-
We might have some potential to slim down product images. This can reduce build time, image size and attack surface. For example, the Hive Dockerfile has a comment about Hadoop: https://github.com/sta…
-
As the list of proof types grows (see https://github.com/keybase/keybase-issues/issues/518) the keybase client will have an increasing quantity of code that goes out to the network, has an interaction…
timmc updated
7 years ago
-
### Check for previous/existing GitHub issues
- [X] I have checked for previous/existing GitHub issues
### Issue Type?
Feature Request
### (Optional) Module Version
_No response_
### (Optional) …
-
### **Security Vulnerability Report: Virtual Host Misconfiguration & Inconsistent Security Controls**
### **Vulnerability Summary**
A **Virtual Host Misconfiguration** was identified on [Ins…
-
shrink or twea kernel for reduced attack surface/remove modules we dont need?
-
->amass amass enum -config config.yaml
panic: failed to connect to `host=localhost user=username database=database`: dial error (dial tcp [::1]:5432: connect: connection refused)
goroutine 1 [runn…
-
Is this a desired feature? My knowledge on how heads does its measurements is minimal however if the output of ‘lspci -v’ can be measured the user would be informed via TOTP if their hardware has chan…
-
-
It would be nice to see a list of known vulnerabilities for the zombie web browser, plugins/extensions/addons, operating system and hardware. The end goal would be point-and-click exploitation (Admin …
-
https://github.com/search?q=org%3Aextism+%2Fuses%3A%2F+language%3AYAML&type=code
I noticed that there are many third-party actions in the extism repositories, which could potentially create an atta…