OWASP Glue Tool Project
OWASP Glue Tool Project
The OWASP Glue Tool Project is a tools based project intended to make security automation easier. It is essentially a ruby gem that co-ordinates the running of different analysis tools and reporting from those tools.
The purpose of the project is to make it easy to run static analysis tools, live analysis tools (ZAP) etc. as part of an automated build process and to report the findings to JIRA or other tracking systems.
Apache 2.0 License
This program is free software: you can redistribute it and/or modify it under the terms of the link Apache 2.0 License as published by the Apache Software Foundation. Any contributions are Copyright © by OWASP 2015.
Omer Levi Hevroni
News and Events
What does Glue do?
The OWASP Glue tool attempts to make it very easy to run different types of security tools at various stages of the software development process and produce unified issues that can be used in other contexts to track or remediate issues.
Why would I use Glue?
To help get security feedback into your developers hands faster.
How can I participate in your project?
Reach out to firstname.lastname@example.org with any questions or ideas or ideas about how to participate. We are welcoming input. We are following standard github workflow so you can fork the code and submit a pull request if you prefer. Alternatively, you can get more deeply involved and talk with us about roadmap and other items.
If I am not a programmer can I participate in your project?
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. See the Road Map and Getting Involved tab for more details.
To this point, project contributors include:
- Matt Konda
- Rafael Zambrano
- Alex Lock
Deliverable: Pipeline is delivered as a ruby gem (executable binary) and in a docker image with required tools already bundled.
As of September, 2016, the highest priorities for the next 6 months are:
- Stronger Jenkins workflow integration
- Integrate ZAP
- Stronger JIRA integration
Subsequent Releases will add
- Additional Tools...
Involvement in the development and promotion of Pipeline is actively encouraged! You do not have to be a security expert or a programmer to contribute. Some of the ways you can help are as follows:
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests
Are you fluent in another language? Can you help translate the text strings in the Tool Project Template into that language?
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.
Please use the Tool Project Template project mailing list for feedback about:
- What do like?
- What don't you like?
- What features would you like to see prioritized on the roadmap?
1. Pull from github or a specified location on the file system 2. Run tools like brakeman, bundler-audit and owasp-dependency-check on the code. 3. Standardizes the format of results then reports them in text, csv, json or via JIRA's REST API. 4. Detect duplicates and won't report the same thing more than once.
It also needs to be easy to set up the security tools and digest results. Hence a focus on docker.
Detail around this project can be found at: https://github.com/owasp/pipeline