-
Hey,
In the context of the PROTECT project, we defined a list of exemptions to GDPR’s data subject rights. We welcome discussions with experts in law.
The concepts we are proposing to add to DPV…
-
Implement support for threat multiplier and AP based threat bonus for spells.
- Higher ranks are now automatically filled when not listed in spell_threat
- Added some loading checks to detect inconsis…
-
# Architecture
This document outlines the architecture of the AI Nutrition-Pro application, including system context, containers, and deployment views. The architecture is depicted using C4 diagram…
xvnpw updated
3 weeks ago
-
**Describe the bug:**
- Filter in does not work properly for non-ECS fields
**Kibana/Elasticsearch Stack version:**
- 8.3.0 (main 58bc0f759e8de873bac9e9fa4607a0b2befa420d)
**Initial Setup:**
…
-
I made a simple system model to test the risk-report algorithm and have found a bug in the Java attack path code.
The model is "small-uncontrolled" ([small-uncontrolled 2024-05-19T11_41.nq.gz](http…
-
### Goal, if I want to generate json from yaml format configuration
https://github.com/elastic/integrations/tree/main/packages/panw/data_stream/panos/elasticsearch/ingest_pipeline
`yq eval -o=…
-
https://github.com/elastic/kibana/pull/186437 upgrades upgrade typescript into v5.1.6
> In order to make assumptions over the codebase and all the type of errors I choose to mark the failures with …
-
## Summary
Currently, One Discover does not gives security solution a way to know if a user is a security user or not. This might result in below issues:
### Profile Conflict
Security wants to give…
-
### Question
Hello Apache ShenYu Community,
I'm interested in exploring the possibility of adding an AI plugin to the ShenYu ecosystem. The goal is to leverage artificial intelligence to enhance t…
-
There is no evidence that moving to the cloud improves security. The distributed architecture offers a multitude of attack vectors. Cloud Deployments create multiple endpoints, each of which needs to …