Replies: 2 comments 1 reply
-
|
NetGuardian directly supports BLT’s vision and OWASP’s security mission. BLT doesn’t yet have a complete, production-ready NetGuardian workflow, so implementing it during the GSoC timeline would fill a clear gap and deliver immediate value. |
Beta Was this translation helpful? Give feedback.
0 replies
-
|
@DonnieBLT aren't project S, M, G and A overlapping? |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
NetGuardian: Zero-Trust Encrypted Web Scanner & Triage-Lite Platform (2026 — 350hr)
Idea Overview
BLT-NetGuardian is a production-ready, privacy-preserving security scanning workflow that finds verifiable web vulnerabilities and safely hands them off inside BLT with minimal reviewer effort. It ships end-to-end encrypted ingestion (Zero Trust), a real detection pack (web vulns + Semgrep SAST), a volunteer CLI client for distributed scanning, a normalized finding schema with basic validation/dedup, disclosure helpers (security.txt), and a professional remediation report (CSV/PDF) — scoped to 350 hours.
Core Objectives
Timeline (4 Phases × 4 Weeks, ~350 hours)
Phase 1 (Weeks 1–4 | ~90 hours) — Zero Trust + Detection MVP + Common Schema
ztr-finding-1encrypted envelope (E2E), signed + timestamped submissionPhase 2 (Weeks 5–8 | ~110 hours) — Volunteer CLI + Validation/Dedup + UX Refinements
Phase 3 (Weeks 9–12 | ~90 hours) — Quality, Accuracy & Light Resilience
Phase 4 (Weeks 13–16 | ~60 hours) — Disclosure Helpers + Pro Report + Pilot
security.txt; surface contact hints during “Convert to Issue”Benefits
Beta Was this translation helpful? Give feedback.
All reactions