-
- Divide security analysis into multiple segments
- List models that can be used for analysis or approach
- Brief about vulnerabilities
-
Maybe we should use [Snyk](https://snyk.io/) or another tool to look at the source code during CI (and to run locally).
-
- Divide security analysis into multiple segments
- List models that can be used for analysis or approach
- Brief about vulnerabilities
-
### Please share any additional details on this topic
To help address some of the questions on security for projects and to help prepare them for a future security audit, we'd like to have some of ou…
-
### Code of Conduct
- [X] I have read and agree to the GitHub Docs project's [Code of Conduct](https://github.com/github/docs/blob/main/.github/CODE_OF_CONDUCT.md)
### What article on docs.githu…
-
get the lecture on security from lesson 24
use the security tools to analyse our contracts
-
Before merging `daan/api` branch into main we should conduct a thorough security analysis of the pop api implementation. This includes checking for attack vectors and more.
-
[This commit](https://github.com/operaton/operaton/commit/61073085046bf6411f27f6f1fbfeb848b8ce5099) added code which is not covered by unit tests. The coverage for the whole commit is ~64%, which brok…
-
**Objective:**
To conduct a comprehensive risk analysis for RegiUPR, identifying potential risks that could affect the app's development, deployment, and operational use.
**Job Description:**
…
-
# Potential security issues in GitHub Actions workflows
Hi! We are a research team from Radboud University in the Netherlands, currently working on security vulnerability analysis on GitHub Actions w…