Develop Cyber Security Challanges for CRL (multiple goups)
Background:
The goal of this project is to design and implement a new cybersecurity challenge for use in CRL contests.
Challenges should follow the structure and style of the existing examples available here: Public Challenges.
Since many challenges in CRL are container-based, knowledge of Docker and containerization is required.
Task:
Design and develop a cybersecurity challenge that aligns with existing CRL needs and knowledge.
The specific challenge type, epics, and sub-tasks will be discussed and evaluated together with the development team.
Epic:
The challenge should be implemented in the same format as the examples provided: Challenge Examples.
The work should consist of the following key steps:
- Identification of a suitable vulnerability
- Documentation of the vulnerability and the challenge
- Implementation of the challenge
- Development of an automated solution for the challenge
Legal and Technical Requirements:
- All source code produced in this project must be released under a permissive license that allows derivative works to be closed source (e.g., MIT License).
- Focus should be placed on product readiness, stability, and maintainability.
- Code must follow best practices, standardized language conventions, and provided templates.
- Automated checks, tests, and build procedures (via GitLab CI) should be implemented wherever possible.
- The final deliverable (including
docker-compose.yaml
and images) must be directly usable in CRL.
Edited by Jonas Karlsson