遵循以下最佳实践的项目将能够自愿的自我认证,并显示他们已经实现了核心基础设施计划(OpenSSF)徽章。 显示详细资料
[](https://www.bestpractices.dev/projects/137)
<a href="https://www.bestpractices.dev/projects/137"><img src="https://www.bestpractices.dev/projects/137/badge"></a>
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library that makes it easier for programmers to write lower-risk applications.
See "How can I contribute or help with bug fixes?" section of https://github.com/ESAPI/esapi-java-legacy/blob/develop/README.md
GitHub issues: https://github.com/ESAPI/esapi-java-legacy/issues/
ESAPI can be pulled by Maven from Maven Central simply by referencing it in one's pom.xml. Is there other distribution avenues that you thinkg we should consider such as RPM or .deb packages for Linux, .msi for Windows, etc.?
Again, N/A. See the two previous questions.
Toying with the idea of also adding '-Werror' to terminate compilation if there are any ideas, but need to bounce that idea off the other contributors first before deciding on anything definitive.
We do use HMacSHA1, but according to Bellare, Canetti & Krawczyk (1996), this should still be secure as they showed that HMAC security doesn’t require that the underlying hash function be collision resistant, but only that it acts as a pseudo-random function. (Or at least that was my take away when I read it 10+ years ago. But if I'm wrong, please advise. We wanted an HMAC value that was short as possible, but HMAC-MD5 just didn't feel right.) We also use SecureRandom to generate random #s for things like IVs, etc. which ought to be okay even though it uses SHA1PRNG as its CSRNG.
We use https links whenever they are available.
We are not in control of any of the servers (GitHub, Travis-CI, coveralls.io, etc.) that we avail ourselves of and therefore do not control the TLS configuration. This is even true of the owasp.org site that we use.
See previous question.
See previous 2 questions.
Not sure how that exactly applies to something like ESAPI or other APIs. Please elaborate.
Coverity is being used. I have also ran it through HP Fortify a few times. It has been fully analyzed by the secure code review team where I work, and while I cannot provide details, no vulnerabilities were discovered. I did find 1 or 2 bugs [since reported] as a result of the Fortify scan though.
We use Java.
后退