Conversation
Add a standardized pull request template with sections for Goal, Changes, Testing, and Artifacts & Screenshots. Includes a checklist to ensure quality submissions (conventional commits, documentation updates, and no secrets/temporary files).
Complete triage report for OWASP Juice Shop deployment including: - Scope & Asset information (v19.0.0) - Environment details (macOS, Docker 28.3.3) - Deployment verification with health checks - Surface snapshot analysis - Top 3 security risks identified - PR template setup documentation - GitHub community engagement section
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Goal
Complete Lab 2: Threat Modeling with Threagile for OWASP Juice Shop v19.0.0. This PR demonstrates automated threat modeling using Threagile's "threat-model-as-code" approach, comparing baseline vs secure architecture variants to quantify the impact of security controls (HTTPS encryption, transparent storage encryption).
Changes
labs/submission2.mdwith risk analysis, methodology, and security recommendationsTesting
threagile/threagileDocker container for both baseline and secure variantsArtifacts & Screenshots
Generated Reports:
labs/lab2/baseline/report.pdf- Full PDF threat model report (6 pages)labs/lab2/secure/report.pdf- Full PDF threat model report with security controls (6 pages)Diagrams:
labs/lab2/baseline/data-flow-diagram.png(228 KB) - Shows HTTP communication links and trust boundarieslabs/lab2/secure/data-flow-diagram.png(228 KB) - Shows HTTPS communication links with security controlslabs/lab2/baseline/data-asset-diagram.pngandlabs/lab2/secure/data-asset-diagram.pngRisk Analysis:
labs/submission2.md):Risk Category Delta Table:
Key Finding:
Implementing HTTPS and transparent encryption reduced total threat landscape by 3 risks (13%), demonstrating measurable security improvement from basic controls. However, application-level vulnerabilities (XSS, CSRF, SSRF) remain, highlighting need for defense-in-depth.
Checklist
feat:,fix:,docs:)docs: add lab2 submission - threat modeling with Threagilelabs/submission2.mdwith full analysisLab Tasks Completed: