-
Here is bobbob's notes for missing strats:
(The discussion starts here: https://discord.com/channels/445948207638511616/534430696635367444/1133140860427579606)
- [x] Landing Site
- [x] 3 to 1: …
-
I think it makes sense to point more clearly out requirements, which are meant for machine-to-machine communication.
We can see many dimensions here:
* inside machine vs via some service
* intern…
-
### Acceptance criteria:
- [x] Establish severity methodology (S0 - Critical, S1 - High, S2 - Moderate, S3 - Low)
- [x] Identify which alarms fall into which categories
- [x] Review reliability l…
-
Hi,
We've found an issue with certain .png images that causes a crash in our system when processed. There seem to be some heap corruption going on but I leave that to you to deduce. The crash happ…
-
Add documentation to explain it doesn't provide any security guaranty and it's not meant to hide data.
-
Is there threat modeling done for karpenter and internal architecture document for each api endpoints it connects ?
-
Currently missing:
- Ephemeral state during synchronization requests
- NTS
-
Please report **undisclosed** or **confidential** vulnerabilities here: https://www.eclipse.org/security/
**Topics (Please mark an [x] to your Topic):**
- [ ] KICS
- [ ] Invicti
- [ ] GitGuardia…
-
**Topics (Please mark an [x] to your Topic):**
- [ ] KICS
- [ ] Invicti
- [ ] GitGuardian
- [ ] Pentesting
- [ ] Security assessment (threat modeling, code reviews)
- [ ] Trivy
- [x] Veracode…
-
getAllTBotCategories API return result
```
{'2-step verification': 'for testing authentication involving 2-step procedures involving emails or phones.', 'CPU time': 'A tester that report CPU ti…