mirror of
https://github.com/redhat-developer/odo.git
synced 2025-10-19 03:06:19 +03:00
770 B
770 B
ODO Threat Model
The Threat model was developed using the OWASP Threat Dragon tool.
There are two installation variants of the OWASP Threat Dragon, a web application and a desktop application. Follow the link for installation instructions. The OWASP Threat dragon saves the threat model as a json file. The odo threat model is defined in the odo-model.json file
OWASP Top Ten
The OWASP Org, provides a list of the Top Ten application security risks. Read through them to undestand each of the risks, how to prevent them along with some examples.