Dom,

    I've merged your changes into threading2 [0] and made use of the
high-level function in the xss.py plugin [1]. All looks good :)

    Now that you've got the base CSP parsing ready, do you want to
continue and write the grep plugin that reports insecure CSP policies
around it?

[0] https://sourceforge.net/apps/trac/w3af/changeset/6648
[1] https://sourceforge.net/apps/trac/w3af/changeset/6649

Regards,

On Sun, Jan 13, 2013 at 7:43 AM, Dominique RIGHETTO
<dominique.righe...@gmail.com> wrote:
> Hi,
>
> Function to check if a site is protected against XSS vulns implemented,
> dedicated test cases also implemented.[0]
>
> See commit: a6c06a1fe0f7d6ee8241a7dfe05a7eed96078633 [1]
>
> UT successfully executed against revision "6647" of "Threading2" branch.
>
> [0]
> https://github.com/righettod/w3af-contribs/issues/2#issuecomment-12192049
> [1]
> https://github.com/righettod/w3af-contribs/commit/a6c06a1fe0f7d6ee8241a7dfe05a7eed96078633
>
>
> --
> Cordialement, Best regards,
> Dominique Righetto
> dominique.righe...@gmail.com
> dominique.righe...@owasp.org
> Twitter: @righettod
> GPG: 0xC34A4565323D19BA
> http://righettod.github.com
> "No trees were killed to send this message, but a large number of electrons
> were terribly inconvenienced."



-- 
Andrés Riancho
Project Leader at w3af - http://w3af.org/
Web Application Attack and Audit Framework
Twitter: @w3af
GPG: 0x93C344F3

------------------------------------------------------------------------------
Master HTML5, CSS3, ASP.NET, MVC, AJAX, Knockout.js, Web API and
much more. Get web development skills now with LearnDevNow -
350+ hours of step-by-step video tutorials by Microsoft MVPs and experts.
SALE $99.99 this month only -- learn more at:
http://p.sf.net/sfu/learnmore_122812
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to