Security Knowledge Framework is an expert system application that uses the OWASP Application Security Verification Standard with detailed code examples (secure coding principles) to help developers in pre-development and post-development phases and create applications that are secure by design.
- Introduction
- Installing
- Updating Database
- Updating Chatbot
- Usage
- CI-Pipeline
- Development / Contributing
- License
- Contributors
Our experience taught us that the current level of security of web-applications is not sufficient enough to ensure security. This is mainly because web-developers simply aren't aware of the risks and dangers that are lurking, waiting to be exploited by hackers.
Because of this we decided to develop a framework in order to create a guide-system available for all developers so they can develop applications secure by design from the start.
The OWASP Security Knowledge Framework is here to support developers in creating secure applications. By using the OWASP Application Security Verification Standards. as a security requirement and give the developer feedback regarding descriptions and solutions on how to properly implement these security controls in a safe manner.
The second stage is validating if the developer properly implemented different security controls and the belonging defence mechanisms by means of checklists created with the OWASP Application Security Verification Standards. By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defence mechanisms the developer forgot to implement and gives him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.
There is a method available to update the content of the SKF application.
When you have modified or created new Knowledge base items, code examples or checklist you need to run the following commands in the SKF root directory:
export FLASK_APP=skf/app.py
export PYTHONPATH=.:$PYTHONPATH
flask updatedb
There is a method available to update the dataset of the SKF chatbot application.
When you have modified or created new Knowledge base items, code examples or checklist you need to run the following commands in the SKF root directory:
export FLASK_APP=skf/app.py
export PYTHONPATH=.:$PYTHONPATH
flask initdataset
For more detailed information such as setting up an admin account and user guides please see the extended documentation that can be found below:
Readme: extended documentation
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!
SKF Build details:
https://travis-ci.org/blabla1337/skf-flask
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.
SKF Coveralls details:
https://coveralls.io/r/blabla1337/skf-flask
Code coverage done right. Highly integrated with GitHub, Bitbucket and GitLab.
SKF codecov details:
https://codecov.io/gh/blabla1337/skf-flask
BitHound provides your Node team with comprehensive and prioritized issues in your code and npm packages.
SKF Bithound details:
https://www.bithound.io/github/blabla1337/skf-flask
Stay Up-to-date! Stay secure! Requires.io monitors your Python projects dependencies, and notify you whenever any of your dependency is out-of-date.
SKF Requires details:
https://requires.io/github/blabla1337/skf-flask/requirements/
Announcing Black Duck CoPilot, a new service helping open source project teams catalog and report on their project's dependencies.
SKF Requires details:
https://copilot.blackducksoftware.com/github/groups/blabla1337/locations/skf-flask/public/results
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.
ssllabs.org:
Bringing you the best SSL/TLS and PKI testing tools and documentation.
sslbadge.org:
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.
Copyright (C) 2021 Glenn ten Cate, Riccardo ten Cate
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License as
published by the Free Software Foundation, either version 3 of the
License, or (at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
- Owasp
Licensed under the creative commons license
- Glenn ten Cate
- Riccardo ten Cate
- Mattijs van Ommeren
- Alexander Kaasjager
- John Haley
- Daniel Paulus
- Erik de Kuijper
- Roderick Schaefer
- Jim Manico
- Martijn Gijsberti Hodenpijl
- Bithin Alangot
- Martin Knobloch
- Adam Fisher
- Tom Wirschell
- Joerg Stephan
- Simon Brakhane
- Gerco Grandia
- Ross Nanopoulos
- Bob van den Heuvel
- Mariano Jose Abdala
- Ilguiz Latypov
- Laurence Keijmel
- Rick Mitchell (Kingthorin)
- Xenofon Vassilakopoulos
- Heeraj Nair
- Alpha Kitonga
- Wojciech Reguła
- Amadeusz Starzykiewicz
- Adam Zima
- Kacper Madej
- Rafał Fronczyk
- Chang Xu (Neo)
- Martin Marsicano
- Priyanka Jain
- Chandrasekar Karthickrajan
- Leena Bhegade
- Balazs Hambalko
- Rudy Truyens
- Giulio Comi
- Aniket Surwade
- Thiago Luiz Dimbarre
- Harshant Sharma
- Lucas Luitjes
- Semen Rozhkov
- Mehtab Zafar
- Daniel Spilsbury
- Akash M
- Tess Sluijter
- Xavier Rene-Corail
- David Wheeler