
Web Security Audit sγur Francesco De Stefano
Passively audits the security posture on current page
Ilaq-ak·am Firefox i useqdec n usiɣzef-a
Asiɣzef aɣefisefka
Tuṭṭfiwin n wegdil


Ɣef usiɣzef agi
The goal of this project is to build an add-on for browser that passively audits the security posture of the websites that the user is visiting. Assume that the tool is to be used on non-malicious websites, currently not under attack or compromised. Add-on wants to report security misconfigurations, or failure to use best security practices.
- Add-on tries to analysis the commonly vulnerable setting of servers: lack of use of security-relevant headers, including:
- strict-transport-security
- x-xss-protection
- content-security-policy
- x-frame-options
- x-content-type-options
- It doesn't to interfere with the functioning of the visited website.
- It doesn't tamper with request parameters, or issue requests that were not initiated by the user (it is not active scanning).
- Incrementally generate a report in a separate window.
- Each report entry have a numeric score to indicate approximately its severity, as a way to prioritise further investigation by a human analyst [Common Vulnerability Scoring System](https://en.wikipedia.org/wiki/Common_Vulnerability_Scoring_System).
### Limitations
- Add-on only works on sites that allow content scripts.
- Add-on tries to analysis the commonly vulnerable setting of servers: lack of use of security-relevant headers, including:
- strict-transport-security
- x-xss-protection
- content-security-policy
- x-frame-options
- x-content-type-options
- It doesn't to interfere with the functioning of the visited website.
- It doesn't tamper with request parameters, or issue requests that were not initiated by the user (it is not active scanning).
- Incrementally generate a report in a separate window.
- Each report entry have a numeric score to indicate approximately its severity, as a way to prioritise further investigation by a human analyst [Common Vulnerability Scoring System](https://en.wikipedia.org/wiki/Common_Vulnerability_Scoring_System).
### Limitations
- Add-on only works on sites that allow content scripts.
Sezmel tarmit-ik
Mudd afus i uneflay-agi
Aneflay n usiɣzef-agi isutur-ak-d tallelt akken ad iseddu taneflit ines ticki tmuddeḍ-as cwiṭ n tewsa.
TisiragIssin ugar
Azegrir-a yesra:
- Kcem ɣer isefka-inek deg ismal web meṛṛa
Ugar n telɣut
- TigIseɣwan n uzegrir
- Lqem
- 1.0
- Teɣzi
- 24,75 KB
- Aleqqem aneggaru
- prije 5 godina (13. velj. 2020)
- Taggayin i ilan assaɣ
- Turagt
- Turagt tazayezt n Mozilla 2.0
- Amazray n Lqem
Rnu ar tegrumma
Ugar n isiɣzaf sɣur Francesco De Stefano
- Ulac tazmilt akka tura
- Ulac tazmilt akka tura
- Ulac tazmilt akka tura
- Ulac tazmilt akka tura
- Ulac tazmilt akka tura
- Ulac tazmilt akka tura