Skip to content

Commit

Permalink
Misc name updates
Browse files Browse the repository at this point in the history
Remove OWASP references in docs, exception messages, search query.

Signed-off-by: thc202 <[email protected]>
  • Loading branch information
thc202 committed Aug 3, 2023
1 parent 6a9baf4 commit 9ef17b4
Show file tree
Hide file tree
Showing 10 changed files with 13 additions and 13 deletions.
2 changes: 1 addition & 1 deletion RELEASING.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ will create the tag(s), create the release(s), trigger the update of the marketp

## Localized Resources

The resources that require localization (e.g. `Messages.properties`, help pages) are uploaded to the OWASP ZAP projects in
The resources that require localization (e.g. `Messages.properties`, help pages) are uploaded to the ZAP projects in
[Crowdin](https://crowdin.com/) when the add-ons are released, if required (for pre-translation) the resources can be uploaded manually at anytime
by running the workflow [Crowdin Upload Files](https://github.com/zaproxy/zap-extensions/actions/workflows/crowdin-upload-files.yml) indicating,
with a comma separated list, the IDs of the add-ons that should have the files uploaded (e.g. `reveal, ascanrules`).
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -77,8 +77,8 @@ public class RemoteFileIncludeScanRule extends AbstractAppParamPlugin {
"www.google.com/",
"www.google.com:80/",
"www.google.com",
"www.google.com/search?q=OWASP%20ZAP",
"www.google.com:80/search?q=OWASP%20ZAP",
"www.google.com/search?q=ZAP",
"www.google.com:80/search?q=ZAP",
};

/** the patterns to look for, associated with the equivalent remote file targets above */
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -416,7 +416,7 @@ public byte[] getObjectData(
throw new Exception(
"Only Git Pack File versions 2, 3, and 4 are currently supported. Git Pack File Version "
+ packFileVersion
+ " was found. Contact the zaproxy (OWASP Zap) dev team");
+ " was found. Contact the ZAP dev team");
}

// for pack file version 4, read the SHA1 tables from the "pack" file at this point
Expand Down Expand Up @@ -749,7 +749,7 @@ private byte[] getPackedObjectData(
// TODO :support Packed Objects of type 'DELTA_ENCODED object with base
// BINARY_OBJ_ID'
throw new Exception(
"Packed Objects of type 'DELTA_ENCODED object with base BINARY_OBJ_ID' are not yet supported. If you have a test case, please let the OWASP Zap dev team know!");
"Packed Objects of type 'DELTA_ENCODED object with base BINARY_OBJ_ID' are not yet supported. If you have a test case, please let the ZAP dev team know!");
}

// Note that 0x7F is 0111 1111 in binary. Useful to mask off all but the top bit of a
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -130,7 +130,7 @@ ascanbeta.oobxss.skipped = no Active Scan OAST service is selected.
ascanbeta.proxydisclosure.attack = TRACE, OPTIONS methods with 'Max-Forwards' header. TRACK method.
ascanbeta.proxydisclosure.desc = {0} proxy server(s) were detected or fingerprinted. This information helps a potential attacker to determine \n - A list of targets for an attack against the application.\n - Potential vulnerabilities on the proxy servers that service the application.\n - The presence or absence of any proxy-based components that might cause attacks against the application to be detected, prevented, or mitigated.
ascanbeta.proxydisclosure.extrainfo.proxyserver = - {0}
ascanbeta.proxydisclosure.extrainfo.proxyserver.header = Using the TRACE, OPTIONS, and TRACK methods, the following proxy servers have been identified between OWASP ZAP and the application/web server:
ascanbeta.proxydisclosure.extrainfo.proxyserver.header = Using the TRACE, OPTIONS, and TRACK methods, the following proxy servers have been identified between ZAP and the application/web server:
ascanbeta.proxydisclosure.extrainfo.silentproxyserver = - {0}
ascanbeta.proxydisclosure.extrainfo.silentproxyserver.header = The following 'silent' proxy servers were identified. Due to their behaviour, it is not known at which point in the network topology these proxy servers reside:
ascanbeta.proxydisclosure.extrainfo.traceenabled = The 'TRACE' method is enabled on one or more of the proxy servers, or on the origin server. This method leaks all information submitted from the web browser and proxies back to the user agent. This may facilitate 'Cross Site Tracing' attacks.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ <H1>Bean Shell Console</H1>
The BeanShell is an interactive Java shell that can be used to execute BeanShell scripts. These
scripts are a simplified form of Java that use many elements from Java syntax, but in a simpler
scripting format. All Java code is also valid BeanShell code.<br/>
BeanShell integration in OWASP ZAP enables you to write scripts using the ZAP functions and
BeanShell integration in ZAP enables you to write scripts using the ZAP functions and
data set. This can be a very powerful feature for analyzing web applications.
</p>
<H2>BeanShell Console</H2>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,7 @@ <H2>Manual Browser Launch</H2>

<ul>
<li>Click the Extensions button
<li>Select the 'OWASP ZAP Browser Extension'
<li>Select the 'ZAP Browser Extension'
<li>Update the extension Preferences screen
</ul>

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -91,7 +91,7 @@ public class ExtensionPlugNHack extends ExtensionAdaptor
private static final String REPLACE_ID_TOKEN = "__REPLACE_ID__";
private static final String REPLACE_NONCE = "__REPLACE_NONCE__";
private static final String SCRIPT_START =
"<!-- OWASP ZAP Start of injected code -->\n" + "<script>\n";
"<!-- ZAP Start of injected code -->\n" + "<script>\n";

private static final String SCRIPT_API = "/OTHER/pnh/other/manifest/";
private static final String SCRIPT_END =
Expand All @@ -105,7 +105,7 @@ public class ExtensionPlugNHack extends ExtensionAdaptor
+ "','"
+ REPLACE_ID_TOKEN
+ "');\n"
+ "<!-- OWASP ZAP End of injected code -->\n"
+ "<!-- ZAP End of injected code -->\n"
+ "</script>\n";

public static final String NAME = "ExtensionPlugNHack";
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ plugnhack.failure = Configuration failed

plugnhack.firefox = Add to Firefox

plugnhack.header = Welcome to the OWASP Zed Attack Proxy (ZAP)
plugnhack.header = Welcome to the Zed Attack Proxy (ZAP)

plugnhack.intro1 = ZAP is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.

Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{
"toolName":"OWASP ZAP",
"toolName":"ZAP",
"protocolVersion":"0.2",
"features":{
"proxy":{
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"commands":[{
"description":"OWASP ZAP Commands"
"description":"ZAP Commands"
},
{
"name":"session",
Expand Down

0 comments on commit 9ef17b4

Please sign in to comment.