Skip to content

Commit

Permalink
Migrate to single use repo (www-project-vulnerable-web-applications-d…
Browse files Browse the repository at this point in the history
…irectory) (#223)

* Delete .github/workflows/create_www_update.yml

Work only in the www repo now

* Update README.md
  • Loading branch information
kingthorin authored Oct 26, 2024
1 parent a78e7fe commit 10c8191
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 52 deletions.
45 changes: 0 additions & 45 deletions .github/workflows/create_www_update.yml

This file was deleted.

12 changes: 5 additions & 7 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,13 +1,11 @@
# OWASP-VWAD ![OWASP Lab](https://img.shields.io/badge/owasp-lab-yellow.svg)

The OWASP Vulnerable Web Applications Directory Project (VWAD, https://owasp.org/www-project-vulnerable-web-applications-directory/) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.

The individual collections are available via separate tabs on: [https://owasp.org/www-project-vulnerable-web-applications-directory/](https://owasp.org/www-project-vulnerable-web-applications-directory/)
## 2024-10-26

## Editing Process
⚠️ This repo is being wound down. Future work should be via [`www-project-vulnerable-web-applications-directory`](https://github.com/OWASP/www-project-vulnerable-web-applications-directory)

Just open a PR modifying the [JSON file](https://github.com/OWASP/OWASP-VWAD/tree/master/src/data).
---

Please keep the file sorted by `name`. You can use this online tool to assist you: https://codeshack.io/json-sorter/. Entries should conform to the [schema](https://github.com/OWASP/OWASP-VWAD/blob/master/schema.json) and are validated automatically during PR handling. You can also use this [online service](https://www.jsonschemavalidator.net/) to check before submitting.
The OWASP Vulnerable Web Applications Directory Project (VWAD, https://owasp.org/www-project-vulnerable-web-applications-directory/) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.

Since 20200331 they are automatically copied/deployed to the `www-project-vulnerable-web-applications-directory` repo, from which they are rendered on the owasp.org website.
The individual collections are available via separate tabs on: [https://owasp.org/www-project-vulnerable-web-applications-directory/](https://owasp.org/www-project-vulnerable-web-applications-directory/)

0 comments on commit 10c8191

Please sign in to comment.