-
### Problem description
Security best practices recommend adhering to a periodic key rotation schedule. Frequently internal security and compliance policies mandate and enforce this practice. Guardia…
-
e.g. when inside of an app bundle it will write someplace wonky and hostile to apple-security requirements.
-
An automated security scan of 18.1.0-rc2 complained about the following dependencies:
* llvm/utils/git/requirements.txt
* gitpython==3.1.32 [CVE-2023-40590](http://web.nvd.nist.gov/view/vuln/det…
-
Hi there! I just downloaded your fork today, and I'm having trouble running the app. I stuck it in the Applications folder and double-clicked it, and I got the message saying Apple can't verify the ap…
-
### Open Questions
Is this business transaction mapped?
### Further Procedure
Security retentions: not at all (not part of the invoice) IS IN FAQ (LINK? )
Only the PrepaidAmount is indicated, bu…
-
Vulnerable Library - requests-2.31.0-py3-none-any.whl
Python HTTP for Humans.
Library home page: https://files.pythonhosted.org/packages/70/8e/0e2d847013cb52cd35b38c009bb167a1a26b2ce6cd6965bf26b47bc…
-
### User story
As a security officer, in order to ensure only users with verified identities have access to controlled or sensitive information, I would like to restrict non-government user access, re…
-
### Is this feature already requested?
- [X] I have checked "open" and "closed" issues, and this is not a duplicate.
### Feature Description
When a user is logged in, the "Login" button shoul…
-
## Description
Ensure that certain features of the application like the pricing feature, can be accessed without requiring user authentication. This allows users to interact with basic functionalitie…
-
### Windows Build Number
Microsoft Windows [Version 10.0.22000.194]
### WSL Version
- [X] WSL 2
- [ ] WSL 1
### Kernel Version
5.10.55
### Distro Version
Arch Linux (https://github.com/yuk7/Arc…