-
## Description:
sbomqs currently lacks a vulnerability scanner, which is essential for identifying potential security risks in the software components. Integrating a Trivy vulnerability scanner can…
-
## Expected Behavior
The website https://obfuscator.io/ should be accessed without any security warnings from antivirus software.
## Current Behavior
When attempting to access https://obfuscator.…
-
Filestash is fantastic software, first of all, and a big thank you to all the developers who help create it.
I know that Filestash is written with security in mind, and I am certainly not expecting…
-
## Description
Create a comprehensive overview of the system architecture for the Next Build persistent server. Diagram should include Software, Data Flow and Security Controls.
## Screenshot
## A…
-
We encountered an issue where the Ngrok executable, which is used for connecting the parent bot to the child bot, was flagged and quarantined as potentially unwanted software by Microsoft Defender. Th…
-
### Summary
Hi :wave: I'm an [SSI Fellow for 2023](https://software.ac.uk/about/fellows/alex-coleman) and am looking at developing materials that help teach researchers about software security be…
-
👋
Hope you're OK!
Thanks for software 🥰
As a mobile user when I [navigate] back and forth between apps (i.e. phone and Buttercup (BC)) during a call where I have to reference and dial account…
-
PS D:\Program Files (x86)\Dr. Memory\bin64> drmemory.exe -check_leaks -logdir "d:\log" E:\a.exe
~~Dr.M~~ WARNING: unable to locate results file: can't open d:\log/resfile.10080 (code=2).
Dr. Memory …
-
**Problem**
The SBOM community has identified multiple types of SBOM:
Software Bill of Materials (SBOM) -- the default of course
Software-as-a-Service Bill of Materials (SaaSBOM)
Hardware Bill o…
-
# Introduction
The Federal Information Processing Standard (FIPS), is a required standard for any software that will be used in the Government of the United States of America or the Government of C…