Develop Cyber Security Challanges for CRL (multiple goups)
![image](/uploads/d5d2049b7db4503f7e916f9052592755/image.png) # Background: The goal of this project is to design and implement a new cybersecurity challenge for use in [CRL](https://git.cs.kau.se/csma/cyber-range/crl) contests. Challenges should follow the structure and style of the existing examples available here: [Public Challenges](https://git.cs.kau.se/csma/cyber-range/public-challenges). Since many challenges in CRL are container-based, knowledge of Docker and containerization is required. # Task: Design and develop a cybersecurity challenge that aligns with existing CRL needs and knowledge. The specific challenge type, epics, and sub-tasks will be discussed and evaluated together with the development team. # Epic: The challenge should be implemented in the same format as the examples provided: [Challenge Examples](https://git.cs.kau.se/csma/cyber-range/public-challenges/-/tree/main/examples). The work should consist of the following key steps: - Identification of a suitable vulnerability - Documentation of the vulnerability and the challenge - Implementation of the challenge - Development of an automated solution for the challenge # Legal and Technical Requirements: - All source code produced in this project must be released under a permissive license that allows derivative works to be closed source (e.g., MIT License). - Focus should be placed on product readiness, stability, and maintainability. - Code must follow best practices, standardized language conventions, and provided templates. - Automated checks, tests, and build procedures (via GitLab CI) should be implemented wherever possible. - The final deliverable (including `docker-compose.yaml` and images) must be directly usable in CRL.
issue