遵循以下最佳实践的项目将能够自愿的自我认证,并显示他们已经实现了核心基础设施计划(OpenSSF)徽章。 显示详细资料
[](https://www.bestpractices.dev/projects/2514)
<a href="https://www.bestpractices.dev/projects/2514"><img src="https://www.bestpractices.dev/projects/2514/badge"></a>
A static analysis security vulnerability scanner for Ruby on Rails applications (OSS fork of Brakeman)
Repository on GitHub, which uses git. git is distributed.
rake is the usual way to invoke such checks.
rake
警告:需要URL,但找不到URL。
When a commit is sent to GitHub, we invoke a Travis build that invokes our automated tests and our static analysis tool (Rubocop).
Found all required security hardening headers. // X-Content-Type-Options was not set to "nosniff".
This criterion may be met, but since we aren't certain we're not claiming that it is met.
We use an automated test suite, and that suite has over 90% statement coverage. However, we don't know its branch coverage, so we don't know if we've achieved it.
警告:需要更长的理由。
后退