Created
January 5, 2026 14:36
-
-
Save jasnow/05d6005dd0c976921b05ec5d6efefd25 to your computer and use it in GitHub Desktop.
Old format for Railsgoat test run 09:34am
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Randomized with seed 20533 | |
| .....**********..**** | |
| Pending: (Failures listed here are expected and do not affect your suite's status) | |
| 1) password complexity one | |
| Tutorial: https://github.com/OWASP/railsgoat/wiki/A2-Lack-of-Password-Complexity | |
| # No reason given | |
| # ./spec/vulnerabilities/password_complexity_spec.rb:13 | |
| 2) sql injection attack | |
| Tutorial: https://github.com/OWASP/railsgoat/wiki/R5-A1-SQL-Injection-Concatentation | |
| # No reason given | |
| # ./spec/vulnerabilities/sql_injection_spec.rb:14 | |
| 3) insecure direct object reference attack one | |
| # No reason given | |
| # ./spec/vulnerabilities/insecure_dor_spec.rb:14 | |
| 4) insecure direct object reference attack two | |
| Tutorial: https://github.com/OWASP/railsgoat/wiki/A4-Insecure-Direct-Object-Reference | |
| # No reason given | |
| # ./spec/vulnerabilities/insecure_dor_spec.rb:25 | |
| 5) broken_auth two | |
| Tutorial: https://github.com/OWASP/railsgoat/wiki/A2-Credential-Enumeration | |
| # No reason given | |
| # ./spec/vulnerabilities/broken_auth_spec.rb:29 | |
| 6) broken_auth one | |
| Tutorial: https://github.com/OWASP/railsgoat/wiki/A2-Credential-Enumeration | |
| # No reason given | |
| # ./spec/vulnerabilities/broken_auth_spec.rb:14 | |
| 7) command injection attack | |
| Tutorial: https://github.com/OWASP/railsgoat/wiki/A1-Command-Injection | |
| # No reason given | |
| # ./spec/vulnerabilities/command_injection_spec.rb:14 | |
| 8) mass assignment attack two, Tutorial: https://github.com/OWASP/railsgoat/wiki/R5-Extras-Mass-Assignment-Admin-Role | |
| # No reason given | |
| # ./spec/vulnerabilities/mass_assignment_spec.rb:27 | |
| 9) mass assignment attack one | |
| # No reason given | |
| # ./spec/vulnerabilities/mass_assignment_spec.rb:13 | |
| 10) xss attack | |
| Tutorial: https://github.com/OWASP/railsgoat/wiki/A3-Cross-Site-Scripting | |
| # No reason given | |
| # ./spec/vulnerabilities/xss_spec.rb:14 | |
| 11) improper password hashing with just md5 | |
| Tutorial: https://github.com/OWASP/railsgoat/wiki/A6-Sensitive-Data-Exposure-Insecure-Password-Storage | |
| # No reason given | |
| # ./spec/vulnerabilities/password_hashing_spec.rb:13 | |
| 12) unvalidated redirect attack | |
| Tutorial: https://github.com/OWASP/railsgoat/wiki/A10-Unvalidated-Redirects-and-Forwards-(redirect_to) | |
| # No reason given | |
| # ./spec/vulnerabilities/unvalidated_redirects_spec.rb:14 | |
| 13) csrf attack | |
| Tutorial: https://github.com/OWASP/railsgoat/wiki/R5-A8-CSRF | |
| # No reason given | |
| # ./spec/vulnerabilities/csrf_spec.rb:14 | |
| 14) url access attack | |
| Tutorial: https://github.com/OWASP/railsgoat/wiki/A7-Missing-Function-Level-Access-Control--(Admin-Controller) | |
| # No reason given | |
| # ./spec/vulnerabilities/url_access_spec.rb:14 | |
| Finished in 2.71 seconds (files took 5.09 seconds to load) | |
| 21 examples, 0 failures, 14 pending | |
| Randomized with seed 20533 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment