-
This is more like a “trust but verify” or “trust first, consequence later” stance.
We can always verify who did what, when from the cluster’s audit logs;
however, relying on manual identity declara…
-
## Tips before filing an issue
- Have you gone through our [FAQs](https://hudi.apache.org/learn/faq/)?
- Join the mailing list to engage in conversations and get faster support at dev-subscribe@hudi.a…
-
Hello. I need help understanding some library related things. I'm trying to load a json-ld document like
```
{
"@context": "https://www.w3.org/ns/activitystreams",
"id": "https://example.soc…
-
During the development of new prompts (context: pe5sF9-2UY) and experiments with the GPT-4 API, it has come to my attention that the 'finish_reason' parameter can sometimes return the value "length," …
-
Some repos have hundreds of auto-generated files, with limited utility in actually understanding the repo.
We'll have to implement some heuristics to detect such files (based on filename and conten…
-
**What is the bug?**
The threat intel module is not creating proper alerts after matching the IoCs.
When using the the {{#ctx.alerts}} it returns empty - Different from using standard detectors in t…
-
Our logs are flooded with these kinds of messages:
```bash
DEBUG {"status":"debug","message":"datadog:Finishing inferred span"}
DEBUG {"status":"debug","message":"datadog:Discarding Xray metadata…
-
Projects like CodeT5 use masked span prediction for better context understanding. Do you think this will be necessary?
-
### What would you like to see added?
## Description
Following a recent conversation, we need to document the different scenarios in which our various storage options can be used. This will help…
-
### Description
It seems that sometimes when cve-bin-tool detects the location/filepath of a dependency, it provides the path where that dependency is locally installed in the environment rather th…