From e91db43a950eb3fa10cedc4211e1481fbb2c71b5 Mon Sep 17 00:00:00 2001 From: shiftleft-chuck <100888182+shiftleft-chuck@users.noreply.github.com> Date: Tue, 24 May 2022 08:55:32 -0400 Subject: [PATCH] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index b8cb5decd..54d53409a 100644 --- a/README.md +++ b/README.md @@ -1,4 +1,4 @@ -# HelloShiftLeft - Shiftleft-chuck (edit) +# HelloShiftLeft - Shiftleft-chuck (edit 5-24-22 "*=src/main/java") This is a demo application which provides a real world representation of a REST service that uses a mix of convention and configuration to simulate a decent set of vulnerabilities exposed in the code. It includes scenarios such as sensitive data leaking to logs, data secrets leaks, authentication bypass, remote code execution, XSS vulnerabilites etc. The sample sensitive data is a mix of financial data such as account information, medical data of patients, and other PII data such as customer information. HelloShiftLeft also contains patterns/anti-patterns of how data is used/abused in interfaces or channels (to and from HTTP/TCP, third-party, database) that can lead to vulnerabilites. The application is built on the Spring Framework and exposes a series of endpoints and APIs for queries and simulating exploits.