Skip to content

Commit 5c1bf60

Browse files
ivorcandyblundell
andauthored
Link to OWASP SEDATED code secret scanner (#108)
Co-authored-by: andyblundell <[email protected]>
1 parent f77c757 commit 5c1bf60

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

practices/security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ The remainder of this page gives more detailed and specific recommendations to b
7070
- Code should be automatically scanned for secrets or other sensitive data using standalone tools like [GitGuardian](https://www.gitguardian.com/) or [awslabs git-secrets](https://github.com/awslabs/git-secrets) or built in tools in [GitLab](https://docs.gitlab.com/ee/user/application_security/secret_detection/) or [GitHub](https://docs.github.com/en/github/administering-a-repository/about-secret-scanning).
7171
- Review the configuration of whichever tools you use, for example [awslabs git-secrets](https://github.com/awslabs/git-secrets) does not scan for IP addresses by default, but you can change that by adding more regex expressions
7272
- TO DO: add config to register regex for IP4 and IP6
73-
- Ideally, run a tool like [awslabs git-secrets](https://github.com/awslabs/git-secrets) locally on developer laptops (to catch secrets at source) with a backstop of a centralised tool such as [GitHub](https://docs.github.com/en/github/administering-a-repository/about-secret-scanning)
73+
- Ideally, run a tool like [OWASP SEDATED](https://github.com/OWASP/SEDATED) or [awslabs git-secrets](https://github.com/awslabs/git-secrets) locally on developer laptops (to catch secrets at source) with a backstop of a centralised tool such as [GitHub](https://docs.github.com/en/github/administering-a-repository/about-secret-scanning)
7474
- Be wary of any 3rd party JavaScript included on the page, e.g. for A/B testing, analytics
7575
- Pin dependencies at known versions to avoid unexpected updates
7676
- Scan dependencies for vulnerabilities, e.g. using [OWASP Dependency Check](https://www.owasp.org/index.php/OWASP_Dependency_Check) or [Snyk](https://snyk.io/)

0 commit comments

Comments
 (0)