-
We should make some minor changes to the GUI to present the new recently-added normal-operation threats in a more understandable way:
- [x] New icon to be used in threat lists for normal operation …
-
We're looking for the best way to encode tabular data in json that normally would be stored in a csv, I don't think that dataset is designed to actually store the raw data, but instead it describes a …
-
It would be useful to be able to link from system model Assets/Threats/ControlSets/ControlStrategies/MisbehaviourSets/etc to the documentation for the domain model Asset/Threat/Control/ControlStrategy…
-
Hi Maarten,
I think there is a bug in the OpenAI representation model in the way the prompt is generated. The keywords are only separated by a space, not a comma, which is problematic for n-grams >…
-
ReaR uses various different methods
to read variable values from files
in particular from shell-style config files
that are insecure because they execute foreign code
in particular
```
source FI…
-
H @opensourceantibiotics/murligase - since we're delaying our first meeting of 2023 till February (Valentine's, sorry about that), it would be good to consult on our plan to apply to CC4CARB in the sh…
-
[Easy] Users may wish to save their threat models to a cloud service such as Google Drive or Dropbox. Implementing this would require using their API’s and connecting it to SeaSponge.
-
Security is of critical importance to Adoptium in order to maintain the trust of its community in the integrity of the work that it does. There are evolving market requirements for software providers …
-
The idea here is to define a comprehensive privacy threat model for distributed hash tables and similar P2P overlay networks. Focusing on privacy attack surface and metadata leaks of networks that rel…
-
### Current Terraform Version
```
Terraform v1.1.9
on darwin_amd64
```
### Use-cases
I use terraform to spawn my infrastructure and there are some data that are simple text in the state and …