Category:OWASP Code Review Project
OWASP Code Review Guide Project
The code review guide is currently at release version 1.1 and the second best selling OWASP book in 2008. Many positive comments have been feedback regarding this initial version and believe it’s a key enabler for the OWASP fight against software insecurity. It has even inspired individuals to build tools based on its information. The combination of a book on secure code review and tools to support such an activity is very powerful as it gives the developer community a place to start regarding secure application development. Going forward I hope to further integrate with the ASVS and other guides such as the testing and ASDR guides shall be perfromed for version 2.0.t
Alpha Release OWASP Code Review 2.0
OWASP Code Review Guide 2.0 Alpha release is now available. It is a technical book written for those responsible for code reviews (management, developers, security professionals). The primarily focus of this book has been divided into two main sections. Section one is why and how of code reviews and sections two is devoted to what vulnerabilities need to be to look for during a manual code review. While security scanners are improving every day the need for manual security code reviews still needs to have a prominent place in organizations SDLC (Secure development life cycle) that desires good secure code in production.
The document is divided into two main sections. One section covers the why (reasons for doing secure code reviews) and how. This section main focus is IT management and project leads.
Second sections deals with vulnerabilities. It is based on the poplar OWASP top 10. Here you will find most of the code examples for both on what not to do and on what to do. A word of caution on code examples; Perl is famous for its saying that there are 10,000 ways to do one thing. The same is true for C#, PHP and Java or any other computer language. Now add in "Object-Oriented Programming" and if we are using design patterns or even what designs patterns are being used and sample code becomes very “iff” in what to write. We tried to keep the sample code so code reviews can see red flags and not “do it my way or else”.
The last big section is the appendix. Here we have content like code reviewer list, etc. of items that really don’t flow in book form but needed to be included to make the code review guide compete.
Alpha Peer Review of Code Review Guide 2.0
We have a small amount of content that is not in the code review guide. Both Gary and I are working on completing this. One thing we have tried to do is to have the code review guide flow as a book than a collection of separate articles based on a major topic.
Code Review Guide 2.0 needs the following to be peer reviewed:
On the editing process, it will be of great help if a reviewer could send of the corrected paragraph or code block along with the chapter, and page numbers.
Because of some unforeseen issues we are not able to provide a word document. I apologize for that, however editing the PDF is very possible and should not stop the review process.
OWASP Code Review Guide is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
What is the Code Review Guide?
OWASP Code Review Guide provides:
OWASP Testing Guide 
News and Events
Code Review Guide 2.0 Alpha Release is now available
OWASP New York Chapter March 2 2016
First before anything else both Gary and I want to thank the New York OWASP Chapter for being willing to have a working session on reviewing the work of the Code Review Guide team. I know its much more exciting to learn new hacking techniques or procedures to prevent it. Never less reviewing the book is a very much-needed effort and Gary and I very much appreciate everyone in New York taking time to do this.
I also want to give out a big shout of thanks to Ken Belva for help in pushing both Gary and myself to get the document ready for everyone. Last but not least we both also want to thank Helen Gao and Charles Beganskas.
Code Review Guide V1.1 on Lulu.
The OWASP Code Review project was conceived by Eoin Keary, the OWASP Ireland Founder and Chapter Lead. Current project leaders are Larry Conklin and Gary Robinson If you are interested in volunteering for the project, or have a comment, question, or suggestion, please drop me a line firstname.lastname@example.org or email@example.com
All of the OWASP Guides are living documents that will continue to change as the threat and security landscape changes. We welcome everyone to join the Code Review Guide Project and help us make this document great. The best way to get started is to subscribe to the mailing list by following the link below or contact the project leaders listed below.
Please introduce yourself and ask to see if there is anything you can help with. We are always looking for new contributions. If there is a topic that you’d like to research and contribute, please let us know!
Code Review Mailing firstname.lastname@example.org
Project leaders email@example.com or firstname.lastname@example.org
| PROJECT INFO
What does this OWASP project offer you?
| RELEASE(S) INFO|
What releases are available for this project?
Pages in category "OWASP Code Review Project"
The following 70 pages are in this category, out of 70 total.
- Classic ASP Design Mistakes
- Code Review Guide Foreword
- Code Review Guide Frontispiece
- Code Review Introduction
- Code Review Metrics
- Code Review Preparation
- Code Reviews and Compliance
- Codereview-Input Validation
- Crawling Code
- CRV2 ErrorHandlingMessages
- CRV2 MetricsCodeRev
- CRV2 PrepContext
- CRV2 SQLInjPHP
- Reasons for using automated tools
- Reviewing Code for Authentication
- Reviewing Code for Authorization Issues
- Reviewing Code for Buffer Overruns and Overflows
- Reviewing code for Cross-Site Request Forgery issues
- Reviewing Code for Cross-site scripting
- Reviewing Code for Data Validation
- Reviewing Code for Error Handling
- Reviewing Code for Logging Issues
- Reviewing Code for OS Injection
- Reviewing Code for Race Conditions
- Reviewing Code for Session Integrity issues
- Reviewing Code for SQL Injection
- Reviewing Flash Applications
- Reviewing MySQL Security
- Reviewing The Secure Code Environment
- Reviewing Web Services