-
Notifications
You must be signed in to change notification settings - Fork 23
/
secure_code_review.html
106 lines (96 loc) · 4.08 KB
/
secure_code_review.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
{% extends 'layouts/base.html' %}
{% load static %}
{% block content %}
<head>
<title>Secure Code Review</title>
</head>
<main>
{% include 'includes/pre-loader.html' %}
<style>
body {
font-family: Arial, sans-serif;
padding: 20px;
margin: 0;
background-color: #ffc107;
color: black;
}
.section-header {
padding: 100px 50px;
text-align: center;
}
h1 {
color: #333;
font-weight: bold;
margin-top: 20px;
}
p {
line-height: 1.6;
margin-top: 20px;
}
.btn {
background-color: #242e4c;
border: none;
color: white;
padding: 10px 20px;
text-align: center;
text-decoration: none;
display: inline-block;
font-size: 16px;
margin-top: 20px;
cursor: pointer;
}
.btn:hover {
background-color: #1c2540;
color: white;
}
.mobile-img {
margin: 0 auto;
display: block;
}
.image-container {
text-align: center;
margin-top: 20px;
}
.image-container img {
max-width: 80%;
width: auto;
height: auto;
max-height: 400px;
}
</style>
<div class="section-header">
<h1>Secure Code Review</h1>
<ul>
<li>Secure code review is a systematic examination of an application's source code with the
primary goal of identifying and mitigating security vulnerabilities. It involves inspecting
the codebase for potential weaknesses such as SQL injection, cross-site scripting (XSS), insecure
authentication mechanisms, and other common security flaws. During the review process, trained security
professionals analyze the code line by line, looking for coding practices that could lead to security breaches
or unauthorized access. Secure code review helps ensure that applications adhere to security best practices,
reducing the likelihood of exploitation by malicious actors. Additionally, it provides developers with insights
into secure coding principles, fostering a culture of security awareness within development teams.
</li>
<li> Hence, We specialize in evaluating and testing critical infrastructures using advanced tools. Our team goes beyond identifying vulnerabilities,
suggesting and implementing remediations to enhance code security. Thorough documentation of test exploitations ensures our clients receive
a clear roadmap for fortifying their code infrastructure.</li>
</ul>
<div class="image-container">
<img src="{% static 'assets/img/pages/appattack/scr.svg' %}" class="img-fluid" alt="Two people examining code for bugs">
</div>
<button type="button" class="btn btn-primary btn-lg px-4 gap-3" id="penTesting">Pen Testing Services</button>
<button type="button" class="btn btn-primary btn-lg px-4 gap-3" id="comprehensiveReports">Comprehensive Reports</button>
<button type="button" class="btn" id="backButton">Back</button>
<script>
document.getElementById("penTesting").addEventListener("click", function() {
window.location.href = "{% url 'pen-testing' %}";
});
document.getElementById("comprehensiveReports").addEventListener("click", function() {
window.location.href = "{% url 'comphrehensive_report' %}";
});
document.getElementById("backButton").addEventListener("click", function() {
window.location.href = "https://hardhatwebdev2024.pythonanywhere.com/appattack/";
});
</script>
</div>
</main>
{% endblock content %}