-
We have lots of resources for new contributors, but they are all over the place. We should consolidate information and make it easy to find, especially from the front page of Github (i.e. the README).…
-
Context: https://jorianwoltjer.com/blog/p/hacking/xs-leaking-flags-with-css-a-ctfd-0day
This issue is somewhat separate from the privacy leaks that we've been thinking of, but it's an interesting g…
-
Hello,
I want to use in Crnk a JAX-RS repository in order to serve also the following requests:
`http://host:8080/ui-api/repo1/{Id}/checkpoints/{cp1}`
I've implemented the resource `JsonApiResour…
-
So I'm running a test like the below, because I want to ensure anything deployed to our production clusters has `resources` specs in it. Unfortunately if I write it like this and a dev runs the testsu…
-
Thank you all very much for your work. While testing the code, I found that using gemma-7b-it as the attacker causes all the responses to refuse answering. Below is a sample example. Is there any solu…
-
It’s good if money grows by a large amount, and it’s good if server security weakens by a large amount but it’s bad if the hack takes too much money at once because then a long time has to be spent gr…
-
This problem arose when @justaddcoffee , @caufieldjh and I were hacking together on `oakx-grape`.
On using `oaklib` latest version, the command `runoak -I sqlite:obo:pato terms` returns `IndexError…
-
Currently there isn't a good way of capturing MFA bypass, in which there is a secondary action that is leveraged to bypass MFA.
Here are the types of attacks that are known:
1. Auth approving sp…
-
Hi Team,
I would like to implement my programs in Jasmin. Are there any tutorials, videos and materials available that could help begin with basic programming on Jasmin. It would be very much helpf…
-
### Prerequisites
* [ ] Put an X between the brackets on this line if you have done all of the following:
* Reproduced the problem in Safe Mode:
* Followed all applicable steps in th…