psiinon at gmail.com
Mon Jan 20 17:38:03 UTC 2014
The blog post explaining how to report web vulnerabilities to Mozilla using
Zest is now live:
Feedback appreciated :)
On Thu, Jan 9, 2014 at 9:26 AM, psiinon <psiinon at gmail.com> wrote:
> Thanks for the shout out Dinis :)
> Looks like the link wasnt quite right, so here are a couple that hopefully
> are ok:
> - http://code.google.com/p/zap-extensions/wiki/AddOn_Zest
> - https://developer.mozilla.org/en-US/docs/Zest
> FYI I'll be publishing a blog post on how to use Zest for reporting
> website vulnerabilities to Mozilla very soon - I'll post the link to this
> thread when its live.
> Zest is still at an early stage, but so far its looking good (but hey, I'm
> It would be really great to have more people playing around with it,
> suggesting improvements and even contributing!
> And it is, of course, completely open source and free. Its also licensed
> so that it can also be freely used in closed source / commercial tools as
> On Thu, Jan 9, 2014 at 9:07 AM, Dinis Cruz <dinis.cruz at owasp.org> wrote:
>> I was looking at Zest this morning (
>> https://code.google.com/p/zap-extensions/wiki/add on_Zest) and it looks
>> really interesting and powerful
>> Anybody using it? (apart from Simon :) )
>> If so, what are your views on it and should Zest be a common language to
>> describe web app tests/vulns?
>> I'm thinking of using the 'Eclipse Plugin Builder DevKit' I'm currently
>> working on to write a Zest Eclipse Plugin. So let me know if you have ideas
>> on what it should do, or want to help.
>> OWASP-Leaders mailing list
>> OWASP-Leaders at lists.owasp.org
> OWASP ZAP <https://www.owasp.org/index.php/ZAP> Project leader
OWASP ZAP <https://www.owasp.org/index.php/ZAP> Project leader
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the OWASP-Leaders