This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit

Difference between revisions of "OWASP Zezengorri Code Project"

Jump to: navigation, search
Line 148: Line 148:
= Media =
= Media =
__NOTOC__ <headertabs>Media</headertabs>Secure you Applications with Owasp[[File:SDLC y Owasp English.pdf|alt=Owasp tools for Applications Security|thumb|Owasp tools for Applications Security
__NOTOC__ <headertabs>Media</headertabs>
* Secure you Applications with Owasp
[[File:SDLC y Owasp English.pdf|alt=Owasp tools for Applications Security|thumb|Owasp tools for Applications Security
[[File:Clouds Security and OWASP.pdf|alt=Security in Cloud|thumb|Secure you Part of the Deal in Cloud]]
* Secure you part of the Deal and Owasp
[[File:Clouds Security and OWASP.pdf|alt=Security in Cloud|Secure you Part of the Deal in Cloud|center|frame]]
[[Category:OWASP Project]]   
[[Category:OWASP Project]]   

Revision as of 20:04, 18 May 2018

OWASP Project Header.jpg

OWASP Code Library Project

Zezengorri is a library that allows you to add security to your development IDE from day one. From the moment you decide to implement secure development to your projects.

You can start either while designing your new projects or implement it in old projects. You can use it to detect vulnerabilities of your web server and the programming language even before starting the development parallel to the system development life circle.


Whenever developers, team leaders or project managers add security to a web application, the first question that comes to mind is which technologies will be implemented in the web project, what operating system is supported by the web server and on which version the server or database runs. For these reasons, OWASP defined a threat modeling document.

This project Zezengorri is a code library is a downloadable package that adheres to the root of the web project, and from them this can, analyzes and seeks to collect in a simple web page the characteristics of all the security components for examples: if our website uses or not HSTS, the versions of Chipset active, the use of SSL certificate for the web page among other securities characteristics important measure in the during the life cycle development software . Each of these item is display in a new web page in a list of item any show if is active or not, the version of the plugin and a web link. That links redirect to the CVE page and the CVE score of this item. determine if the project can be promoted to the next category. The information requested is also intended to help Project Leaders think about the road map and feature priorities, and give guidance to the reviews as a result of that effort.

Apart from detecting and resolving security issues, the recompiled information is also useful to project leaders who can use it to create risk-models for the websites they manage.


This program is free software: you can redistribute it and/or modify it under the terms of these

as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. OWASP and any contributions are Copyright © by OWASP Years 2017-2018.

Project Resources

Applications Security in IT deparment

Applications Security using .Net

Project Leader

Project leader's name:

-Gustavo Nieves Arreaza

Volunteers :

-Lubyn Rodriguez(PM)

-Hernan Pantoja(Developer)

-Samuel Morales(Developer)

-Manuel Heyers(Developer)

Related Projects

Owasp Secure Coding Practiques


Project Type Files CODE.jpg
Incubator Project Owasp-builders-small.png

News and Events

  • [1 Nov 2017] Release Page Explain the Concept, with a white Paper
  • [3 Apr 2018] The Inacap Institute and their students also start to participate in the Zezengorri owasp
  • [19 Aug 2018] 1.0 Release Candidate is available for download. This release provides final bug fixes and product stabilization. Any feedback (good or bad) in the next few weeks would be greatly appreciated.
  • Repository:

How can I participate in our project?

If you have experience in web development using for example: Node.JS, C# or Java and are interested in learning about applications security please contact us via the official mail: [email protected]

If I am not a programmer can I participate in our project?

Yes, you can certainly participate in the project if you are not a programmer or technician. The project needs different skills and expertise for different times during its development ,Currently we are looking for IT persons that are willing to investigate how implement and improve the security in applications.

We are looking right now people for make our:



-Development (using Node.Js and Python)


The OWASP Security Zenzengorri Principles project is developed by a worldwide team of volunteers. A live update of project contributors is found here .

The first contributors to the project are:

-Lubyn Rodriguez(PM)

-Hernan Pantoja(Developer)

-Samuel Morales(Developer)

-Manuel Heyers(Developer)


As of february , 2017, the highest priorities for the next 6 months are: 

  • Complete the first draft of the Code Project Template
  • Get other people to review the Code Project Template and provide feedback
  • Incorporate feedback into changes in the Code Project Template
  • Finalize the Code Project template and have it reviewed to be promoted from an

As of august , 2017, the highest priorities for the next 6 months are:

  • Promote the library in conferences
  • Get academic support
  • Recruit more volunteers

As of march , 2018, the highest priorities for the next 6 months are:

  • Release version of library 1.0
  • Fundraise for growth the project

Getting Involved


If you have experience in programming in Node.js or Python and you want programming tools for secure applications.


Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.

The functionalities of this code library are when it is downloaded and implemented.

-Detect vulnerabilities
-Compare vulnerabilities, with an updated database online.
-Ranking the severity of vulnerabilities
-Show how fix the vulnerabilities
-Define you own security test in you own program language.
  • Secure you Applications with Owasp

File:SDLC y Owasp English.pdf

  • Secure you part of the Deal and Owasp

File:Clouds Security and OWASP.pdf