Skip to content

Commit 7bb9263

Browse files
committed
add chart
1 parent 155e76e commit 7bb9263

File tree

5 files changed

+23
-51
lines changed

5 files changed

+23
-51
lines changed

.github/workflows/publish-insecure.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,10 @@ jobs:
3131
image: confusedcrib/workload-security-evaluator
3232
context: ./workload-security-evaluator
3333
dockerfile: ./workload-security-evaluator/Dockerfile
34+
- name: insecure-api
35+
image: confusedcrib/insecure-api
36+
context: ./insecure-api
37+
dockerfile: ./insecure-api/Dockerfile
3438

3539
steps:
3640
- name: Check out the repo

corgea_semgrep_3ff1a593-56a7-4ef9-8899-f0c2e52adcb9_report.json

Lines changed: 0 additions & 1 deletion
This file was deleted.

insecure-chart/values.yaml

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,3 +53,17 @@ workloadSecurityEvaluator:
5353
ports:
5454
http: 8080
5555
ssh: 22
56+
57+
insecureApi:
58+
namespace: insecure-api
59+
appName: insecure-api
60+
containerName: insecure-api
61+
service:
62+
name: insecure-api
63+
port: 8000
64+
targetPort: 8000
65+
replicas: 1
66+
image:
67+
repository: confusedcrib/insecure-api
68+
tag: latest
69+
containerPort: 8000

insecure-java/README.md

Lines changed: 5 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -215,24 +215,7 @@ Copy code
215215
* Implement proper access controls.
216216
* Use HTTPS for secure communication.
217217

218-
---
219-
220-
### **4\. XML External Entities (XXE)**
221-
222-
*Note: This vulnerability is not explicitly implemented in the application but is mentioned here for completeness.*
223-
224-
#### **Description**
225-
226-
XXE attacks exploit vulnerabilities in XML parsers to access or manipulate data.
227-
228-
#### **Mitigation**
229-
230-
* Disable external entity processing in XML parsers.
231-
* Use less complex data formats like JSON.
232-
233-
---
234-
235-
### **5\. Broken Access Control**
218+
### **4\. Broken Access Control**
236219

237220
#### **Description**
238221

@@ -274,7 +257,7 @@ Copy code
274257

275258
---
276259

277-
### **6\. Security Misconfiguration**
260+
### **5\. Security Misconfiguration**
278261

279262
#### **Description**
280263

@@ -320,7 +303,7 @@ Copy code
320303

321304
---
322305

323-
### **7\. Cross-Site Scripting (XSS)**
306+
### **6\. Cross-Site Scripting (XSS)**
324307

325308
#### **Description**
326309

@@ -371,21 +354,6 @@ Copy code
371354

372355
---
373356

374-
### **8\. Insecure Deserialization**
375-
376-
*Note: Not explicitly implemented but included for educational purposes.*
377-
378-
#### **Description**
379-
380-
Insecure deserialization can lead to remote code execution or privilege escalation.
381-
382-
#### **Mitigation**
383-
384-
* Avoid deserializing untrusted data.
385-
* Use secure serialization mechanisms.
386-
387-
---
388-
389357
### **9\. Using Components with Known Vulnerabilities**
390358

391359
#### **Description**
@@ -420,20 +388,7 @@ Copy code
420388

421389
---
422390

423-
### **10\. Insufficient Logging & Monitoring**
424-
425-
#### **Description**
426-
427-
The application lacks proper logging and monitoring, hindering detection of security breaches.
428-
429-
#### **Mitigation**
430-
431-
* Implement comprehensive logging.
432-
* Monitor logs for suspicious activities.
433-
434-
---
435-
436-
### **11\. Insecure Direct Object References (IDOR)**
391+
### **10\. Insecure Direct Object References (IDOR)**
437392

438393
#### **Description**
439394

@@ -481,7 +436,7 @@ Copy code
481436

482437
---
483438

484-
### **12\. Cross-Site Request Forgery (CSRF)**
439+
### **11\. Cross-Site Request Forgery (CSRF)**
485440

486441
#### **Description**
487442

insecure-js/data.db

0 Bytes
Binary file not shown.

0 commit comments

Comments
 (0)