Red Team Project, a new initiative to make open source software more secure

Red Team

The Linux Foundation has launched the Red Team Project, a initiative that will create and incubate open source cybersecurity tools with support of rank automation, risk quantification, pentesting and validation / advance of standards.

The main goal of Red Team is make open source software more secure. They use the same procedure and techniques as the attackers to provide positive feedback and improve security in the various free applications.

The team caught up with Jason Callaway, Google engineer and founder of the project, to find out a little more. Callaway mentioned that when at Def Con 25 he founded the Fedora Red Team SIG and incubated some tools for exploit mapping and the goal was always to implement it in open source.

I also mention that the immediate step after starting is to migrate to Github repositories, make a presence on social media, and most importantly, get back to coding.

Jason believes that following an open source scheme is the right way to incubate security tools, "open source should be safe because it can harm people, businesses and governments,”He mentions in the interview.

In addition, it ensures that some tech giants are working shoulder to shoulder to make the project a success and although it does not say names we could be rumored that it is talking about Google, Canonical, Microsoft or even Apple.

Lastly, Callaway says the best way to get involved in the Red Team Project is attending the various conferences or meetings that will be given in person and through Google Hangoutscan also be supported by working on the GitHub projects or by accessing your Homepage.

The content of the article adheres to our principles of editorial ethics. To report an error click here!.

Be the first to comment

Leave a Comment

Your email address will not be published.



  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.