Skip to content

Commit e7064f6

Browse files
authored
Merge pull request #1 from devsecopsmaturitymodel/fix/contextualized
fix: Contextualized encoding uuid
2 parents af550d3 + 0e5e572 commit e7064f6

File tree

1 file changed

+4
-7
lines changed

1 file changed

+4
-7
lines changed

src/assets/YAML/default/Implementation/ApplicationHardening.yaml

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -52,10 +52,10 @@ Implementation:
5252
isImplemented: false
5353
comments: ""
5454
Contextualized Encoding:
55-
identifier: e1f37abb-d848-4a3a-b3df-65e91a89dcb7
56-
hazard:
55+
uuid: e1f37abb-d848-4a3a-b3df-65e91a89dcb7
56+
risk:
5757
The generation of interpreter directives from user-provided data poses difficulties and can introduce vulnerabilities to injection attacks.
58-
remediation: |
58+
measure: |
5959
Implementing contextualized encoding, such as employing object-relational mapping tools or utilizing prepared statements, nearly removes the threat of injection vulnerabilities.
6060
difficultyOfImplementation:
6161
knowledge: 2
@@ -65,10 +65,7 @@ Implementation:
6565
level: 1
6666
description: |
6767
Bear in mind that utilizing frameworks is a recommended approach; however, they can develop known security weaknesses over time. Diligent and regular patching is crucial.
68-
implementation:
69-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-asvs
70-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-masvs
71-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/apimaturity
68+
implementation: []
7269
references:
7370
samm2:
7471
- D-SR-1-A

0 commit comments

Comments
 (0)