Railsgoat
A vulnerable version of Rails that follows the OWASP Top 10
Install / Use
/learn @OWASP/RailsgoatREADME
RailsGoat
RailsGoat is a deliberately vulnerable web application built on Ruby on Rails. It demonstrates real-world security vulnerabilities from the OWASP Top 10 and serves as a hands-on training platform for developers and security professionals.
What is RailsGoat?
RailsGoat is an intentionally insecure Rails application designed to teach web application security. By exploring and exploiting its vulnerabilities, you'll learn:
- How common security flaws manifest in Rails applications
- How to identify vulnerabilities through code review and testing
- How to implement proper security controls and remediation strategies
Current Version: Rails 8.0 with Ruby 3.4.1
Vulnerabilities Included
RailsGoat demonstrates real-world security vulnerabilities from the OWASP Top 10, including SQL injection, cross-site scripting (XSS), authentication issues, insecure direct object references, and more.
For a complete list of vulnerabilities with detailed explanations and tutorials, visit the RailsGoat Wiki.
Quick Start
Prerequisites
- Ruby 3.4.1
- Git
- SQLite3 (included by default)
- MySQL (optional, required for certain SQL injection demos)
New to Ruby? Follow the setup guide at GoRails for your operating system.
Installation
-
Clone the repository:
git clone https://github.com/OWASP/railsgoat.git cd railsgoat -
Install dependencies:
gem install bundler bundle install -
Setup the database:
rails db:setup -
Start the server:
rails server -
Open your browser: Navigate to
http://localhost:3000and start exploring!
Other Rails Versions
The main branch runs Rails 8. For older versions, switch branches:
git checkout rails_3_2 # Rails 3.2
git checkout rails_4_2 # Rails 4.2
git checkout rails_5 # Rails 5.x
Learning Path
1. Training Mode (Recommended for Learners)
Run the vulnerability test suite to see which security flaws exist:
rails training
Each failing test indicates a vulnerability. The test output includes a link to a wiki tutorial explaining:
- How the vulnerability works
- How to exploit it
- How to fix it
To run a specific vulnerability test:
rails training SPEC=spec/vulnerabilities/sql_injection_spec.rb
2. Explore the Application
- Create an account and log in
- Browse the different features
- Try to access other users' data
- Attempt various injection attacks
- Review the source code to understand the vulnerabilities
3. Learn from the Wiki
Visit the RailsGoat Wiki for detailed tutorials on each vulnerability, including:
- Vulnerability explanation
- Exploitation techniques
- Code examples
- Remediation steps
Bonus Security Topics
Additional documentation covering advanced and modern Rails security concepts:
Docker Installation
Requirements: Docker and Docker Compose 1.6.0+
For Mac Apple Silicon (ARM64): Rosetta must be installed
docker-compose build
docker-compose run web rails db:setup
docker-compose up
The application will be available at http://localhost:3000
Troubleshooting: If the container exits with "A server is already running", remove tmp/pids/server.pid from your working directory and try again.
Advanced Configuration
MySQL Environment
Some SQL injection vulnerabilities require MySQL. To run with MySQL:
# Create and migrate the database
RAILS_ENV=mysql rails db:create
RAILS_ENV=mysql rails db:migrate
# Start the server
RAILS_ENV=mysql rails server
Email Testing
RailsGoat uses MailCatcher to intercept emails:
gem install mailcatcher
mailcatcher
View emails at http://localhost:1080
For Contributors and Maintainers
Running Tests in Maintainer Mode
Set the RAILSGOAT_MAINTAINER environment variable to verify that vulnerabilities still exist:
RAILSGOAT_MAINTAINER="yes" bundle exec rspec
In maintainer mode, tests pass when vulnerabilities are correctly implemented (opposite of training mode).
Contributing
We welcome contributions! Please see our contribution guidelines for details.
Support
Need help?
- Join the OWASP Slack Channel
- Check the Wiki for tutorials
- Open an issue for bugs or questions
Project History
RailsGoat was created to demonstrate security vulnerabilities in Rails applications and teach secure coding practices. It has been continuously updated through Rails versions 3, 4, 5, 6, and now 8, maintaining relevance as the framework evolves.
Conversion to OWASP Top Ten 2013 completed in November 2013.
License
Warning: This application contains serious security vulnerabilities. Never deploy it on a public server or network. Use only in isolated training environments.
Related Skills
healthcheck
337.4kHost security hardening and risk-tolerance configuration for OpenClaw deployments
node-connect
337.4kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
prose
337.4kOpenProse VM skill pack. Activate on any `prose` command, .prose files, or OpenProse mentions; orchestrates multi-agent workflows.
frontend-design
83.2kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
