遵循以下最佳实践的项目将能够自愿的自我认证,并显示他们已经实现了核心基础设施计划(OpenSSF)徽章。 显示详细资料
[](https://www.bestpractices.dev/projects/1390)
<a href="https://www.bestpractices.dev/projects/1390"><img src="https://www.bestpractices.dev/projects/1390/badge"></a>
The OWASP (Open World Application Security Project) CRS is an open source collection of rules that work with the ModSecurity and compatible WAF (Web Application Firewall). These rules were designed to provide, easy to use, generic attack detection capabilities to your web application as part of a well balanced defence-in-depth solution.
See https://github.com/coreruleset/coreruleset/blob/v4.0/dev/CONTRIBUTING.md.
The project has at least two assigned leaders. See https://github.com/coreruleset/coreruleset/blob/main/CONTRIBUTORS.md#project-co-leads
This project is not about software, so there is no need for architecture or high-level design.
https://github.com/coreruleset/coreruleset/blob/v4.0/dev/INSTALL.md
Documentation explains what is current in each version.
We are already publishing that information in our github: https://github.com/coreruleset/coreruleset
There are no password involved i the project.
We provide documentation and scripts to help in upgrade between major releases.
Use https://github.com/SpiderLabs/owasp-modsecurity-crs/issues
See https://github.com/coreruleset/coreruleset/security/policy#reporting-a-vulnerability. We give credit to all our reporters except when they ask not to.
See See https://github.com/coreruleset/coreruleset/security/policy#reporting-a-vulnerability.
https://github.com/coreruleset/coreruleset/blob/v4.0/dev/CONTRIBUTING.md#general-formatting-guidelines-for-rules-contributions
We have a parser/lexer that tests that we comply with the rules format.
There is no build involved.
We provide simple instructions: https://github.com/coreruleset/coreruleset/blob/v4.0/dev/INSTALL
There is no compilation. Just untarring files should be fine.
We provide developement guidelines and we provide docker containers available to simplify development of the rules.
We have no dependencies.
While the project itself does not depend on ModSecurity, in the testing phase we check that it complies with all our tests. If there are problems, we report what we found in a proper manner.
We don't reuse anything.
There is no usage of deprecated or obsolete functions.
Projects tests are run on each pull request, using github actions. There is a report on success and failed tests. There are also linting checks for all rules.
For each bug detected and fixed via pull request, there are corresponding positive and negative tests.
We use tests from the FTW project: https://github.com/coreruleset/go-ftw
https://github.com/coreruleset/coreruleset/blob/v4.0/dev/CONTRIBUTING.md#writing-tests
There is no compilation, so no warnings can be generated.
Well, this is a security rules project. The idea is that software is not produced.
You can use the project documentation for achieve this.
Releases are signed using GPG. The verification procedure is here: https://github.com/coreruleset/coreruleset/security/policy#verifying-the-crs-release.
Releases are signed using GPG. See https://github.com/coreruleset/coreruleset/security/policy#verifying-the-crs-release.
The project can be configured to protect backend applications that have this problem.
The software is meant to provide an additional layer to protect Web applications. So this is a perfect definition of what the project does.
This project does provide a set of rules only. The design and description for a threat model should be implemented at the engine level.
See https://coreruleset.org/docs/concepts/.
There is no programming language involved. We have a set of linting techniques we manually added to check for discrepancies in the rules, but there is no specific parsing that can give us what is asked here.
There is no programming language involved.
后退