Skip to content

Commit 3e8ffd8

Browse files
Add references to labs for XSS and hardcoded credentials
These are new labs. Make sure the labs are posted before the links to them are added :-). Signed-off-by: David A. Wheeler <[email protected]>
1 parent b3bdbbe commit 3e8ffd8

File tree

1 file changed

+12
-0
lines changed

1 file changed

+12
-0
lines changed

secure_software_development_fundamentals.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2246,6 +2246,12 @@ For outbound authentication, credentials should be stored outside the code in a
22462246

22472247
🔔 Hardcoded credentials are such a common cause of security vulnerabilities that they are 2021 CWE Top 25 #16 and 2019 CWE Top 25 #19. This weakness is [CWE-798](https://cwe.mitre.org/data/definitions/798.html), *Use of Hard-coded Credentials*. The related *Insufficiently Protected Credentials* is 2021 CWE Top 25 #21 and 2019 CWE Top 25 #27 as [CWE-522](https://cwe.mitre.org/data/definitions/522.html).
22482248

2249+
##### Lab: Hardcoded credentials
2250+
2251+
🧪 **Lab: Please try lab [hardcoded](https://best.openssf.org/labs/hardcoded.html), which lets you experiment with how to eliminate hardcoded credentials as a vulnerability.**
2252+
2253+
*Labs are optional, but you're strongly encouraged to try them!*
2254+
22492255
#### Quiz 2.2: Avoid Default & Hardcoded Credentials
22502256

22512257
\>\>Secret keys should be stored in source code so that they cannot be easily read, as they could be if they were stored in separate files. True or False?<<
@@ -3544,6 +3550,12 @@ A very mild hardening measure is to set the attribute **HttpOnly** on cookies. T
35443550

35453551
XSS is usually best countered by choosing a framework or library that automatically escapes output for you. However, programs often have many outputs. It would be best if we paired this solution with something else that limited the damage when a mistake *is* made. On the web there is a solution: the Content Security Policy (CSP). The next unit will discuss this.
35463552

3553+
#### Lab: Cross-Site Scripting (XSS)
3554+
3555+
🧪 **Lab: Please try lab [xss](https://best.openssf.org/labs/xss.html), which lets you experiment with how to counter cross-site scripting (XSS) vulnerabilitiesies.**
3556+
3557+
*Labs are optional, but you're strongly encouraged to try them!*
3558+
35473559
#### Quiz 4.2: Countering Cross-Site Scripting (XSS)
35483560

35493561
\>\>Choosing a framework or library that automatically escapes HTML output is often one of the best ways to counter XSS attacks. True or False?<<

0 commit comments

Comments
 (0)