Skip to content
This repository was archived by the owner on Oct 14, 2020. It is now read-only.

Commit 6cb163b

Browse files
authored
Merge pull request #1 from secureCodeBox/spellfix
Spellfix
2 parents 80b4609 + c68c7c9 commit 6cb163b

File tree

1 file changed

+10
-4
lines changed

1 file changed

+10
-4
lines changed

README.md

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,11 +16,17 @@
1616

1717
<!-- toc -->
1818

19+
- [Overview](#overview)
1920
- [Purpose of this Project](#purpose-of-this-project)
2021
- [Quickstart](#quickstart)
21-
- [How Does it Work?](#how-does-it-work)
22+
- [Prerequisites](#prerequisites)
23+
- [Deployment](#deployment)
24+
- [How does it work?](#how-does-it-work)
2225
- [Architecture](#architecture)
23-
- [Roadmap](#roadmap)
26+
- [License](#license)
27+
- [Community](#community)
28+
- [Contributing](#contributing)
29+
- [Author Information](#author-information)
2430

2531
For additional documentation aspects please have a look at our:
2632

@@ -34,7 +40,7 @@ For additional documentation aspects please have a look at our:
3440
The typical way to ensure application security is to hire a security specialist (aka penetration tester) at some point in your project to check the application for security bugs and vulnerabilities. Usually, this check is done at a later stage of the project and has two major drawbacks:
3541

3642
1. Nowadays, a lot of projects do continuous delivery, which means the developers deploy new versions multiple times each day. The penetration tester is only able to check a single snapshot, but some further commits could introduce new security issues. To ensure ongoing application security, the penetration tester should also continuously test the application. Unfortunately, such an approach is rarely financially feasible.
37-
2. Due to a typically time boxed analysis, the penetration tester has to focus on trivial security issues (low-hangig fruits) and therefore will not address the serious, non-obvious ones.
43+
2. Due to a typically time boxed analysis, the penetration tester has to focus on trivial security issues (low-hanging fruits) and therefore will not address the serious, non-obvious ones.
3844

3945
With the _secureCodeBox_ we provide a toolchain for continuous scanning of applications to find the low-hanging fruit issues early in the development process and free the resources of the penetration tester to concentrate on the major security issues.
4046

@@ -72,7 +78,7 @@ helm install zap ./integrations/zap/
7278
# Now everything is installed. You can try deploying scans from the `operator/config/samples/` directory
7379

7480
# E.g. www.securecodebox.io sslyze scan
75-
kubectl apply apply -f operator/config/samples/execution_v1_scan/sslyze_securecodebox_io.yaml
81+
kubectl apply -f operator/config/samples/execution_v1_scan/sslyze_securecodebox_io.yaml
7682
# Then get the current State of the Scan by running:
7783
kubectl get scans
7884
```

0 commit comments

Comments
 (0)