This repository is part of an online cybersecurity course and is meant to be used for learning and practice.
That means:
- It does not represent best practices
- It should not be used as a reference for production code
- It is designed to contain security issues on purpose
🎯 Purpose
The goal of this repository is to help you:
- Practice finding security vulnerabilities
- Learn how security scanning tools work
- Understand common mistakes that lead to real-world security issues
- Fix vulnerabilities in a safe, controlled environment
You’ll use this repository to experiment with things like:
- Secret scanning
- Dependency vulnerability scanning (SCA)
- Static application security testing (SAST)
🧠 How to use this repository
- Fork the repository
- Enable the recommended security tools
- Review the findings carefully
- Fix the vulnerabilities step by step
Mistakes are expected here — that’s the point.
🚫 Do not use in production
This repository is for educational purposes only. Never deploy this code or reuse it in real applications.