-
AS A Product Owner
I WANT stage.buerokratt.ee to be deployed and fully functional
SO THAT it could be used for penetration testing
### Acceptance Criteria
- [x] https://stage.buerokratt.ee is fully …
-
Any user or system accounts used to perform penetration testing should be controlled and monitored to make sure they are only being used for legitimate purposes, and are removed or restored to normal …
-
I'm a GraphQL newbie, so I might be missing something here, but is there any reason why you might want introspection enabled in production for the `/admin/graphql` admin GraphQL endpoint? During devel…
-
* Penetration testing
* Security
* Ggf Jannis Kirschner kontaktieren
-
### Details
Solution:
Metric: Primary: Security vulnerabilities identified, system uptime, mean time to repair (MTTR). Secondary: Code quality score, coverage metrics.
Search Space:
Security audi…
-
Include tests for the presence of unprotected system information and artifacts that would be useful to attackers, including network diagrams, configuration files, older penetration test reports, email…
-
Page 37, 2nd to last bullet
"The same notion of needing the operational environment to be a “trusted platform” applies here – deploying the TOE in a cloud platform and infrastructure has undergone a …
-
Preparing for the use of penetration testing on the website.
-
Hello!
We are using Argon2Swift in our iOS app. We got warning about using insecure API(s) from the penetration testing: **The binary may contain the following insecure API calls: _printf, _memcpy,…
-
### Ticket Contents
## Description
Design a framework to make Penetration testing part of CI (Github Actions)
Reference: https://github.com/olacabs/jackhammer
### Goals & Mid-Point Milesto…