OWASP Code Review Guide Table of Contents

Chapters Assigned

Methodology

 * 1) Introduction
 * 2) Steps and Roles
 * 3) Code Review Processes

Design review

 * 1) Designing for security

Examples by Vulnerability

 * 1) Reviewing Code for Buffer Overruns and Overflows
 * 2) Reviewing Code for OS Injection
 * 3) Reviewing Code for SQL Injection
 * 4) Reviewing Code for Data Validation
 * 5) Reviewing Code for Error Handling
 * 6) Reviewing Code for Logging Issues
 * 7) Reviewing The Secure Code Environment
 * 8) Transaction Analysis
 * 9) Authorization
 * 10) Authentication
 * 11) Session Integrity
 * 12) Cross Site Request Forgery
 * 13) Cryptography
 * 14) Dangerous HTTP Methods
 * 15) Race Conditions

Java

 * 1) Inner classes
 * 2) Class comparison
 * 3) Cloneable classes
 * 4) Serializable classes
 * 5) Package scope and encapsulation
 * 6) Mutable objects
 * 7) Private methods & circumvention

C

 * 1) Memory management
 * 2) String management
 * 3) Secure access to file system items

Automating Code Reviews

 * 1) Preface
 * 2) Reasons for using automated tools
 * 3) Education and cultural change
 * 4) Tool Deployment Model