Secure Code Warrior® has a built-in report that allows Company Administrators to quickly pull a CSV extract of all the Challenges that are available to your organization.
This can be a good way to get an overview of the kind of vulnerabilities and challenges developers will encounter as they participate in various learning activities and events.
Step 1
Go to the Administration tab in the top menu
Step 2
Click the Reports tab and look for Available Challenges in the 'name' column.
Hit the download arrow on the right.
Step 3
You'll be directed to a page where you can view and download a CSV extract of all the Challenges available to your organization along with their respective:
| Field | Definition |
|
Content |
Value will always be 1 |
| Language Framework Group |
The group of each language/framework, ex: API, IAC, Frontend, Web, Mobile...et |
| Language Framework | Language/Framework ex: Java Spring, Python...etc |
| Category | Vulnerability Category |
| Sub Category | Vulnerability subcategory |
| Priority |
The priority of the vulnerability.
|
| Challenges Easy | The number of easy challenges available |
| Challenges Medium | The number of medium challenges available |
| Challenges Hard | The number of hard challenges available |
| Mission Walkthrough | The number of walkthroughs available |
| Mission Easy | The number of easy missions available |
| Mission Medium | The number of medium missions available |
| Mission Hard | The number of hard missions available |
| Mission Total | The total number of missions and walkthroughs available |
| Coding Labs | The number of coding labs available. |
| Guidelines | Indicates whether there are Guidelines available for the selected language and vulnerability. |
| Videos | Provides a link to the relevant learning video |
| openStandards.CWE | All relevant CWEs |
| openStandards.CWE/SANS Top 25 Most Dangerous Software Errors - 2021 | Maps the selected vulnerability to the relevant vulnerability in the CWE/SANS Top 25 Most Dangerous Software Errors - 2021 |
| openStandards.NIST Executive Order 14028 | Maps the selected vulnerability to the relevant vulnerability in the NIST Executive Order 14028 |
| openStandards.OWASP API Security Top 10 - 2023 | Maps the selected vulnerability to the relevant vulnerability in the OWASP API Security Top 10 - 2023 |
| openStandards.OWASP Docker Top 10 | Maps the selected vulnerability to the relevant vulnerability in the OWASP Docker Top 10 |
| openStandards.OWASP Embedded Top 10 - 2020 | Maps the selected vulnerability to the relevant vulnerability in the OWASP Embedded Top 10 - 2020 |
| openStandards.OWASP Kubernetes Top 10 - 2022 | Maps the selected vulnerability to the relevant vulnerability in the OWASP Kubernetes Top 10 - 2022 |
| openStandards.OWASP Mobile ASVS - 2022 | Maps the selected vulnerability to the relevant vulnerability in the OWASP Mobile ASVS - 2022 |
| openStandards.OWASP Mobile Top 10 - 2016 | Maps the selected vulnerability to the relevant vulnerability in the OWASP Mobile Top 10 - 2016 |
| openStandards.OWASP Web ASVS - 2021 | Maps the selected vulnerability to the relevant vulnerability in the OWASP Web ASVS - 2021 |
| openStandards.OWASP Web Top 10 - 2021 | Maps the selected vulnerability to the relevant vulnerability in the OWASP Web Top 10 - 2021 |
Comments
0 comments
Please sign in to leave a comment.