Category:OWASP Stinger Project

Overview
Developers consistently implement sporadic, ad-hoc input validation mechanisms for web applications. Lack of a centralized and well-defined input validation mechanism opens the application to a variety of attacks: including SQL Injection, Cross Site Scripting (XSS), and Command Injection. The OWASP Stinger Project aims to develop a centralized input validation component which can be easily applied to existing or developmental applications. Using a declarative security model, Stinger has the ability to validate all HTTP requests coming into an application. Stinger is such a simplistic yet strong validation engine that organizations have begun integrating it into their software development life-cycle.

Project Lead
The OWASP Stinger Project is lead by [mailto:eric.sheridan@owasp.org Eric Sheridan]

License
Stinger is offered under the LGPL. For further information on OWASP licenses, please consult the OWASP Licenses page.

Versions

 * Click here to view the OWASP Stinger 1.0 Project page
 * Click here to view the OWASP Stinger 2.0 Project page
 * Click here to view the OWASP Stinger 3.0 Project page

Stinger News
Project Pages Revamped and Stinger 3.0 - 09:55, 23 November 2006 (EST)

The OWASP Stinger project pages are currently being "revamped" to be visually clean and make navigation more intuitive. Furthermore, Stinger 3.0 development is underway! Make sure to post any ideas you would like to see implemented in the new version at the OWASP Stinger 3.0 Project page.

Feedback and Participation
We hope you find Stinger useful. Please contribute back to the project by sending your comments, questions, and suggestions to the Stinger mailing list. Thanks!

To join the OWASP Stinger mailing list or view the archives, please visit the subscription page.

Project Sponsors
The OWASP Stinger project is sponsored by https://www.owasp.org/images/d/d1/Aspect_logo.gif.