-
# Security Audit Action Items Checklist
- [x] **Investigate Potential DoS Vulnerability**
- Perform a detailed probability analysis of DoS risks associated with Tor exit nodes, similar to the di…
-
In some cases, the user may opt for a less secure configuration in the code-generator wizard if their application has to support legacy systems that may not comply with the highest security requiremen…
-
**Title:** Extend Chirps to Scan LLM APIs for Security Issues
**Description:**
Chirps currently provides functionality to scan next-generation AI systems and checks for issues with the vectorDB.…
-
**_Reported by Andrew Boie:_**
For memory protection we want to selectively grant threads access to device driver APIs, all-or-nothing may be too coarse for security concerns. However, it may not be …
-
Outline the functional and non-functional requirements necessary for the system to meet its defined goal. This includes specifying key features, security standards, and usability criteria. Additionall…
-
In [`c7960fc`](https://github.com/joahn3/upptime2/commit/c7960fc4780addd41534954d1906f5474440137f
), Security & Telecom Systems (https://security-telecom.ro) was **down**:
- HTTP code: 0
- Response ti…
-
As part of automating the core-landing-zone and hub-env see #446 packages deployment a single script was developed that does all 3 steps
- prepare for the landing zone install - onboard the project a…
-
List architectural characteristics
Carefully extract from problem description + add obvious as a consequence from the problem nature
[Diversity Cyber Council Kata Requirements 2024](https://docs…
-
### Precondition
- [X] I understood that this template is only for feature requests and not for bug reports
### Cross-checked related issues?
- [X] I have cross-checked this overview https://github…
-
Hi,
As far as I know Destination and Protocol are necessary to create a subscription, but I don't know how to enter the value about Protocol when creating the subscription.
Not sure if the failure t…