-
We should add some capability to map jobs to users. It should match up with the existing security layer of the web server.
-
### Is there an existing issue for this?
- [X] I have searched the existing issues
### Summary
Ask here is that the datasource for each end user should use a different set of credentials based on t…
-
### Description
We currently test container runtime security with KubeArmor running in Kubernetes. However, KubeArmor also has the capability to secure Kubernetes nodes. As well as run in non-kuberne…
-
The ISM API not only allows recipients to specify a custom security model for them but also dynamically specify the security based on message contents. This ticket is about creating a simple demonstra…
-
Can LegacyUpdate ports latest security and most important features that most softwares depends on it (how the future goes...) from latest Windows to older versions of Windows and push it as an update …
-
In "Security analysis of CHERI ISA.pdf" under "munmap doesn't check the tag of pointers", there are the following issues:
1. The first paragraph says "The problem was that munmap didn't make sure t…
-
When you use a remote MySQL server and can't get FILE privilege, i.e. AWS RDS, you need LOAD DATA LOCAL INFILE capability. For some reason that was an issue in PHP when `open_basedir` or `safe_mode` w…
-
The back-end would be written in Python and leverage Linux bridges with VXLAN to create communication channel between nodes. OVS support could be added down the line as well.
Pyroute2 (Netlink librar…
-
Over the years, large sites and platform can accumulate "cookie cruft" - cookies that they observe coming from users, but ones that are no longer actively used and don't exist in their current codebas…
-
### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the…