-
**Reason**
We're using a kubeconfig defined in `gardener-kubeconfig-path`. We should limit the access to it to not allow unathorize access to the gardener project.
KIM has currently too many privile…
-
### Proposal
Introduce support for creating threat modeling diagrams using Mermaid.js. Threat modeling is a critical process in cybersecurity, enabling architects, developers, and security profession…
-
**_301 Moved Permanently_: The [updated version of the Threat Model](https://github.com/w3c-cg/threat-modeling/blob/main/models/decentralized-identities.md) is in the [Threat Model Community Group](ht…
-
- ● https://www.threatmodelingmanifesto.org/
- ● https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/
- ● https://aws.amazon.com/blogs/security/how-to-approach-threat-modeling/
-…
-
As part of the fuzzing discussion, it would be helpful to have threat modeling done for the various OTel components. This issue is to track any work that could be done to progress this.
-
Hey,
As part of Cyber security best practices principles, I could immediately and intuitively see that this project is missing the security requirements and implementations for protecting the syste…
-
### What is this about?
Add support network icon for Shape
https://stack.shape.network/
Requested by -
TODO: create metamask-mobile issue ticket
### Details:
#### Mainnet
TBD
…
-
### What is this about?
Add support network icon for Oasis Sapphire
Requested by members of Oasis Network
### Scenario
_No response_
### Design
_No response_
### Technical Details
_No respon…
-
**Description**
Istio module should support rate limiting. New CRD should be introduced to support rate limiting configuration. User should be able to limit access to given workload based on ca…
-
### What is this about?
I uninstalled the Extension and was brought to the feedback form which can be seen in the screenshot.
The second sentence is incorrect stating:
“You can still access them on…