OWASP Rails Goat Project
Railsgoat is a vulnerable version of the Ruby on Rails Framework and includes vulnerabilities from the OWASP Top 10, as well as some "extras" the project contributors felt worthwhile to share. This project is designed to educate both developers as well as security professionals. More information can be found at the "Unofficial" project site, listed below.
The unofficial but maintained project page which includes tutorials, getting started, FAQ, etc. RailsGoat Homepage
OWASP Railsgoat Project
This is a Rails application which is vulnerable to the OWASP Top 10. It is intended to show how each of these categories of vulnerabilities can manifest themselves in a Rails-specific way as well as provide the subsequent mitigations for each.
Ruby on Rails is an incredibly popular web development framework. There are security concerns whether it be configuration related or language specific, developer-introduced vulnerabilities. Railsgoat comes pre-packaged with a tutorial section that covers the description of an issue, where the code flaw exists within the application, solution (for attack and prevention/mitigation), as well as a hint for those that would like to try and find the vulnerabilities themselves.
Additionally, Railsgoat contains Unit-Tests that demonstrate the basics of writing security-based Unit-Tests.
OWASP Railsgoat is free to use. It is licensed under the MIT license.
Ken Johnson & Mike McCabe
Railsgoat is developed by a worldwide team of volunteers. The contributors to date have been:
- Ken Johnson
- Mike McCabe
- Al Snow
- Joseph Mastey
Submit GitHub Pull Requests to add code. Submit Issues to make feature requests.
To contribute, or to know more, contact at ken (DOT) johnson (AT) owasp (DOT) org
| PROJECT INFO
What does this OWASP project offer you?
| RELEASE(S) INFO|
What releases are available for this project?
From the Unofficial project page
The idea is simple. Free training for both developers and security professionals. All of it specific to the Ruby on Rails framework.