-
**Describe the feature you'd like**
Can we enable User/ Tenant Isolation on FLowwise and Have authentication based on SSO & Having roles for viewing the flow/Editing Flow & Delete flow. Enabling Auth…
-
I'd like to be able to prove `Serilog.Expressions.dll` hasn't been tampered, but I can't since this file doesn't have a digital signature.
Signing `Serilog.Expressions.dll` in the the shipped NuGet…
-
I have problem with agent, because our company vulnerability detection system reports that http demon used by FusionInventory agent does not use HTTP security headers (X-Frame-Options, X-XSS-Protectio…
-
If underlying files of zbox `file://` storage are modified by an attacker, what worst can happen?
I expect only [selective, attacker-chosen] data loss, never executed malicious code or injected mal…
-
As the title suggests, how do we handle this cases? My group received a couple of bugs where the user tampered with the XML file directly. Example:
![image](https://user-images.githubusercontent.co…
ghost updated
5 years ago
-
Hi,
Time Machine's backup daemon, 'backupd' always alerts for TCC.db tampering when the backup is run. This is a FP. Can this filtered?
Thanks,
Csaba
-
When the app uses the JSON file to load data, and a certain patient's contact is updated to a non-personal contact number (i.e. 999), the app allows it and does not validate the number that it is a pe…
-
Hello,
when looking at sysdig-probe-loader, when it fails building locally, it retrieves pre-compiled modules from cloud/amazon s3
```
URL=$(echo https://s3.amazonaws.com/download.draios.com/$SYS…
-
### Is your feature request related to a problem? Please describe.
Currently Zarf uses a generic `application/vnd.zarf.layer.v1.blob` to describe every layer in the OCI manifest. This is confusing …
-
while installing SQLi query tampering I faced this error
![Screenshot_2022-06-26_04_37_12](https://user-images.githubusercontent.com/54332136/175797024-152e30df-6d94-400c-8878-e6fc71e8790e.png)
…