-
# Bug description
It appears, from installation manifests and Helm charts, that Capsule currently requires access to the highly elevated cluster-admin cluster role. This is something I think is…
-
Hi, we are just putting in https://www.orbussoftware.com/solutions/enterprise-architecture for our solution architecture modelling. Also considering Iriusrisk for cyber security threat modelling. Does…
-
## Date
Thursday 30 Nov 2023 - 10am (US eastern timezone EST) / 3pm (London, GMT)
### Zoom info
- **[Join Zoom Meeting](https://zoom.us/j/96940294948?pwd=SjFibVdiN25QSWxva3FqRHY2RUFCdz09)**
- **…
-
## Release Info
Please provide information on what you want to be included in the Eclipse Tractus-X release.
If you are not owner of this issue, please provide the information as comment to the is…
-
I have recently made a check for BA.2.86*/23I S levels.
while of course I and most of us would expect JN.1* to lead the general pattern, while S:R346T, F456L and T572I being three prominent fas…
-
# 每日安全资讯(2023-06-08)
- HackerOne Hacker Activity
- [ ] [Arbitrary write in the application's data folder and arbitrary read of server's replies from 3rd party apps.](https://hackerone.com/reports/1…
-
### Please check before submitting an issue
- [X] I am using the latest version of App Manager
- [X] I have searched the issues and haven't found anything relevant
- [X] I have read the docs
### Des…
-
## Description
> Before visiting a website, Safari may send information calculated from the website address to Google Safe Browsing and Apple to check if the website is fraudulent. For users with Chi…
-
Produce a draft capturing Personas, Components and Artifacts for discussion.
This will form basis of describing/modelling specific threats.
Updated with individual PR links
- Trust Model Introduc…
-
I will maintain in this OP a summary of current proposed syntax as I understand it to be. Note this is not authoritative, subject to change, and it may be inaccurate. Please make comments to discuss.
…