-
Shadowenv could have a feature to convert other environment manipulation tools' configs to a format it can understand. For example:
```ini
# .env
A=b
```
```
$ shadowenv assimilate
assimila…
burke updated
2 years ago
-
Hello, loving your great work and thank you for it!
After using it for a while I encoutered a fewproblems - here are ideas for additional betterment:
## Omit SVG from auto-format
We are using `…
-
The fuzzer outputs a literal list of fuzzer actions as its replayable trace. This is pretty neat, but:
- it does so as an S-expression, which is fairly difficult to read and modify by hand (or by Py…
-
The security team in our organization have found the below vulnerabilities in the node-gyp module. Is there a newer version of the module which fixes the below vulnerabilities?
### Vulnerability 1
…
-
One of the biggest hang-ups I have when reviewing the Counterparty data encoding scheme is understanding the different types of string encoding that are performed throughout the process. Explaining t…
loon3 updated
9 years ago
-
Would like to ask if imagehash can handle these types of edited images
Goal: Update on https://github.com/pippy360/transformationInvariantImageSearch
1. Brightening/Darkening
2. Stretched/Smush…
-
Expand the Unified Thermostat Drivers to include local control of air conditioning units, removing the reliance on the cloud services.
- [x] Store Password as State Variable
- [x] Store Crypto…
-
Hey,
I am just wondering if there is someone who has already figured out how to use ZoKrates to proof properties on encrypted data. For example, can implement an asymmetric or symmetric encryption s…
-
Some API endpoints have secuirty from request signing e.g. wallet information on binance - https://api.binance.com/sapi/v1/capital/config/getall
Information about signed endpoint security: https://…
-
180 questions