-
In the WoT Discovery specification, "[security bootstrapping](https://w3c.github.io/wot-discovery/#exploration-secboot)" requires that an unauthenticated request for a Thing Description is responded t…
-
**Github username:** @JJtheAndroid
**Twitter username:** --
**Submission hash (on-chain):** 0x858dcb92a745cd5c7065a0776763294fec814e754142d458ac7d207ca68bcb2c
**Severity:** minor
**Description:**
**…
-
I have deployed the velero on aks, but microsoft inbuilt cloud defender security raised the high severity vulnerability on auto mount of access tokens for service accounts.
I would like to know on …
-
Do the tokens used to join classrooms expire? Should they? @eatyourgreens mentioned possible security considerations. Also maybe consider whether tokens should be revoked after class is full.
-
### Current Behaviour
Currently, the only possible way to auth a user is to pass credentials to the server.
Password typing can be a potential security problem, also they need to be passed
into…
-
Currently user tokens are not stored in the DB or anywhere and thus cannot be invalidated. This presents a security issue if tokens get leaked and it was possible to invalidate them before 5.3.
Id…
-
## Issue Description
We need lightweight self-contained HTML error pages that use the Creative Commons brand.
- should use Vocabulary
- should be simple and informative
- must be completely self…
-
Impacted versions: 13.0 (I believe this is the same in all versions)
oauth access tokens have an expiration time. Currently it is ignored, and once the Odoo session is established Odoo never checks…
-
**Is your request related to a problem? Please describe.**
Boomerang Flow does not have any APIs for external consumption other than triggers. We should extend Flow to support APIs to helm manage Team…
-
Hello,
First and foremost, I'd like to express my appreciation for the excellent product you have built.
Currently, `headscale` offers OIDC authorization, but its functionality appears to be som…