OWASP Testability Patterns for Web Applications
OWASP Testability Patterns for Web Applications
The OWASP Testability Patterns project intends to create a community to re-design the classical secure development life-cycle around the concept of Testability Patterns, providing new tools for Web and AI/ML developers, managers, and security teams. In summary, the project aims to:
- Curate a catalog of testability patterns for security testing tools (i.e., a security testing tool benchmark).
- Create a framework that can automatically identify testability patterns in programs, and can run the patterns’ benchmark against testing tools.
What is a Testability Pattern?
Testability Patterns (TPs) are problematic code instructions that affect the capability of security testing tools. Due to TPs, security testing tools may miss vulnerabilities, or conversely, report a false alarm. This project intends to create a catalog of testability patterns.
TP-Catalogs: Testability Patterns Catalog
This repository includes the catalogs of testability patterns. Currently, the project focuses on testability patterns affecting static analysis security testing tools (SAST) and it supports the following programming languages:
The repository is available at: https://github.com/testable-eu/sast-testability-patterns.
TP-Framework: Testability Pattern Framework for SAST
TP-Framework relies on testability patterns to reduce false positive/negative rate in SAST analysis over supported programming languages. TP-Framework enables operations such as:
- Measurement of SAST tools against a catalog of testability patterns
- Discovery of testability patterns within application source code
These features can enable for example the following types of user experiences:
- Measuring the occurrences of the TPs in codebases
- Remediating the TPs in codebases
- Measuring the most effective SAST tool to be used in the SDLC pipeline
- SAST Tools Developers:
- Measuring the effective coverage and performance of their tools
- Discovering the problematic TPs and improve the tool engine to correctly handle the TPs
Future works include the possibility to enable patterns’ transformations directly from the framework in ordet to improve the testability of the SAST scanned application.
The repository is available at: https://github.com/testable-eu/sast-tp-framework
How you can contribute?
You can join our nascent community and help the project in different ways:
- Found a code snippet affecting a SAST tool? Join and contribute to our catalog.
- Want to test your SAST tools against our catalog? Extend TP-Framework to support your tool.
Contribution guidelines are here.
The OWASP project aims to deliver tools and methodologies for:
- Managers: New metric quantifying the security and privacy risks of a program.
- Developers: Better and flexible tools to improve testability, reducing security and privacy risk exposure.
- Security teams: Better and more flexible security, privacy testing, and AI/ML tools.
More secure web applications with privacy incorporated
The application of standard business practices to building software applications is advancing rapidly to meet the evolving needs of web-based application software powered by artificial intelligence (AI). The EU-funded TESTABLE project proposes a software development lifecycle (SDLC) that combines two metrics to quantify the security and privacy risks of a program: the code testability and vulnerable behaviour indicators. TESTABLE will empower software/AI developers, managers, testers, and auditors to reduce the risk by building better security and privacy testing techniques for web applications and removing or mitigating the impact of the patterns causing the high-risk levels. It will develop algorithms, techniques, and tools to analyse, test, and study web applications.
- June 2022: OWASP Project created
- February 2023:
- OWASP Project kickstart @ OWASP AppSec EU
- Open Source release of the main project repositories
- September 2023:
- September 2024: Release of the TESTABLE Standard Document
- Later 2024: Active and self sustained community
Next Talk: OWASP AppSec Dublin 16th February
Luca Compagna will talk about the project at the next OWASP AppSec Dublin
When: Thursday February 16, 2023 10:30am - 11:30am GMT
Where: Liffey Meeting Room 2
To see the complete list of publications, please visit https://testable.eu/publications/.
- Technical University of Braunschweig
- SAP SE
- IMQ Minded Security
- Pluribus One
This project received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 101019206.
Put whatever you like here: news, screenshots, features, supporters, or remove this file and don’t use tabs at all.
CISPA - HELMHOLTZ-ZENTRUM FUR INFORMATIONSSICHERHEIT GGMBH
TECHNISCHE UNIVERSITAET BRAUNSCHWEIG, Germany
UNIVERSIDAD CARLOS III DE MADRID, Spain
SAP SE, Germany
SHIFTLEFT GMBH, Germany
IMQ MINDED SECURITY SRL, Italy
NORTONLIFELOCK FRANCE, France
NORTONLIFELOCK IRELAND LIMITED, Ireland
PLURIBUS ONE SRL, Italy