2 |
3 | # 🛡️ Secure Coding Project
4 | (application security)(defensive)
5 |
6 | 
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 | ---
15 |
16 | ## 🚀 `Project Overview`
17 |
18 | Welcome to the **Secure Coding Project**! Our mission is to enhance code security by identifying vulnerabilities and implementing secure coding practices. By contributing to this project, you will gain valuable experience in secure coding techniques and make a positive impact on the security of software applications.
19 |
20 | ---
21 |
22 | ## 📚 `Modules`
23 |
24 | 1. [Server - Client Side](/m1/) ✅ **Done**
25 |
26 | Focus on implementing secure coding practices for server-client architecture. Learn how to securely handle data between server and client, prevent common vulnerabilities, and ensure secure communication.
27 |
28 | 2. [Input Filtration and Input Sanitization (WAF)](/m2/) 📈 **In Progress**
29 |
30 | Learn input sanitization techniques and Web Application Firewall (WAF) implementation to protect against common vulnerabilities by sanitizing user inputs effectively.
31 |
32 | 3. [Authentication & Authorization](/m3/)
33 |
34 | Explore and implement secure authentication mechanisms and authorization permission levels to manage user roles, access control, and protect sensitive operations.
35 |
36 | 4. [Limiting(req and size) (On Application)](/m4/)
37 |
38 | Implement rate limiting techniques to prevent abuse, ensure application stability, and control the rate of incoming requests.
39 |
40 | 5. [Misconfiguration](/m5/)
41 |
42 | Learn about common web misconfigurations that expose vulnerabilities, such as insecure server settings and improper handling of sensitive files (`.env`, `.htaccess.backup`). Avoid information disclosure by securing sensitive information properly.
43 |
44 | 6. [Secure Work Practices (e.g., .env on Server)(Human Errors)](/m6/)
45 |
46 | Implement secure work practices to protect sensitive data such as environment variables, avoid human errors, and mitigate common security pitfalls during development.
47 |
48 | 7. [others(remaining)](/m6/)
49 |
50 | remaining practice and vulnerabilities
51 | ---
52 |
53 | ## `Extra`
54 |
55 | -- [Secure and Reliable Communication](/m10/)
56 |
57 | Establish secure communication channels using encryption, secure protocols, and other relevant techniques to protect data during transmission.
58 |
59 | -- [Secure Full Application](https://github.com/thepwnexperts/secure-app)
60 |
61 | ---
62 |
63 | ## 💪 `How to Contribute`
64 |
65 | Contributing to **Secure Coding** is greatly appreciated! Here's how you can get started:
66 |
67 | 1. Check the existing [Issues](https://github.com/thepwnexperts/secure-coding/issues) or create new ones to propose improvements or report bugs.
68 | 2. Wait for an issue to be assigned to you. Feel free to ask questions or seek clarification.
69 | 3. **Fork** the repository by clicking on the "Fork" button at the top of the page.
70 | 4. **Clone** your forked copy of the project using the following command:
71 |
72 | ```
73 | git clone --depth 1 https://github.com/