You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Added info in the SA/FA, GitHub and Autofix sections. Various other u… (#2)
* Added info in the SA/FA, GitHub and Autofix sections. Various other updates.
* Update readme.md
Fixed minor issues.
Added links
* Fix docs version
* Fix info about pull request made by Aider
* Fix TODO comment
---------
Co-authored-by: ijarosz <105916591+ijarosz@users.noreply.github.com>
Static analysis and flow analysis help you verify code quality and ensure compliance with industry standards, such as CWE or OWASP. Static analysis is a software testing method that examines the source code without executing it to detect errors, vulnerabilities, and violations of coding standards. Flow analysis refers to the examination and evaluation of data or control flow within a program or system to identify potential issues such as resource leaks, dead code, security vulnerabilities, or performance bottlenecks.
19
+
See [Parasoft dotTEST User Guide](https://docs.parasoft.com/display/DOTTEST20252) for details regarding static and flow analysis with dotTEST as well as other dotTEST capabilities.
20
20
21
-
### Run dotTEST GitHub Action
21
+
### Run Parasoft dotTEST GitHub Action
22
22
23
-
TODO: Describe shortly the capabilities of the dotTEST Action
24
-
TODO: Prepare shot yaml example / add link to example
23
+
The `Run Parasoft dotTEST` action enables you to run code analysis with dotTEST and review analysis results directly on GitHub. To launch code analysis with dotTEST, add the `Run Parasoft dotTEST` action to your GitHub workflow. [The example](https://github.com/parasoft/run-dottest-action/blob/master/samples/run-dottest-analyzer-template.yml) illustrates a simple workflow consisting of one job "run-dottest-action".
See [Run dotTEST Action @ GitHub Marketplace](https://github.com/marketplace/actions/run-parasoft-dottest) for details regarding configuration and usage.
26
+
See also [Run dotTEST Action project](https://github.com/parasoft/run-dottest-action).
28
27
29
28
30
-
### Autofix in CI/CD with Aider
29
+
### Autofix in CI/CD Using Aider
31
30
32
-
TODO: Describe shortly what is the Autofix feature
33
-
TODO: Add short yaml script snippet
34
-
TODO: Add link to official documentation describing this feature
31
+
`DottestAutoFix` is a Python-based script that leverages AI-powered code analysis to automatically fix dotTEST violations in your .NET projects, based on a generated analysis report. Once a fix is applied, the plugin validates it using `dottestcli` and then adds a commit to the current branch in your project repository.
32
+
The following example shows a simple Autofix execution:
See [**LINK**](https://docs.parasoft.com/display/DOTTEST20252/Fixing+Violations+Using+AI+Autofix) for details regarding Autofix configuration and usage.
Please note that the Linux image is already built by the pipeline and can be pulled from [here](https://github.com/users/tobyash86/packages?repo_name=WebGoat.NET).
78
85
79
-
##### Linux containers
86
+
##### Linux Containers
80
87
81
88
To run the `webgoat.net` image, execute the following command:
The WebGoat.NET website will be accessible at the URL specified with the `--urls` parameter: http://localhost:5000.
141
148
142
-
#### 3. Run using a script
143
-
The WebGoat.NET project ships with scripts that allow you to conveniently run the web application. The following scripts are located in the "script" directory in the root of the project:
144
-
- runInDocker.bat - Runs the application in a Docker container on Windows.
145
-
- runInDocker.sh - Runs the application in a Docker container on Linux.
146
-
- runLocal.bat - Runs the application locally on Windows.
147
-
- runLocal.sh - Runs the application locally on Linux.
149
+
#### 3. Running the Example Using a Script
150
+
The WebGoat.NET project ships with scripts that allow you to conveniently run the web application. The following scripts are located in the `script` directory at the root of the project:
151
+
- runInDocker.bat - runs the application in a Docker container on Windows.
152
+
- runInDocker.sh - runs the application in a Docker container on Linux.
153
+
- runLocal.bat - runs the application locally on Windows.
154
+
- runLocal.sh - runs the application locally on Linux.
155
+
156
+
### Known Issues:
157
+
158
+
1. The latest OWASP Top 10 is not covered. The missing vulnerabilities need to be added to the codebase.
159
+
2. Educational documents and training materials for any categories of the latest OWASP Top 10 are not available.
160
+
161
+
162
+
148
163
149
-
### Known issues:
150
164
151
-
1. The latest OWASP Top 10 is not covered. The uncovered vulnerabilities need to be added to the code base.
152
-
2. Educational documents/trainings for any categories of the latest OWASP Top 10 are not available.
0 commit comments