-
### Description
I'm now proficient with Traefik, as I use it all the time. Could perhaps do with reviewing most skills on there, and the site as a whole to scale it back a bit.
I'm also clued way …
-
PKCE is the new recommended flow to replace implicit flow in order to reduce security risks associated with leaking the secret key.
Is PKCE already supported? If not, can you make a sketch on how t…
-
-
Using JWTs as sessions is not recommended by several large security companies and not spring boot themselves and that there is a reason as to why spring security does not have a JWTFilter built in by …
-
In POST requests, when an empty JSON object is sent, the API hangs and the request cannot access the controller function at all.
## Sorting
- **I'm submitting a ...**
- [x] bug report
- …
-
Hi, we are a research group to help developers build secure applications. We designed a cryptographic misuse detector on Java language(Our main concern is the secure implementation and use of Json Web…
-
For example, when the checkout service needs reflect product details such as description, how does it "fetch" this data?
Does it have a duplicate of the production description in its own database? …
-
To keep a tab on the issues related to the learnings, research and more on the DevOps
-
# The Issue
The current issue involves the handling of interactions with bare Git repositories.
These interactions are currently integrated throughout the entire codebase.
The challenge revolve…
-
### Is there an existing issue for this?
- [X] I have searched the existing issues
### Issue Description
add Security Best Practices for Microservices in blog
### Suggested Change
thus blog discu…