Damn Vulnerable Microservices (DVMS) is microservices that is damn vulnerable with no exception. These project goals are designed to learn about OWASP TOP 10 API Security risks. So, you can demonstrate your skill to exploiting and protecting against Kubernetes Microservices.
Damn Vulnerable Microservice (DVMS) is very damn vulnerable! Do not use it as reference on how to build good microservices on your production server. I recommend use it in local environment to prevent unauthorized attacker exploiting your valuable server.
We do not take responsibility for the way in which any one uses this microservices application. We have made the purposes of the application clear and it should not be used maliciously. We have given warnings and taken measures to prevent users from installing DVMS on to live web servers. If your web server is compromised via an installation of DVMS, it is not our responsibility, it is the responsibility of the person/s who uploaded and installed it.
Damn Vulnerable Microservices is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
- Kubernetes cluster on your local desktop (https://kubernetes.io/docs/tasks/tools/)
- Homebrew (https://brew.sh/)
$ brew install skaffold
$ git clone git@github.com:ne0z/DamnVulnerableMicroServices.git
$ git submodule update --init
$ skaffold dev