-
### Goal
Verify the accuracy of vulnerability detections so that the Fleet team is able to prioritize and measure improvements to accuracy.
### How?
- [x] Product: Define what the ~20 common …
-
1. **Introduction**
- Brief overview of the importance of security for the SaaS product.
- Commitment statement to user and data protection.
2. **Servers Security**
- Data center securi…
-
## CVE-2017-12192 - Medium Severity Vulnerability
Vulnerable Library - linuxlinux-4.1.52
The Linux Kernel
Library home page: https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux
Foun…
-
## CVE-2017-12192 - Medium Severity Vulnerability
Vulnerable Library - linuxlinux-4.6
The Linux Kernel
Library home page: https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux
Found i…
-
### Please confirm the following
- [X] I agree to follow this project's [code of conduct](https://docs.ansible.com/ansible/latest/community/code_of_conduct.html).
- [X] I have checked the [current…
-
We should allow notes and occurrences to be signed. The server implementation should verify these signatures and reject if they are invalid. Notes can specify accepted keys, and occurrences attached t…
-
- [ ] Come up with 5 most important tests to have in system by Tue EOD
- [ ] Reasoning why you are picking these 5 by Tue EOD
- [ ] Implemetation of these 5 actions by Wed EOD
-
### Please confirm the following
- [X] I agree to follow this project's [code of conduct](https://docs.ansible.com/ansible/latest/community/code_of_conduct.html).
- [X] I have checked the [current…
-
## Call to Action
This research initiative aims to explore and identify potential use-cases for Polykey, with a particular focus on web-3 environments where our decentralized architecture could off…
-
## Background
Currently, the authentication mechanism in the project relies solely on JWT tokens. While this approach is functional, it can be enhanced for better security and user experience by in…