From 2f5af3967d3d097eea9d09bb65ae45af41f4dca4 Mon Sep 17 00:00:00 2001 From: Melek Sabit <32045473+meleksabit@users.noreply.github.com> Date: Mon, 18 Nov 2024 02:07:46 +0200 Subject: [PATCH] feat: add status badge for PR Linter (#24) * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * add sonar-project.properties file + edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * Revert "edit SonarQube workflow" This reverts commit 47207bcb03ed003411c8b5093bd0a38d3491afe9. * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow + add docker-compose file * edit SonarQube workflow + edit docker-compose file * edit SonarQube workflow + edit docker-compose file * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow + edit docker-compose file * edit SonarQube workflow + edit docker-compose file * edit docker-compose file * remove version attribute from the docker-compose.yml * increase seconds in the sleep attribute * edit workflow, docker-compose and Jenkinsfile files + add Dockerfile * improve CodeQL Scan * improve OWASP Dependency Check workflow * edit OWASP Dependency Check workflow * edit OWASP Dependency Check workflow * edit OWASP Dependency Check workflow * edit OWASP Dependency Check workflow * edit OWASP Dependency Check workflow * edit Semgrep SAST workflow * edit Semgrep SAST workflow * edit Semgrep SAST workflow * edit Semgrep SAST workflow * add SonarCloud workflow + add Quality Gate in the Jenkinsfile * edit the SonarCloud workflow * edit the SonarCloud workflow * add badges to the README file * edit Semgrep workflow * edit Semgrep workflow * edit Semgrep workflow * edit Semgrep workflow * edit Semgrep workflow * edit Semgrep workflow * edit Semgrep workflow * edit Semgrep workflow * edit Semgrep workflow * edit Semgrep workflow * edit Semgrep workflow * edit Semgrep workflow * edit README.md * edit README.md * add release badge * edit release badge * edit release badge * add .gitignore file * edit README file * add GitGuardian Scan * add GitGuardian Scan * update README file * add PR Title Linter * add status badge for PR Linter --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 3753f05..6e0c849 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,7 @@ # $\color{LimeGreen}{OWASP\ Mutillidae\ II\ -\ Forked\ and\ enhanced\ to\ showcase\ DevSecOps\ pipelines\}$ -[![JavaScript CodeQL Analysis](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-codeql.yml/badge.svg)](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-codeql.yml) [![Scan Application Code with Semgrep SAST](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-semgrep.yml/badge.svg?branch=development)](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-semgrep.yml) [![Scan with OWASP Dependency Check](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-owasp-dependency-check.yml/badge.svg)](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-owasp-dependency-check.yml) [![SonarCloud Analysis](https://github.com/meleksabit/mutillidae/actions/workflows/sonarcloud.yml/badge.svg)](https://github.com/meleksabit/mutillidae/actions/workflows/sonarcloud.yml) [![Scan PHP code with Snyk Code](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-snyk-code.yml/badge.svg)](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-snyk-code.yml) [![SonarQube Analysis](https://github.com/meleksabit/mutillidae/actions/workflows/sonarqube.yml/badge.svg)](https://github.com/meleksabit/mutillidae/actions/workflows/sonarqube.yml) [![GitHub Release](https://img.shields.io/github/v/release/meleksabit/mutillidae)](https://github.com/meleksabit/mutillidae/releases) +[![JavaScript CodeQL Analysis](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-codeql.yml/badge.svg)](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-codeql.yml) [![Scan Application Code with Semgrep SAST](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-semgrep.yml/badge.svg?branch=development)](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-semgrep.yml) [![Scan with OWASP Dependency Check](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-owasp-dependency-check.yml/badge.svg)](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-owasp-dependency-check.yml) [![SonarCloud Analysis](https://github.com/meleksabit/mutillidae/actions/workflows/sonarcloud.yml/badge.svg)](https://github.com/meleksabit/mutillidae/actions/workflows/sonarcloud.yml) [![Scan PHP code with Snyk Code](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-snyk-code.yml/badge.svg)](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-snyk-code.yml) [![SonarQube Analysis](https://github.com/meleksabit/mutillidae/actions/workflows/sonarqube.yml/badge.svg)](https://github.com/meleksabit/mutillidae/actions/workflows/sonarqube.yml) [![PR Title Check](https://github.com/meleksabit/mutillidae/actions/workflows/pr-title-linter.yml/badge.svg)](https://github.com/meleksabit/mutillidae/actions/workflows/pr-title-linter.yml) [![GitHub Release](https://img.shields.io/github/v/release/meleksabit/mutillidae)](https://github.com/meleksabit/mutillidae/releases) OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application designed for web-security enthusiasts. It serves as a target for learning and practicing web security skills. Mutillidae can be easily installed on Linux and Windows systems using LAMP, WAMP, and XAMMP stacks. Additionally, it comes pre-installed on SamuraiWTF and OWASP BWA, and the existing version can be updated on these platforms. With dozens of vulnerabilities and hints to guide the user, Mutillidae provides an accessible web hacking environment suitable for labs, security enthusiasts, classrooms, CTFs, and vulnerability assessment tool targets. It has been widely used in graduate security courses, corporate web security training, and as an assessment target for vulnerability assessment software. OWASP Mutillidae II provides a comprehensive platform for learning and practicing web security techniques in a controlled environment.