-
> Resources:
- https://www.forbes.com/sites/ericbasu/2013/10/13/what-is-a-penetration-test-and-why-would-i-need-one-for-my-company/#79871ce918a0
- https://www.cloudflare.com/learning/security/glossa…
-
from os import system
from time import sleep
import sys
import time
#Colours os
Red = "\033[0;31m"
Yellow = "\033[0;34m"
Blue = "\033[0;33m"
Green = "\033[0;32m"
Balck = "\033[0;39m"
Whit…
-
# Using API3's First-party Oracles
### Background
[API3](https://api3.org/) is a collaborative project that delivers traditional API services to smart contract platforms in a decentralized and …
-
Project Lead:
amchagas
Mentor: emdupre
Welcome to OL6, Cohort C! This issue will be used to track your project and progress during the program. Please use this checklist over the next few w…
-
**Concise description**:
As the City of Austin's Open Data Initiative gains momentum, the list of issues to address is growing. New projects and teams are taking shape and use digital tools to collab…
-
## Checklist
- [X] Confirmed this is an issue with charm-tools, not charmstore-client
- [X] Provide versions of tools used
- [X] Described the feature or ways to replicate the issue
## What…
-
Hello Yuchen,
👍 Nice work! In order to learn web security, we have to learn the basics of web development. Because web development isn't the goal of this course, everyone will receive the same UI …
-
# Handle
jonah1005
# Vulnerability details
## Impact
`Pool` can mint arbitrary `Sythn` provided as long as it's a valid synth. When there are multiple curated pools and synth (which the protocol i…
-
On behalf of Prashanth Thandavamurthy of Arxan Technologies, Inc.
## New Threat
**Threat Category**:
Application: Vulnerable Application
**Threat**:
Copying, distributing and re-publishing the appli…
-
### Problem Statement
## Problem
We cannot setup [Sentry stack-trace source-code linking](https://docs.sentry.io/product/integrations/source-code-mgmt/github/#stack-trace-linking) without giving f…