diff --git a/src/webapp01/Pages/DevSecOps.cshtml b/src/webapp01/Pages/DevSecOps.cshtml new file mode 100644 index 0000000..19f5d71 --- /dev/null +++ b/src/webapp01/Pages/DevSecOps.cshtml @@ -0,0 +1,181 @@ +@page +@model DevSecOpsModel +@{ + ViewData["Title"] = "DevSecOps with GitHub Advanced Security"; +} + +
Discover the latest features and capabilities of GitHub Advanced Security (GHAS)
+@newsItem
+ Updated: @DateTime.Now.ToString("MMM dd, yyyy") +No news available at this time.
+ } +Automated vulnerability detection using CodeQL semantic analysis engine.
+ +Detect and prevent secrets from being committed to repositories.
+Understand security impact of dependency changes in pull requests.
+ +Organization-wide security posture visibility and compliance tracking.
++ This page contains intentionally vulnerable code for demonstration purposes. + These vulnerabilities should be detected by GHAS code scanning. +
+ + + ++ Enable GitHub Advanced Security on your repositories to automatically detect the + security vulnerabilities demonstrated in this page's source code. GHAS will identify + issues like hardcoded credentials, vulnerable regex patterns, and potential log injection attacks. +
++ Learn more about implementing a comprehensive DevSecOps strategy with + GitHub Advanced Security. +
+Learn about building Web apps with ASP.NET Core.
Visit our About GHAS page to learn about GitHub Advanced Security features.
++ New! Check out our DevSecOps Demo + page to see the latest GHAS features and security demonstrations. +
diff --git a/src/webapp01/Pages/Shared/_Layout.cshtml b/src/webapp01/Pages/Shared/_Layout.cshtml index f8bf480..bcaf503 100644 --- a/src/webapp01/Pages/Shared/_Layout.cshtml +++ b/src/webapp01/Pages/Shared/_Layout.cshtml @@ -18,14 +18,16 @@ aria-expanded="false" aria-label="Toggle navigation"> -