Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added to various TASVS categories #6

Merged
merged 1 commit into from
Sep 6, 2024
Merged

Conversation

matreurai
Copy link
Contributor

Added myself as a contributor.
Moved TASVS-CODE-7 to TASVS-CONF-2.
Added to TASVS-CODE-7.
Added to TASVS-CONF-2.

Note : I've seen in TASVS-STORAGE a category specific to a specific vulnerability (DLL Hijacking). I think this should be modified as the testing standard is not made for specific vulnerabilities in my opinion. Additionally, these items are explaining a type of attack and do not provide any guidance to what to test or how to prevent/mitigate risks of such attacks. The equivalent in the Web Application Security Verification Standard would be to add an item as such:
"Cross-Site Scripting Category - Blind cross-site scripting (XSS) is a variant of stored XSS where the malicious payload is executed in a different context or application than where it was originally injected.".
I don't think this make sense in the context of a Verification Standard.
Let me know if you agree. Cheers

@JeffreyShran
Copy link
Collaborator

changed Convert Markdown to PDF and Create Release action mid flow as it was causing permission issues with the fork

@JeffreyShran JeffreyShran merged commit 79dbdc7 into OWASP:main Sep 6, 2024
1 check failed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants