-
Can we include some integrity checks for the linters configured in this repo?
The schema for trunk.yaml allows a shasum attribute, but the problem is that the URLs are parametrized by version for m…
-
### Please confirm the following
- [X] I agree to follow this project's [code of conduct](http://docs.ansible.com/ansible/latest/community/code_of_conduct.html).
- [X] I have checked the [current iss…
-
import { Injectable } from '@angular/core';
import * as nltk from 'nltk';
@Injectable({
providedIn: 'root'
})
export class NltkService {
constructor() {
nltk.download(); // Download NLTK dat…
-
# Lines of code
https://github.com/code-423n4/2023-04-eigenlayer/blob/main/src/contracts/core/StrategyManager.sol#L220-L228
https://github.com/code-423n4/2023-04-eigenlayer/blob/main/src/contracts/co…
-
### Context
A software vendor may deploy mechanisms to gather and analyze various signals associated with subjects such as users, devices, etc. These signals, which can originate from diverse channe…
-
Document release process: We should document what needs to be done when a new production version is released:
- Update both of our changelogs (/Changelog.md and /Documentation/ChangeLog/Index.rst)
- M…
-
**Référencement prescripteur :** modifier
![Image](https://github.com/user-attachments/assets/02ce2468-b134-419c-a188-2138d0395a6f)
par Chambres consulaires (mini-stage/stage de découverte)
**Fo…
-
What aspects of the systems are required in this area? Initial thoughts are;
- Where the system is hosted (🖥 internal or ☁️ external)
- License
- Security level (e.g. 🔐 ISO 27001 in the UK, what …
-
We need to take our current mapping of the TM Attack surface to the next level and also map the exposed/consumed parameters.
I think the only way we can do this is with static parsing of the controll…
-
**Description:**
I Noticed the CI pipeline isn't using a matrix.
I was a little surprised about this. After reading the examples, it seems like this can emulate multiple architectures from an am…