Secure Code Warrior® has a built-in report that allows Company Administrators to quickly pull a CSV extract of all the Challenges that are available to your organization.
This can be a good way to get an overview of the kind of vulnerabilities and challenges developers will encounter as they participate in various learning activities and events.
Step 1
Go to the Administration tab in the top menu
Step 2
Click the Reports tab and look for Available Challenges in the 'name' column.
Hit the download arrow on the right.
Step 3
You'll be directed to a page where you can view and download a CSV extract of all the Challenges available to your organization along with their respective:
Field | Definition |
Content |
Value will always be 1 |
Language Framework Group |
The group of each language/framework, ex: API, IAC, Frontend, Web, Mobile...et |
Language Framework | Language/Framework ex: Java Spring, Python...etc |
Category | Vulnerability Category |
Sub Category | Vulnerability subcategory |
Priority |
The priority of the vulnerability.
|
Challenges Easy | The number of easy challenges available |
Challenges Medium | The number of medium challenges available |
Challenges Hard | The number of hard challenges available |
Mission Walkthrough | The number of walkthroughs available |
Mission Easy | The number of easy missions available |
Mission Medium | The number of medium missions available |
Mission Hard | The number of hard missions available |
Mission Total | The total number of missions and walkthroughs available |
Coding Labs | The number of coding labs available. |
Guidelines | Indicates whether there are Guidelines available for the selected language and vulnerability. |
Videos | Provides a link to the relevant learning video |
openStandards.CWE | All relevant CWEs |
openStandards.CWE/SANS Top 25 Most Dangerous Software Errors - 2021 | Maps the selected vulnerability to the relevant vulnerability in the CWE/SANS Top 25 Most Dangerous Software Errors - 2021 |
openStandards.NIST Executive Order 14028 | Maps the selected vulnerability to the relevant vulnerability in the NIST Executive Order 14028 |
openStandards.OWASP API Security Top 10 - 2023 | Maps the selected vulnerability to the relevant vulnerability in the OWASP API Security Top 10 - 2023 |
openStandards.OWASP Docker Top 10 | Maps the selected vulnerability to the relevant vulnerability in the OWASP Docker Top 10 |
openStandards.OWASP Embedded Top 10 - 2020 | Maps the selected vulnerability to the relevant vulnerability in the OWASP Embedded Top 10 - 2020 |
openStandards.OWASP Kubernetes Top 10 - 2022 | Maps the selected vulnerability to the relevant vulnerability in the OWASP Kubernetes Top 10 - 2022 |
openStandards.OWASP Mobile ASVS - 2022 | Maps the selected vulnerability to the relevant vulnerability in the OWASP Mobile ASVS - 2022 |
openStandards.OWASP Mobile Top 10 - 2016 | Maps the selected vulnerability to the relevant vulnerability in the OWASP Mobile Top 10 - 2016 |
openStandards.OWASP Web ASVS - 2021 | Maps the selected vulnerability to the relevant vulnerability in the OWASP Web ASVS - 2021 |
openStandards.OWASP Web Top 10 - 2021 | Maps the selected vulnerability to the relevant vulnerability in the OWASP Web Top 10 - 2021 |
Comments
0 comments
Please sign in to leave a comment.