Skip to content
a Damn Vulnerable Serverless Application
JavaScript Python CSS HTML
Branch: master
Clone or download
Latest commit b26c8a7 Jan 17, 2020


Type Name Latest commit message Commit time
Failed to load latest commit information.
AWS aws lessons Aug 23, 2019
Azure Create Aug 23, 2019
backend serverless repo version Jan 17, 2020
client serverless repo version Jan 17, 2020
.gitignore minor fix Jan 17, 2020
COPYING.txt Create COPYING.txt Dec 21, 2018
LICENSE prepare repo Jan 17, 2020
OWASP_DC_SLS_Top10.pdf presentation Sep 15, 2019 prepare repo Jan 17, 2020
favicon.ico Add files via upload Dec 21, 2018
package-lock.json - Committed package.lock files. Feb 11, 2019
package.json prepare repo Jan 17, 2020
serverless.yml moving to python3.6 Jan 16, 2020
template.yml serverless repo version Jan 17, 2020

alt DVSA

a Damn Vulnerable Serverless Application

Damn Vulnerable Serverless Application (DVSA) is a deliberately vulnerable application aiming to be an aid for security professionals to test their skills and tools in a legal environment, help developers better understand the processes of securing serverless applications and to aid both students & teachers to learn about serverless application security in a controlled class room environment.

The aim of DVSA is to practice some of the most common serverless vulnerabilities, with a simple straightforward interface.

Please note, there are both documented and undocumented vulnerabilities with this software. This is intentional. You are encouraged to try and discover as many issues as possible.


Do not install DVSA on a production account

We do not take responsibility for the way in which any one uses this application (DVSA). We have made the purposes of the application clear and it should not be used maliciously. We have given warnings and taken measures to prevent users from installing DVSA on to production accounts.


Application Repository

  • Deploy DVSA from the AWS Serverless Application Repository

  • After deployment is complete. Click on 'View CloudFormation Stack'

  • Under 'Outputs' you will find the URL for the application (DVSA Website URL)

Serverless Framework

You must run serverless deploy commands with an environment variable profile (e.g. AWS_PROFILE=<aws-profile-name>) instead of the serverless argument.

Clone Project
  • git clone
Install Serverless
  • npm install -g serverless
Install AWS-CLI
  • pip install awscli --upgrade --user
Verify AWS-CLI Installation
  • aws --version

If you get a "command not found" error, see the "Steps to Take after Installation" section here.

Configure AWS-CLI for your Account
  • aws configure
Install dependencies
  • npm i
Deploy Backend
  • sls deploy
Build Client
  • npm run-script client:build
Deploy Client
  • sls client deploy

Running locally

Run Client

  • npm run-script client:start

Note: This will only work if you previously deployed the backend. If this fails, confirm you still have a be-stack.json file at the root of this project.

Run Backend

  • npm start

If you want to point your local client to your local backend, edit your be-stack.json and set ServiceEndpoint to http://localhost:3000. Note that you will still be using the Cognito pools in AWS.

Email subscription

DVSA sends receipts in the email (which will help you in hacking it). You can use the built-in Inbox page within the application to get the emails and obtain the receipts.

Note: each user will be assigned an email from which will be automatically verified. Real emails will be sent to their account and will appear in the application Inbox page. All this is transparent to the user and the deployer).

Note: to make the email verification script work your default AWS region has to be "US East (N. Virginia)", for example by setting region = us-east-1 in your ~/.aws/config file

Alternatively, if you want users to receive emails to their registered email account (e.g. gmail), use one of the followings:

  • Send an email verification link to email address, by running the following command (after clicking on the received link, emails will also be sent to their actual email address):

aws ses verify-email-identity --email-address <your_email>





see LESSONS for information about hacking DVSA.

see VIDEOS for how to deploy, use and hack DVSA.


OWASP Top 10 - Serverless Interpretation

Deep-Dive into Serverless Attacks - Series

OWASP Serverless Top 10 Project

Twitter account (hackable)

Slack Channel #project-sls-top-10

DVSA blog post

In the News


DVSA was created by Tal Melamed


Damn Vulnerable Serverless Application (DVSA) is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

Damn Vulnerable Serverless Application (DVSA) is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with Damn Vulnerable Serverless Application (DVSA). If not, see

You can’t perform that action at this time.