OWASP Code Review Guide Table of Contents

Methodology

 * 1) Introduction
 * 2) Steps and Roles
 * 3) Code Review Processes

Design review

 * 1) Designing for security

Examples by Vulnerability

 * 1) Reviewing Code for Buffer Overruns and Overflows
 * 2) Reviewing Code for OS Injection
 * 3) Reviewing Code for SQL Injection
 * 4) Reviewing Code for Data Validation
 * 5) Reviewing Code for Error Handling
 * 6) Logging issues
 * 7) Reviewing Code for Logging Issues
 * 8) The Secure Code Environment
 * 9) Reviewing The Secure Code Environment
 * 10) Transaction Analysis
 * 11) Authorization
 * 12) Authentication
 * 13) Session Integrity
 * 14) Cross Site Request Forgery
 * 15) Cryptography
 * 16) Dangerous HTTP Methods
 * 17) Race Conditions

Java

 * 1) Inner classes
 * 2) Class comparison
 * 3) Cloneable classes
 * 4) Serializable classes
 * 5) Package scope and encapsulation
 * 6) Mutable objects
 * 7) Private methods & circumvention

Automating Code Reviews

 * 1) Preface
 * 2) Reasons for using automated tools
 * 3) Education and cultural change
 * 4) Tool Deployment Model