2013 and open-sourced on March 13th, 2015. The project was started to make optimizing vulnerability tracking less painful. The top goal of DefectDojo is to reduce the amount of time security professionals spend logging vulnerabilities. DefectDojo accomplishes this by offering a templating system for vulnerabilities, imports for common vulnerability scanners, report generation, and metrics. Dojo1.png

Description

DefectDojo streamlines the testing process through several 'models' that an admin can manipulate with Python code. The core models include: 'engagements', 'tests' and 'findings'. DefectDojo has supplemental models that facilitate metrics, authentication, report generation, and tools. DefectDojo is written in Python 2.7 with Django 1.8.

Testing or installing DefectDojo is easy. There is a live demo for interested parties to try Dojo here. If you decide to setup an instance of Dojo for your organization, we have developed a script that handles all dependencies, configures the database, and creates a super user. Complete installation instructions are found here. A complete walk-through can be found here. Documented example workflows can be found [1].

Licensing

DefectDojo is licensed under the BSD Simplified License.

Project Resources

Live Demo

Source Code

Getting Started Guide

What's New

Issue Tracker

Project Leaders

Greg Anderson @

Charles Neill

Jay Paz@

Related Projects

Classifications

Project Type Files TOOL.jpg
Project Type Files CODE.jpg
Incubator Project Owasp-builders-small.png
Owasp-defenders-small.png

News and Events

How can I participate in your project?

All you have to do is make the Project Leaders aware of your available time to contribute to the project. It is also important to let the Leaders know how you would like to contribute and pitch in to help the project meet its goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. If you are a programmer and wish to contribute code, we regularly review pull requests.

If I am not a programmer can I participate in your project?

Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for people to help translate our documentation. See the Road Map and Getting Involved tab for more details.

Contributors

  • Greg Anderson - Greg wrote the original code base with Charles Neill
  • Charles Neill - Charles wrote the original code base with Greg Anderson.
  • Jay Paz - Jay added a multitude of functionalities / UI enhancements, that has made Dojo production ready.
  • Michael Dong - Michael dong contributed to the baseline self-service tools.
  • Fatimah Zohra - Fatimah also contributed to the baseline self-service tools.
  • Aarron Weaver - Added CheckMarx support.
  • Yaakov Saxon - Fixed ZAP and CWE parsing.
  • Matt Valdes - Fixed an issue with the Ansible install.

At this time, Dojo is already being used by multiple large enterprises, but there is still many aspects we want to improve. Part of our next steps is to better evangelize our work and encourage others to contribute. However, we do have a set of core contributors that actively work on the project. Feature-wise, we hope to push a proof of concept plugin that will aid in retesting automation.


Roadmap

As of March, 2016, the highest priorities for the next 6 months are:

  • A proof of concept plugin that will aid in retesting automation
  • JIRA Integration
  • Dynamic Application Tagging.

Subsequent Releases will add:

  • CI / CD for pull requests
  • Additional Unit Tests
  • Automated Regression tests

Getting Involved

Involvement in the development and promotion of DefectDojo is actively encouraged! You do not have to be a security expert or a programmer to contribute. Some of the ways you can help are as follows:

Coding

We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests

Localization

Are you fluent in another language? Can you help translate the text strings in the DefectDojo into that language?

Testing

Do you have a flair for finding bugs in software? We want to produce a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer any help.

Feedback

Please use the DefectDojo project mailing list for feedback about:

  • What do like?
  • What don't you like?
  • What features would you like to see prioritized on the roadmap?
PROJECT INFO
What does this OWASP project offer you?
RELEASE(S) INFO
What releases are available for this project?
what is this project?
Name: OWASP DefectDojo
Purpose: OWASP DefectDojo is an open source vulnerability management tool that streamlines the testing process by offering templating, report generation, metrics, and baseline self-service tools.
License: BSD Simplified License
who is working on this project?
Project Leader(s):
how can you learn more?
Project Pamphlet: Not Yet Created
Project Presentation:
Mailing list: N/A
Project Roadmap: Not Yet Created
Key Contacts
current release
1.5.1
last reviewed release
1.2.1


other releases