From aef7309470c40eb9f89bbfb9e759c6a4226f43cf Mon Sep 17 00:00:00 2001 From: robwlundy <83795676+robwlundy@users.noreply.github.com> Date: Tue, 25 Jan 2022 15:11:36 -0500 Subject: [PATCH] Update README.md --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 694690e97..f7fd537e0 100644 --- a/README.md +++ b/README.md @@ -1,5 +1,6 @@ # HelloShiftLeft + This is a demo application which provides a real world representation of a REST service that uses a mix of convention and configuration to simulate a decent set of vulnerabilities exposed in the code. It includes scenarios such as sensitive data leaking to logs, data secrets leaks, authentication bypass, remote code execution, XSS vulnerabilites etc. The sample sensitive data is a mix of financial data such as account information, medical data of patients, and other PII data such as customer information. HelloShiftLeft also contains patterns/anti-patterns of how data is used/abused in interfaces or channels (to and from HTTP/TCP, third-party, database) that can lead to vulnerabilites. The application is built on the Spring Framework and exposes a series of endpoints and APIs for queries and simulating exploits. ## Build