Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/yammesicka/vulnerable-example
https://github.com/yammesicka/vulnerable-example
Last synced: about 4 hours ago
JSON representation
- Host: GitHub
- URL: https://github.com/yammesicka/vulnerable-example
- Owner: yammesicka
- License: mit
- Created: 2023-08-22T23:54:58.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2023-08-24T10:40:00.000Z (over 1 year ago)
- Last Synced: 2024-12-30T03:59:30.649Z (8 days ago)
- Language: Python
- Size: 17.6 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE.md
Awesome Lists containing this project
README
# Secure Coding Practices Demo
## ⚠️ Warning: Do Not Use in Production
This project intentionally includes vulnerable code for educational purposes.It is not suitable for production use, as it exposes security risks.
## Overview
This project is designed to educate developers on common web vulnerabilities by providing both vulnerable and secure coding examples.
By exploring and interacting with this Flask application, users can gain insight into SQL injection, Cross-Site Scripting (XSS), secure user authentication, input validation, and more.
## Getting Started
### Prerequisites
- Python 3
- Flask### Installation
1. Clone the repository.
2. Install Flask: `pip install flask`
3. Run the Flask application: `flask run`### Usage
- Visit `http://localhost:5000` to access the login page.
- Register a new account or log in with existing credentials.
- Explore the dashboard, add points, and view the leaderboard.## Contributing
Feel free to fork the project, make changes, and submit pull requests. Contributions that enhance the educational value of the project are especially welcome.
## License
This project is licensed under the MIT License - see the [LICENSE.md](LICENSE.md) file for details.