Project Name | Railsgoat |
---|---|
Lines of code analyzed | 20,272 |
On Coverity Scan since | Oct 08, 2019 |
Last build analyzed | a while ago |
Language | PHP/Python/Ruby |
Repository URL | git://[email protected]:OWASP/railsgoat.git |
Homepage URL | N/A |
License | MIT (MIT license ) |
Want to view defects or help fix defects?
Add me to projectVersion: version\ 3
Note: Defect density is measured by the number of defects per 1,000 lines of code.
ID | CWE-Name | Number of Defects |
---|---|---|
22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | 1 |
78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | 1 |
79 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | 2 |
89 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | 2 |
Coverity Scan tests every line of code and potential execution path. The root cause of each defect is clearly explained, making it easy to fix bugs.
Would you like to view the project defects, or help improve its quality by fixing defects?
Add me to project