Yes, we could probably end up doing a review, I¹m sure they wouldn¹t mind
:).

On 2/7/16, 2:05 PM, "Christian Folini" <christian.fol...@netnea.com> wrote:

>Good evening,
>
>On Sat, Feb 06, 2016 at 03:53:06PM +0000, Chaim Sanders wrote:
>> This is very helpful, recently I've come to share in some views of the
>>community that libinjection isn't the most well supported/reviewed of
>>all the projects on github. Fortunately compared to many other projects
>>it is quite small from a codebase perspective and as a result the attack
>>surface isn't outrageous, and reviewing it is reasonable. That being
>>said we NEED to continue to including other rules that suppliment
>>libinjection in case of a bypass, which is what we do in v3.0.0-rc1 :)
>
>Chaim, I remember you stating, that you guys might be able to
>help the libinjection project with a code review. Is this
>still an option? I think it would be very helpful and fix a
>sore spot.
>
>The fact that the codebase is of a reasonable size give me
>hope.
>
>Ahoj,
>
>Christian
>
>
>--
>Seek simplicity, and distrust it.
>-- Alfred North Whitehead


________________________________

This transmission may contain information that is privileged, confidential, 
and/or exempt from disclosure under applicable law. If you are not the intended 
recipient, you are hereby notified that any disclosure, copying, distribution, 
or use of the information contained herein (including any reliance thereon) is 
strictly prohibited. If you received this transmission in error, please 
immediately contact the sender and destroy the material in its entirety, 
whether in electronic or hard copy format.
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to