-
Your list includes a lot of major ISP ASN's from Australia, this list cannot be trusted for use in a WAF.
-
# Problem Description
DNS filtering is a great way to block unsolicited content if the code downloading it depends on local DNS servers to find the IP address of the source endpoint. However code t…
-
# Related Addresses
134 addresses
```
0x2fc617e933a52713247ce25730f6695920b3befe
0xd5521ec73340df8522f47ecfed7324405d9312d5
0x97df8e364d2046afde3fd4cd393b396dfff8ce5c
0x71c4fa6a4fb81f67b670b06dd…
-
Currently, rate-limiting in `aw` is required to be implemented at the application-level. It assumes that the application has the best information about per-message rate limits, and to him to apply the…
-
Pin hooks are custom processors which run on pinning operations.
We can think of:
* Pre-pinning hooks: Run before a pin operation.
* Pre-unpin hooks: Run before an unpin operation.
Mental no…
-
# Related Addresses on Arbitrum
I will further research on other chains
The meanings of colors of the nodes on the network graph at the attached url are:
Gray node:Address which is not eligible
…
-
# Lines of code
# Vulnerability details
## C4 issue
M-10: Users's tokens stuck in AutoCompound after Vault is deactivated
## Comments
AutoCompound implements a `vaults` mapping that lists acce…
-
Hello,
at the moment, using the tool one can specify an exact list of IP addresses to impersonate in a file, or it defaults to all of them.
It could be nice to:
- be able to specify them from t…
-
## Summary
This is a proposal to extend the `AntiMalware` cog to automatically submit file links and attachments to the VirusTotal API for testing.
https://developers.virustotal.com/reference/ov…
-
We need to design a policy (or something) that covers how we make this system secure and the processes that will keep it secure.
Also, where to send security reports and who is responsible for deal…