-
### Type
Suggestions for Improvement
### What would you like to report?
[FEEDBACK]: Model skewing requires altering training data, making it a form of data poisoning. Therefore it is probably bette…
-
Hello, I was just wondering what is the security process for all of these as I want to reduce possible security risk before installing the application
I have few questions in regards to this applic…
-
### 🧐 问题描述 | Problem descriptio
项目打包后,扫描出一个高危漏洞,一下为版本信息和扫描截图
"@ant-design/colors": "^3.1.0",
"@ant-design/pro-layout": "^4.10.13",
"@ant-design/pro-table": "^1.0.41",
…
-
In your [package.json](https://github.com/RabbyHub/Rabby/blob/develop/package.json) you use stuff like:
- crypto-browserify
- @ethereumjs/util (old version) AND ethereumjs-util (even older version…
-
What is the real differentiation between the OWASP API Top 10 and the OWASP Top 10? Nearly everything in this list is something in the main Top 10 in some form or another. It also suffers from the s…
-
neon2835
high
# Users can avoid the possibility of liquidation
## Summary
When the margin utilization rate of the account is lower than `maintenanceMarginRatio`, the user's account will be liquida…
-
### Type
Documentation Issue Report
### What would you like to report?
Hi team,
I would like to focus on the missing information related to the Risk Ranking number of Top 10 at the starting of the…
-
I'd like to see some verbiage in the definition of the vulnerability (and possibly the summary) that better separate supply chain vulnerability from training data poisoning. If the training data poiso…
-
inregeling is klaar. alleen nog vastleggen hoe we dit borgen in de toekomst. (security.md)
-
**Describe the bug**
We're using a combination of Jenkins and Sonar Plugin of DependencyCheck. The reports in HTML and JSON getting generated during pipeline build in Jenkins and also could see html …