Skip to content

Develop Cyber Security Challanges for CRL (multiple goups)

image

Background:

The goal of this project is to design and implement a new cybersecurity challenge for use in CRL contests.
Challenges should follow the structure and style of the existing examples available here: Public Challenges.

Since many challenges in CRL are container-based, knowledge of Docker and containerization is required.

Task:

Design and develop a cybersecurity challenge that aligns with existing CRL needs and knowledge.
The specific challenge type, epics, and sub-tasks will be discussed and evaluated together with the development team.

Epic:

The challenge should be implemented in the same format as the examples provided: Challenge Examples.

The work should consist of the following key steps:

  • Identification of a suitable vulnerability
  • Documentation of the vulnerability and the challenge
  • Implementation of the challenge
  • Development of an automated solution for the challenge

Legal and Technical Requirements:

  • All source code produced in this project must be released under a permissive license that allows derivative works to be closed source (e.g., MIT License).
  • Focus should be placed on product readiness, stability, and maintainability.
  • Code must follow best practices, standardized language conventions, and provided templates.
  • Automated checks, tests, and build procedures (via GitLab CI) should be implemented wherever possible.
  • The final deliverable (including docker-compose.yaml and images) must be directly usable in CRL.
Edited by Jonas Karlsson
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information