Automated code review
Moodle issues submitted for review and inclusion into core are examined by our continuous integration (ci) system and checked against various automated tests. We use the automated checks to help improve the code quality in Moodle.
Brute-forcing login
This page forms part of the Moodle security guidelines.
Buffer overruns and other platform weaknesses
This page forms part of the Moodle security guidelines.
Coding style
The Moodle Coding Style guidelines
Command-line injection
This page forms part of the Moodle security guidelines.
Component Communication
The Moodle Coding Style guidelines
Component Library
The Component Library is a tool designed for developers to identify frequently used user interface (UI) components and encourage their reuse within Moodle. It includes both components from Twitter Bootstrap and Moodle itself. The library provides an organized display of these components, showcasing them with your current Moodle theme.
Confidential information leakage
This page forms part of the Moodle security guidelines.
Configuration information leakage
This page forms part of the Moodle security guidelines.
Cross-site request forgery
This page forms part of the Moodle security guidelines.
Cross-site scripting
This page forms part of the Moodle security guidelines.
Data-loss
This page forms part of the Moodle security guidelines.
Denial of service
This page forms part of the Moodle security guidelines.
Insecure configuration management
This page forms part of the Moodle security guidelines.
Moodle App Coding style
The Moodle App Coding Style guidelines
Policies
This is the top-level page describing Moodle's coding standards and guidelines. It's the place to start if you want to know how to write code for Moodle.
Security
This page describes how to write secure Moodle code that is not vulnerable to anything that evil people may try to throw at it.
Session fixation
This page forms part of the Moodle security guidelines.
Social engineering
This page forms part of the Moodle security guidelines.
SQL coding style
This page describes recommended coding style for complex database queries.
SQL injection
This page forms part of the Moodle security guidelines.
Style guides
We are looking to implement both a coding style guide, and a writing style guide, for this documentation. This will include appropriate tooling and information.
Unauthenticated access
This page forms part of the Moodle security guidelines.
Unauthorised access
This page forms part of the Moodle security guidelines.