Full Code of tprynn/web-methodology for AI

master ce0cd93ceaf6 cached
2 files
4.0 KB
890 tokens
1 requests
Download .txt
Repository: tprynn/web-methodology
Branch: master
Commit: ce0cd93ceaf6
Files: 2
Total size: 4.0 KB

Directory structure:
gitextract_zarmwzj3/

├── LICENSE.txt
└── README.md

================================================
FILE CONTENTS
================================================

================================================
FILE: LICENSE.txt
================================================
This work is licensed under the Creative Commons Attribution-NonCommercial 2.0
Generic License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc/2.0/
or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042, USA.

Commercial use is welcome in the following scenarios. In all cases you must maintain a link to this repository and include a copy of the license text.

* Using the content without modification for reference or for education and training at your company
* Rehost or adapt the content to perform and track security reviews at your company, as long as you aren't contracting/selling security review services to others

You may not sell this content individually or as part of any commercial training, textbook, reference material, etc. (Just link to it instead)


================================================
FILE: README.md
================================================
[Jump straight to the methodology, hosted in this repo's wiki](https://github.com/tprynn/web-methodology/wiki).

Alternatively, check out the [Google Sheets template for test tracking](https://docs.google.com/spreadsheets/d/1cvBHKoyowHbyrS0sKpjbkrqrSCW0OMk6ld-dr_Id-y0/edit).

# About the methodology

This methodology presents an opinionated guide on how to conduct a web application security assessment. The primary focus is on clearly enumerating all the main areas that a tester should cover during a security review. As a tool, security testers can learn from the document and use it to shape their testing process. It can also be used by developers to understand what types of vulnerabilities may exist in their applications and the best practices they should implement to reduce the risk of attacks.

If you're a beginner, this methodology may be considered more of a reference document rather than a tutorial or introduction. I instead recommend [PortSwigger's Web Security Academy](https://portswigger.net/web-security) and [Eric Rescorla's blog series *Understanding The Web Security Model*](https://educatedguesswork.org/posts/web-security-model-intro1/).

# Goals of the methodology

The goal of this methodology is to be as effective as possible in communicating what issues to test for, why that issue matters, and (where possible) provide recommendations on how to efficiently test for and remediate the issue. The guiding principles I follow when writing the document are:

**Flexibility, Reliability, Usability**: The document should be kept up-to-date and usable across a wide range of different applications. If the methodology focuses too heavily on specific technologies or frameworks, readers won't be sure whether a given issue applies to their situation. It should be usable by less-experienced readers (to provide an introduction to what modern security testing looks like) and highly-experienced readers (to keep them up-to-date and help ensure they achieve full coverage).

**Be Succinct**: The document should be as succinct as possible in explaining each category or issue. Get straight to the heart of the matter and provide high-quality references when needed for more information. Avoid bloating the document with information on any single issue, when one issue is only a small portion of the entire document.

**Be Opinionated**: Don't shy away from clearly stating best practices. Even more importantly, do not attempt to cover every possible security issue - especially when an issue has minimal or no impact in most situations. If an issue has a range of acceptable recommendations, make a secure, widely-applicable suggestion and rely on the reader to adjust the recommendation for their specific context.

Ultimately, no methodology is a substitute for the judgment of an experienced tester who can take into account the context of their specific application. A home-grown embedded HTTP server written in C will have very different vulnerabilities than a Kubernetes microservice using the latest web framework with a React frontend. This document defines a baseline which can be used by anyone interested in improving the security of web applications, and serves as a standard which testers can hold themselves to in order to deliver high-quality results.
Download .txt
gitextract_zarmwzj3/

├── LICENSE.txt
└── README.md
Condensed preview — 2 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (4K chars).
[
  {
    "path": "LICENSE.txt",
    "chars": 822,
    "preview": "This work is licensed under the Creative Commons Attribution-NonCommercial 2.0\nGeneric License. To view a copy of this l"
  },
  {
    "path": "README.md",
    "chars": 3294,
    "preview": "[Jump straight to the methodology, hosted in this repo's wiki](https://github.com/tprynn/web-methodology/wiki).\n\nAlterna"
  }
]

About this extraction

This page contains the full source code of the tprynn/web-methodology GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 2 files (4.0 KB), approximately 890 tokens. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.

Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.

Copied to clipboard!