diff --git a/src/webapp01/Pages/DevSecOps7.cshtml b/src/webapp01/Pages/DevSecOps7.cshtml new file mode 100644 index 0000000..01b6dba --- /dev/null +++ b/src/webapp01/Pages/DevSecOps7.cshtml @@ -0,0 +1,181 @@ +@page +@model DevSecOps7Model +@{ + ViewData["Title"] = "DevSecOps 7 - GitHub Advanced Security"; +} + +
Explore the cutting-edge features and capabilities of GitHub Advanced Security (GHAS)
+@newsItem
+ Updated: @DateTime.Now.ToString("MMM dd, yyyy") +No news available at this time.
+ } +Automated vulnerability detection using CodeQL semantic analysis engine.
+ +Detect and prevent secrets from being committed to repositories.
+Understand security impact of dependency changes in pull requests.
+ +Organization-wide security posture visibility and compliance tracking.
++ This page contains intentionally vulnerable code for demonstration purposes. + These vulnerabilities should be detected by GHAS code scanning. +
+ + + ++ Enable GitHub Advanced Security on your repositories to automatically detect the + security vulnerabilities demonstrated in this page's source code. GHAS will identify + issues like hardcoded credentials, vulnerable regex patterns, and potential log injection attacks. +
++ Learn more about implementing a comprehensive DevSecOps strategy with + GitHub Advanced Security. +
+Learn about building Web apps with ASP.NET Core.
Visit our About GHAS page to learn about GitHub Advanced Security features.
- New! Check out our DevSecOps Demo + New! Check out our DevSecOps7 Demo page to see the latest GHAS features and security demonstrations.
diff --git a/src/webapp01/webapp01.csproj b/src/webapp01/webapp01.csproj index 9b11105..f3e9796 100644 --- a/src/webapp01/webapp01.csproj +++ b/src/webapp01/webapp01.csproj @@ -13,7 +13,7 @@