-
#### Description of problem:
https://www.stigviewer.com/stig/red_hat_enterprise_linux_8/2023-09-11/finding/V-230238
The above STIG audits the presence of any keytab files in the location: `/etc/*.…
-
The security assessments were originally thought of as a "package" with each assessment building on the previous one with the idea that they make the following assessments easier/faster to complete. T…
-
I am a security researcher and recently used our designed Golang code scanning tool during security audits. During this process, I regretfully discovered some vulnerabilities in your project that ma…
-
### Details
Solution:
Metric: Primary: Security vulnerabilities identified, system uptime, mean time to repair (MTTR). Secondary: Code quality score, coverage metrics.
Search Space:
Security audi…
-
### Technical Initiative
Repository Service for TUF / Security Software Repositories Working Group
### Lifecycle Phase
incubation
### Funding amount
unknown -- help needed
### Problem Statement
…
-
# Itsourcecode "Payroll Management System " in PHP 1.0 "login.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Payroll Management System
## Vendor Homepage
+ https://itsourcecode.com/free-projec…
-
**Describe the bug**
We are in the process of a SOC2 T2 audit. Part of the process is a vulnerability assessment of all images, and containers.
We ran a static scan on the latest (0.32) Docker im…
-
## Main Objectives
- Algorithmic Stability: Develop innovative algorithmic mechanisms that ensure synthetic stablecoins maintain their peg reliably, even during periods of market volatility.
- Over-Co…
-
Track and store logs of user activity within the gateway, such as changes made to API configurations, access logs, and modifications to user permissions. This can be crucial for compliance and securit…
-
### Security program
- what should be bounties for funding security risks? Do Treasury cover payments?
- Should be hired upfront audit company?
- Do you know someone who can help us on-demand basis…