Difference between revisions of "Category:OWASP Orizon Project"
|Line 1:||Line 1:|
Revision as of 20:04, 22 January 2014
The quest for secure code is what all developers want to achieve (at least we hope so). Software must be reliable. Software must be strong. Software must be secure.
How secure does my software have to be? The correct answer is hard to find. But security is a problem that even a development team must consider.
Should skilled developers also be security gurus? Not necessarily, but it is important to provide security tools that will augment their development skills. And so our quest for secure code begins...
The OWASP Orizon project was created with the aim of providing a common ground for safe coding and code review methodologies to be applied to software. The project is approaching its first major release and it will be able to be used in a production environment in the near future.
Orizon must give thanks to Findbugs, the OWASP LAPSE Project, RATS, and Flawfinder for ideas and inspiration.
The Orizon project, hosted by Sourceforge, is here.
Orizon's goal is to provide:
- a tool a security specialist (or a developer with hackish state-of-mind) can use to perform code reviews
- an engine a developer can embed in his application to provide code review services
One of OWASP's newly-created goals is to eat its own dog food and Orizon will contribute to this goal by utilizing the recommendations described in the OWASP Code Review Guide.
A discussion group is available as well, in LinkedIN. We can use this group to talk about Orizon, to promote it in the real world business of statica analysis, to request features, to submit bugs, to exchange some words with the developers and so on.
So, please join the group and help us spreading the voice. Static analysis is fun... again.
Join the project
Orizon wants you!
The model we follow is the OpenBSD one. Anyone will be free about sending opinions, criticism and patches. If an user will provide a good number of patches showing us he (or she) really wants to collaborate to the project, than he (or she) will be added to Owasp orizon core team.
If you are a skilled Java developer why don't you consider writing a bunch of code for Orizon? Or, consider joining the project for documentation, advertising, blog maintenance, etc.
We hope you find the OWASP Orizon Project useful. Please contribute to the project by volunteering for one of the tasks, or by sending your comments, questions, and suggestions to email@example.com.
To join the OWASP Orizon Project mailing list or view the archives, please visit the subscription page.
| PROJECT INFO
What does this OWASP project offer you?
| RELEASE(S) INFO|
What does this OWASP project release offer you?
The latest release is 1.19.
The Orizon blog is proudly hosted by Wordpress.com here.
Owasp Orizon Internals @ Owasp AppSec NY 2008, New York 22-25th September 2008
Owasp Orizon Internals @ Owasp AppSec EU 2008, Ghent 21-22nd May 2008
Owasp Orizon Internals @ Owasp Day Italy 2008, Rome 31st March 2008
OWASP Orizon Project @ SMAU eAcademy, Milan 4-7th October 2006
I will talk to SMAU eAcademy2006 next Saturday 7th October 2006 about code review and safe coding. Here you can find more information (for now, only in Italian). The last part of the speech will be about introducing the Orizon project and giving a development roadmap.
A slideshare space is available to for the presentations used in Owasp [http://www.slideshare.net/thesp0nge
November 2009 - we started moving from current release to the next major bump (v2.0) that will happen next June 2010 during Owasp AppSEC conference in Stockholm.
In order to motivate collaboration and to keep track about project improvements, each month a slideshow showing the biggest updates will be published on the Net and over the blog, so anyone can figure it out how to help the project and we're doing for the community
OWASP Orizon Project Created! - 09:24, 2 October 2006 (EDT)
The Open Web Application Security Project is proud to announce the OWASP Orizon Project!
Pages in category "OWASP Orizon Project"
This category contains only the following page.