-
Docstrings might help clarify some functions, even though they're rather simple.
https://github.com/JacksonQu/Software-Supply-Chain-Security-Assignment1/blob/d446488fdbda84f8264478efa141aa9ba9dba79…
-
### Description:
Our access control software has a critical security vulnerability that allows dogs to access the database without authentication. This issue poses a significant risk to the security …
-
![image](https://user-images.githubusercontent.com/12871721/103327099-94630800-4a96-11eb-9a66-7e747045c1c6.png)
![image](https://user-images.githubusercontent.com/12871721/103327421-d0e33380-4a97-11e…
-
Milestone 1 Requirements
- Introduction
- Product Scope
- Related Background Literature
- References and Acknowledgments
- Overall Descriptions
- Product Overall Functionality
- Assumpti…
-
## Problem
As a Security Admin examining vulnerable software on a host
I want to select the software and only see information about the software installed on that host
So I can find the vulne…
-
This issue covers setting up a secure supply chain for all the software we provide, both for Kubernetes and non-Kubernetes use cases.
In particular, #83 has some setup for how we will push a conta…
-
The formatting in this function makes it a bit difficult to read; some strategic line breaks and comments might help.
https://github.com/JacksonQu/Software-Supply-Chain-Security-Assignment1/blob/d4…
-
Hi,
in it's current form the AES implementation (https://github.com/contiki-os/contiki/blob/master/core/lib/aes-128.c) appears to be vulnerable to timing attacks due to the use of data-dependent (and…
-
## What is the proposed Cheat Sheet about?
The CS will provide an on overview of SSCS, its relevance to developers, and practical guidance on improving the security of SSCs.
## What security…
-
**Is your feature request related to a problem? Please describe.**
Our security scanning software keeps needing to have exceptions put in place for new releases. Would it be possible for IBM to sig…