-
Please share any thoughts about what went well, what could be done differently etc. here.
-
-
In relation to:
https://github.com/OWASP/ASVS/issues/877 and https://github.com/OWASP/ASVS/issues/1031
I think all of v1 needs to stick with threat modeling and general architecture requirements…
-
**Who do you want to protect?**
- Yourself and personal identity
- Your family
- Your team
- Clients if self employed
- Online personas
**What do you want to protect?**
- Reputation ( self …
-
We should make some minor changes to the GUI to present the new recently-added normal-operation threats in a more understandable way:
- [x] New icon to be used in threat lists for normal operation …
-
Security is of critical importance to Adoptium in order to maintain the trust of its community in the integrity of the work that it does. There are evolving market requirements for software providers …
-
It would be nice if we can automatically generate Kubernetes architecture diagrams with [Kubernetes icons set](https://github.com/kubernetes/community/tree/master/icons) from an actual Kubernetes depl…
-
ReaR uses various different methods
to read variable values from files
in particular from shell-style config files
that are insecure because they execute foreign code
in particular
```
source FI…
-
You can now test whether the user is allowed to install unknown sources. This can help in checking the security posture of the device. It is a good idea to raise awareness with android developers to c…
-
### Describe the desired feature
The [AI Horde](https://aihorde.net) is a FOSS, Crowdsourced service which can allow anyone to request Generative AI Art and text. There is opportunity for FOSS game…