Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
28 changes: 28 additions & 0 deletions .github/pull_request_template.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
## Goal
<!-- Briefly explain the purpose of this PR. -->

## Changes
<!-- List the main changes introduced in this PR. -->
-
-
-

## Testing
<!-- Describe how you verified your changes. -->
- [ ] Application runs locally
- [ ] Commands executed successfully
- [ ] Documentation reviewed for accuracy

## Artifacts & Screenshots
<!-- Link or embed any relevant artifacts (screenshots, logs, curl output, markdown files). -->
- Screenshots:
-
-

---

### Checklist
- [ ] PR title is clear and descriptive
- [ ] Documentation updated (if applicable)
- [ ] No secrets, credentials, or large temporary files committed

41 changes: 41 additions & 0 deletions labs/submission1.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,41 @@
# Triage Report — OWASP Juice Shop

## Scope & Asset
- Asset: OWASP Juice Shop (local lab instance)
- Image: bkimminich/juice-shop:v19.0.0
- Release link/date: <link> — <date>
- Image digest (optional): <sha256:...>

## Environment
- Host OS: NixOS 26.05 (Yarara) x86_64
- Docker: 29.1.5

## Deployment Details
- Run command used: `docker run -d --name juice-shop -p 127.0.0.1:3000:3000 bkimminich/juice-shop:v19.0.0`
- Access URL: http://127.0.0.1:3000
- Network exposure: 127.0.0.1 only [x] Yes [ ] No

## Health Check
- Page load: ![Page load](./submission1/page-load.png)
- API check: first 5–10 lines from `curl -s http://127.0.0.1:3000/rest/products | head`

## Surface Snapshot (Triage)
- Login/Registration visible: [x] Yes [ ] No — notes: Login is visible under Account button on a page header
- Product listing/search present: [x] Yes [ ] No — notes: Products are displayed
- Admin or account area discoverable: [x] Yes [ ] No
- Client-side errors in console: [ ] Yes [x] No — notes: no errors are leaked
- Security headers (quick look — optional): `curl -I http://127.0.0.1:3000` → CSP/HSTS present? notes: Basic security headers present but missing CSP and HSTS headers

## Risks Observed (Top 3)
1) Missing Content Security Policy (CSP) --
Application lacks CSP headers, making it vulnerable to XSS attacks as there are no restrictions on script sources or inline execution.
2) No HTTP Strict Transport Security (HSTS) --
Absence of HSTS headers leaves the application susceptible to SSL stripping attacks and protocol downgrades.
3) Exposed Admin Interface --
Administrative endpoints are discoverable without proper rate limiting or multi-factor authentication, potentially allowing brute force attacks.


## GitHub Community

Starring repositories helps signal project quality and usefulness, supports maintainers through visible appreciation, and improves discoverability of valuable open-source tools. Following developers makes it easier to track relevant work, learn from others’ approaches, and build professional connections that support effective collaboration and long-term career growth.

Binary file added labs/submission1/page-load.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.