Secure Code Warrior® Guidelines provide targeted learning that is tailored to the language/framework of your choice. They guide developers through defensive security strategies to increase knowledge before diving into interactive learning.
Developers will learn both general mitigation strategies to strengthen their security knowledge, as well as in-depth best practices for the selected language/framework.
Guidelines consist of 3 main parts:
- General Introduction, Description, and Mitigations.
- Language/framework mitigations.
- Additional code snippets (if applicable).
Covered Vulnerabilities
- Access Control - Missing Function Level Access Control
- Authentication - Use of Single-factor Authentication
- Authentication - Insufficiently Protected Credentials
- Authentication - Improper Authentication
- Business Logic - Logical Error
- Cross-Site Scripting (XSS) - Stored Cross-Site Scripting
- Cross-Site Scripting (XSS) - Reflected Cross-Site Scripting
- File Upload Vulnerability - Unrestricted File Upload
- Information Exposure - Sensitive Data Exposure
- Injection Flaws - Path Traversal
- Injection Flaws - Deserialization of Untrusted Data
- Injection Flaws - SQL Injection
- Insufficient Logging And Monitoring - Insufficient Logging and Monitoring
- Insufficient Transport Layer Protection - Unprotected Transport of Sensitive Information
- Lack of Resources & Rate Limiting - Lack of Resources & Rate Limiting
- Mass Assignment - Mass Assignment
- Security Misconfiguration - Improper or Missing HTTP Headers
- Security Misconfiguration - Information Exposure
- Security Misconfiguration - Disabled Security Features
- Security Misconfiguration - Improper Permissions
- Sensitive Data Storage - Plaintext Storage of Passwords
- Server-Side Request Forgery - Server-Side Request Forgery (SSRF)
- Vulnerable Componentes - Using Known Vulnerable Components
- Vulnerable Componentes - Using Components From Untrusted Source
- XML External Entities (XXE) - XML External Entities (XXE)
Available for Languages: Frameworks
Please note that not all 25 vulnerability categories are uniformly covered across all languages.
- C# (.NET) Basic
- C# (.NET) Core
- C# (.NET) MVC
- C# (.NET) Web Forms
- Docker Basic
- GO Basic
- Java: Enterprise Edition (Basic)
- Java Enterprise Edition (JSF)
- Java Enterprise Edition (JSP)
- Java Servlets
- Java Spring
- Java Struts
- JavaScript Node.js (Express)
- Kubernetes Basic
- Perl Dancer2
- PHP Basic
- PHP Symfony
- PHP: Laravel
- Pseudocode Web
- Python Basic
- Python Django
- Python Flask
- Ruby Rails
- Rust Basic
- Salesforce Apex
- Scala Play
- Typescript:Node.js (express)
Related Links:
Comments
0 comments
Please sign in to leave a comment.