Skip to content

Commit e540b67

Browse files
authored
fix duplicate links reported in build
2 parents d90dc6f + 7e9c334 commit e540b67

File tree

14 files changed

+47
-47
lines changed

14 files changed

+47
-47
lines changed

draft/04-foundations/02-secure-development.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -148,7 +148,7 @@ There are many OWASP tools and resources to help build security into the SDLC.
148148

149149
#### OWASP training projects
150150

151-
* [API Security Project][api-security] (API Top 10)
151+
* [API Security Project][apisec] (API Top 10)
152152
* [Juice Shop][juice]
153153
* [Mobile Top 10][mobile10]
154154
* [Security Shepherd][sec-shep]
@@ -174,7 +174,7 @@ The OWASP Developer Guide is a community effort; if there is something that need
174174
then [submit an issue][issue0402] or [edit on GitHub][edit0402].
175175

176176
[amass]: https://owasp.org/www-project-amass/
177-
[api-security]: https://owasp.org/www-project-api-security/
177+
[apisec]: https://owasp.org/API-Security
178178
[asvs]: https://owasp.org/www-project-application-security-verification-standard/
179179
[cheatproject]: https://owasp.org/www-project-cheat-sheets/
180180
[cornucopia]: https://owasp.org/www-project-cornucopia/

draft/04-foundations/05-top-ten.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -164,7 +164,7 @@ This is a new category introduced in 2021 with a single (for now) [Cheat Sheet][
164164
There are various 'Top 10' projects created by OWASP that, depending on the context,
165165
may also be referred to as 'OWASP Top 10'. Here is a list of the stable 'OWASP Top 10' projects:
166166

167-
* [API Security Top 10][api-security]
167+
* [API Security Top 10][apisec]
168168
* [Data Security Top 10][data10]
169169
* [Low-Code/No-Code Top 10][lcnc10]
170170
* [Mobile Top 10][mobile10]
@@ -201,7 +201,7 @@ then [submit an issue][issue0405] or [edit on GitHub][edit0405].
201201
[a09cs]: https://cheatsheetseries.owasp.org/IndexTopTen.html#a092021-security-logging-and-monitoring-failures
202202
[a10]: https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/
203203
[a10cs]: https://cheatsheetseries.owasp.org/IndexTopTen.html#a102021-server-side-request-forgery-ssrf
204-
[api-security]: https://owasp.org/www-project-api-security/
204+
[apisec]: https://owasp.org/API-Security
205205
[cicd10]: https://owasp.org/www-project-top-10-ci-cd-security-risks/
206206
[cwe284]: https://cwe.mitre.org/data/definitions/284.html
207207
[data10]: https://owasp.org/www-project-data-security-top-10/

draft/06-design/00-toc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ The OWASP Developer Guide is a community effort; if there is something that need
7575
[sammd]: https://owaspsamm.org/model/design/
7676
[sammdsr]: https://owaspsamm.org/model/design/security-requirements/
7777
[sammdsa]: https://owaspsamm.org/model/design/security-architecture/
78-
[sammdta]: https://owaspsamm.org/model/design/threat-assessment
78+
[sammdta]: https://owaspsamm.org/model/design/threat-assessment/
7979
[spdcs]: https://cheatsheetseries.owasp.org/cheatsheets/Secure_Product_Design_Cheat_Sheet.html
8080

8181
\newpage

draft/06-design/01-threat-modeling/01-threat-modeling.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -264,7 +264,7 @@ then [submit an issue][issue060101] or [edit on GitHub][edit060101].
264264
[eop]: https://shostack.org/games/elevation-of-privilege
265265
[edit060101]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/06-design/01-threat-modeling/01-threat-modeling.md
266266
[issue060101]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=enhancement&template=request.md&title=Update:%2006-design/01-threat-modeling/01-threat-modeling
267-
[linddun]: https://www.linddun.org/
267+
[linddun]: https://linddun.org/
268268
[nist-cvss]: https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
269269
[otm]: https://owasp.org/www-project-threat-model/
270270
[pasta]: https://versprite.com/blog/what-is-pasta-threat-modeling/

draft/06-design/toc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,5 +78,5 @@ then [submit an issue][issue0600] or [edit on GitHub][edit0600].
7878
[sammd]: https://owaspsamm.org/model/design/
7979
[sammdsr]: https://owaspsamm.org/model/design/security-requirements/
8080
[sammdsa]: https://owaspsamm.org/model/design/security-architecture/
81-
[sammdta]: https://owaspsamm.org/model/design/threat-assessment
81+
[sammdta]: https://owaspsamm.org/model/design/threat-assessment/
8282
[spdcs]: https://cheatsheetseries.owasp.org/cheatsheets/Secure_Product_Design_Cheat_Sheet.html

draft/07-implementation/03-secure-libraries/01-esapi.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ The OWASP Developer Guide is a community effort; if there is something that need
5959
then [submit an issue][issue070301] or [edit on GitHub][edit070301].
6060

6161
[bean]: http://beanvalidation.org/
62-
[csrfguard]: https://owasp.org/www-project-csrfguard
62+
[csrfguard]: https://owasp.org/www-project-csrfguard/
6363
[edit070301]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/07-implementation/03-secure-libraries/01-esapi.md
6464
[esapi-docs]: https://www.javadoc.io/doc/org.owasp.esapi/esapi/latest/index.html
6565
[esapi-java]: https://mvnrepository.com/artifact/org.owasp.esapi/esapi

draft/09-training-education/07-api-top-ten.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -14,11 +14,11 @@ permalink: /draft/training_education/api_top_ten/
1414

1515
### 7.7 API Top 10
1616

17-
The OWASP [API Security Project][api-security] (API Top 10) explains strategies and solutions to help the understanding
17+
The OWASP [API Security Project][apisec] (API Top 10) explains strategies and solutions to help the understanding
1818
and mitigation of the unique vulnerabilities and security risks of Application Programming Interfaces (APIs).
1919

20-
The [API Top 10][api-security-project] is an OWASP Laboratory Project
21-
which is accessed as a [web based document][api-security-doc].
20+
The [API Top 10][apisec-project] is an OWASP Laboratory Project
21+
which is accessed as a [web based document][apisec-doc].
2222

2323
#### What is the API Top 10?
2424

@@ -41,7 +41,7 @@ as well as a documentation portal for best practices when creating or assessing
4141
#### Why use it?
4242

4343
Most software projects use APIs in some form or another.
44-
Developers and security engineers should be encouraged to refer to the [API Security Project][api-security]
44+
Developers and security engineers should be encouraged to refer to the [API Security Top 10][apisec]
4545
to assist them when acting as security builders, breakers, and defenders for an organization.
4646

4747
----
@@ -59,9 +59,9 @@ then [submit an issue][issue0907] or [edit on GitHub][edit0907].
5959
[api08]: https://owasp.org/API-Security/editions/2023/en/0xa8-security-misconfiguration/
6060
[api09]: https://owasp.org/API-Security/editions/2023/en/0xa9-improper-inventory-management/
6161
[api10]: https://owasp.org/API-Security/editions/2023/en/0xaa-unsafe-consumption-of-apis/
62-
[api-security]: https://owasp.org/API-Security
63-
[api-security-doc]: https://owasp.org/API-Security/editions/2023/en/0x00-header/
64-
[api-security-project]: https://owasp.org/www-project-api-security/
62+
[apisec]: https://owasp.org/API-Security
63+
[apisec-doc]: https://owasp.org/API-Security/editions/2023/en/0x00-header/
64+
[apisec-project]: https://owasp.org/www-project-api-security/
6565
[edit0907]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/09-training-education/07-api-top-ten.md
6666
[issue0907]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=content&template=request.md&title=Update:%2009-training-education/07-api-top-ten
6767

draft/09-training-education/08-wrongsecrets.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ You can set WrongSecrets up in standalone or in capture the flag (CTF) mode on D
5050

5151
Set-up guides for the standalone version are available in the [project README][readme].
5252

53-
For the CTF, the project also provides [set-up guides][ctf] and a [Helm chart][helm].
53+
For the CTF, the project also provides [set-up guides][ctf] and a [Helm chart][wrongsecrets-helm].
5454

5555
---
5656

@@ -59,7 +59,7 @@ then [submit an issue][issue0908] or [edit on GitHub][edit0908].
5959

6060
[ctf]: https://github.com/OWASP/wrongsecrets/blob/master/ctf-instructions.md
6161
[edit0908]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/09-training-education/08-wrongsecrets.md
62-
[helm]: https://owasp.org/wrongsecrets-ctf-party/
62+
[wrongsecrets-helm]: https://owasp.org/wrongsecrets-ctf-party/
6363
[heroku]: https://wrongsecrets.herokuapp.com/
6464
[issue0908]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=content&template=request.md&title=Update:%2009-training-education/08-wrongsecrets
6565
[readme]: https://github.com/OWASP/wrongsecrets/blob/master/README.md

draft/10-culture-process/03-samm.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -77,9 +77,9 @@ then [submit an issue][issue1003] or [edit on GitHub][edit1003].
7777
[sammd]: https://owaspsamm.org/model/design/
7878
[sammfun]: https://owaspsamm.thinkific.com/courses/samm
7979
[sammg]: https://owaspsamm.org/model/governance/
80-
[sammi]: https://owaspsamm.org/model/implementation
81-
[sammo]: https://owaspsamm.org/model/operations
82-
[sammv]: https://owaspsamm.org/model/verification
80+
[sammi]: https://owaspsamm.org/model/implementation/
81+
[sammo]: https://owaspsamm.org/model/operations/
82+
[sammv]: https://owaspsamm.org/model/verification/
8383
[samm-project]: https://owasp.org/www-project-samm/
8484
[spotlight09]: https://youtu.be/N0zcZnkH5Wg
8585

draft/11-operations/02-coraza.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ permalink: /draft/operations/coraza_waf/
1515
### 9.2 Coraza Web Application Firewall
1616

1717
The [OWASP Coraza][coraza-project] project provides a golang enterprise-grade Web Application Firewall framework
18-
that supports the [ModSecurity][modsecurity] seclang language
18+
that supports the [ModSecurity][modsec] seclang language
1919
and is completely compatible with the OWASP [Core Rule Set][modcrs] (CRS).
2020
Coraza is in active development as an OWASP Production code project,
2121
with the first stable version released in September 2021 and several releases since then.
@@ -37,7 +37,7 @@ Coraza can be deployed:
3737

3838
Web Application Firewalls are usually the first line of defense against HTTP attacks on web applications and servers.
3939
The Coraza WAF is widely used for providing this security, especially for cloud applications,
40-
along with the original OWASP [ModSecurity][modsecurity] WAF.
40+
along with the original OWASP [ModSecurity][modsec] WAF.
4141

4242
#### How to use Coraza
4343

@@ -65,7 +65,7 @@ then [submit an issue][issue1102] or [edit on GitHub][edit1102].
6565
[coraza-wasm]: https://github.com/corazawaf/coraza-proxy-wasm
6666
[edit1102]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/11-operations/02-coraza.md
6767
[issue1102]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=content&template=request.md&title=Update:%2011-operations/02-coraza
68-
[modcrs]: https://owasp.org/www-project-modsecurity-core-rule-set/
69-
[modsecurity]: https://owasp.org/www-project-modsecurity/
68+
[modcrs]: https://coreruleset.org/
69+
[modsec]: https://owasp.org/www-project-modsecurity/
7070

7171
\newpage

draft/11-operations/03-modsecurity.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -14,14 +14,14 @@ permalink: /draft/operations/modsecurity_waf/
1414

1515
### 9.3 ModSecurity Web Application Firewall
1616

17-
[ModSecurity][modsecurity] is an open source Web Application Firewall (WAF) widely deployed on web servers
17+
[ModSecurity][modsec] is an open source Web Application Firewall (WAF) widely deployed on web servers
1818
that has been in continuous development and widespread use since 2002.
1919

2020
In 2024 it became an OWASP Production project, supported by the existing leadership and contributors.
2121

2222
#### What is ModSecurity?
2323

24-
In January 2024 the [ModSecurity][modsecurity] Web Application Firewall project was [adopted by OWASP][modsecpress],
24+
In January 2024 the [ModSecurity][modsec] Web Application Firewall project was [adopted by OWASP][modsec-press],
2525
previously [TrustWave][trustwave] had been the custodian of this project.
2626
ModSecurity itself has a long history as an open source project, the first release was in November 2002,
2727
and is widely used as a web application firewall for cloud and on-premises web servers.
@@ -42,8 +42,8 @@ or deployed within the web server itself, to provide protection against HTTP att
4242

4343
The rules applied to the HTTP traffic are provided as configuration to ModSecurity,
4444
and these rules allow many different actions to be applied such as blocking traffic, redirecting requests, and many more.
45-
See the documentation for [deploying and running][modsecdocs] ModSecurity,
46-
along with the documentation on configuring ModSecurity with the [Core Rule Set][modcrsdocs].
45+
See the documentation for [deploying and running][modsec-docs] ModSecurity,
46+
along with the documentation on configuring ModSecurity with the [Core Rule Set][modcrs].
4747

4848
----
4949

@@ -53,11 +53,10 @@ then [submit an issue][issue1103] or [edit on GitHub][edit1103].
5353
[coraza]: https://coraza.io/
5454
[edit1103]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/11-operations/03-modsecurity.md
5555
[issue1103]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=content&template=request.md&title=Update:%2011-operations/03-modsecurity
56-
[modcrs]: https://owasp.org/www-project-modsecurity-core-rule-set/
57-
[modcrsdocs]: https://coreruleset.org/
58-
[modsecdocs]: https://www.modsecurity.org/
59-
[modsecurity]: https://owasp.org/www-project-modsecurity/
60-
[modsecpress]: https://owasp.org/blog/2024/01/09/ModSecurity.html
56+
[modcrs]: https://coreruleset.org/
57+
[modsec]: https://owasp.org/www-project-modsecurity/
58+
[modsec-docs]: https://www.modsecurity.org/
59+
[modsec-press]: https://owasp.org/blog/2024/01/09/ModSecurity.html
6160
[trustwave]: https://www.trustwave.com/
6261

6362
\newpage

draft/11-operations/04-modsecurity-crs.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -15,12 +15,13 @@ permalink: /draft/operations/modsecurity_core_rule_set/
1515
### 9.4 ModSecurity Core Rule Set
1616

1717
The OWASP ModSecurity [Core Rule Set][modcrs-project] (CRS) project is a set of generic attack detection rules
18-
for use with [ModSecurity][modsecurity] compatible web application firewalls such as [OWASP Coraza][coraza].
19-
CRS is an OWASP Flagship tool project and can be [downloaded][modcrs-download] for either Apache or IIS/Nginx web servers.
18+
for use with [ModSecurity][modsec] compatible web application firewalls such as [OWASP Coraza][coraza].
19+
CRS is an OWASP [Flagship tool project][modcrs-project] and can be [downloaded][modcrs-download]
20+
for either Apache or IIS/Nginx web servers.
2021

2122
#### What is the Core Rule Set?
2223

23-
The [Core Rule Set][modcrs] (CRS) are attack detection rules for use with [ModSecurity][modsecurity],
24+
The [Core Rule Set][modcrs] (CRS) are attack detection rules for use with [ModSecurity][modsec],
2425
[Coraza[coraza] and other ModSecurity compatible web application firewalls.
2526
The CRS aims to protect web applications from a wide range of attacks with a minimum of false alerts.
2627
The CRS provides protection against many common attack categories, including those in the OWASP Top Ten.
@@ -35,7 +36,7 @@ for various attacks and malicious traffic is blocked.
3536
#### How to use it
3637

3738
The use of the Core Rule Set assumes that a ModSecurity, Coraza or compatible WAF has been installed.
38-
Refer to the [Coraza tutorial][coraza-tutorial] or the [ModSecurity][modsecdocs] on how to do this.
39+
Refer to the [Coraza tutorial][coraza-tutorial] or the [ModSecurity][modsec-docs] on how to do this.
3940

4041
To get started with CRS refer to the Core Rule Set [installation instructions][modcrs-download].
4142

@@ -51,11 +52,11 @@ then [submit an issue][issue1104] or [edit on GitHub][edit1104].
5152
[coraza-tutorial]: https://coraza.io/docs/tutorials/quick-start/
5253
[edit1104]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/11-operations/04-modsecurity-crs.md
5354
[issue1104]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=content&template=request.md&title=Update:%2011-operations/04-modsecurity-crs
54-
[modcrs-project]: https://owasp.org/www-project-modsecurity-core-rule-set/
55-
[modcrs-download]: https://coreruleset.org/docs/deployment/install/
5655
[modcrs]: https://coreruleset.org/
57-
[modsecurity]: https://owasp.org/www-project-modsecurity/
58-
[modsecdocs]: https://www.modsecurity.org/
56+
[modcrs-download]: https://coreruleset.org/docs/deployment/install/
57+
[modcrs-project]: https://owasp.org/www-project-modsecurity-core-rule-set/
58+
[modsec]: https://owasp.org/www-project-modsecurity/
59+
[modsec-docs]: https://www.modsecurity.org/
5960
[spotlight03]: https://youtu.be/88ZMKpiZbRI
6061

6162
\newpage

draft/13-security-gap-analysis/01-guides/01-samm.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -74,9 +74,9 @@ then [submit an issue][issue130101] or [edit on GitHub][edit130101].
7474
[samma]: https://owaspsamm.org/assessment/
7575
[sammd]: https://owaspsamm.org/model/design/
7676
[sammg]: https://owaspsamm.org/model/governance/
77-
[sammi]: https://owaspsamm.org/model/implementation
78-
[sammo]: https://owaspsamm.org/model/operations
79-
[sammv]: https://owaspsamm.org/model/verification
77+
[sammi]: https://owaspsamm.org/model/implementation/
78+
[sammo]: https://owaspsamm.org/model/operations/
79+
[sammv]: https://owaspsamm.org/model/verification/
8080
[samm-project]: https://owasp.org/www-project-samm/
8181
[samwise]: https://github.com/owaspsamm/sammwise
8282
[sammy]: https://sammy.codific.com/

draft/13-security-gap-analysis/02-blt.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -49,14 +49,14 @@ and encourage users/reporters to use the [BLT app][bltapp] and chrome [extension
4949
----
5050

5151
The OWASP Developer Guide is a community effort; if there is something that needs changing
52-
then [submit an issue][issue1102] or [edit on GitHub][edit1102].
52+
then [submit an issue][issue1302] or [edit on GitHub][edit1302].
5353

5454
[blt]: https://owasp.org/www-project-bug-logging-tool/
5555
[bltchrome]: https://github.com/OWASP/BLT-Extension
5656
[bltcore]: https://github.com/OWASP/BLT
5757
[bltapp]: https://github.com/OWASP/BLT-Flutter
5858
[bltsite]: https://blt.owasp.org/
59-
[edit1102]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/13-security-gap-analysis/02-blt.md
60-
[issue1102]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=content&template=request.md&title=Update:%2013-security-gap-analysis/02-blt
59+
[edit1302]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/13-security-gap-analysis/02-blt.md
60+
[issue1302]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=content&template=request.md&title=Update:%2013-security-gap-analysis/02-blt
6161

6262
\newpage

0 commit comments

Comments
 (0)