-
Updated
Oct 4, 2020
Security
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Here are 12,785 public repositories matching this topic...
-
Updated
Mar 12, 2021
-
Updated
Mar 14, 2021 - C++
-
Updated
Mar 13, 2021 - Python
-
Updated
Jan 16, 2021
OS/Environment
None yet, but I'm working on OS X v10.11.6 'El Capitan' client-side. (See 'The way of deployment (cloud or local)' below for details on considered server infrastructure.)
Ansible version
None yet, as I haven't yet gotten that far into setting up Algo.
Version of components from requirements.txt
Not applicable (see above.)
Summary of the pro
-
Updated
Dec 2, 2020
-
Updated
Nov 11, 2020 - Python
-
Updated
Mar 13, 2021 - C++
-
Updated
Mar 11, 2021 - Python
-
Updated
Mar 13, 2021 - Python
-
Updated
Mar 14, 2021 - Shell
-
Updated
Mar 15, 2021 - PHP
On Ubuntu 20.10 x64
sys/sanitize.sh
export ASAN_OPTIONS=detect_odr_violation=0
export LD_PRELOAD=/usr/lib/x86_64-linux-gnu/libasan.so.6Then run tests. Memory leak everywhere.
-
Updated
Feb 15, 2021 - Shell
-
Updated
Mar 1, 2021 - SCSS
-
Updated
Mar 10, 2021 - JavaScript
-
Updated
Mar 13, 2021 - Java
-
Updated
Feb 23, 2021
Describe the bug
Thank you for a great project and documentation. I ran into a bug (I think) while playing with the 5 minute tutorial.
When revoking an access token that is not found the hydra server returns a 404 response but this is not a defined response in the swagger specification. This leads to an error like `response status code does not match any response statuses defined for thi
-
Updated
Mar 14, 2021 - JavaScript
-
Updated
Mar 14, 2021 - Go
-
Updated
Mar 11, 2021 - PHP
-
Updated
Aug 16, 2020 - Python
🎉 Description
The ECDSA contract has a function toEthSignedMessage(bytes32), but we should have a function that works for any length of a bytes array:
function toEthSignedMessage(bytes s) pure internal returns (bytes32) {
return keccak256(
"\x19Ethereum Signed Message:\n",
uintToBytes(s.length),
s);
}
Where uintToBytes is implemented from an ideally
-
Updated
Feb 6, 2021 - Python
-
Updated
Mar 14, 2021 - Go
- Wikipedia
- Wikipedia
GitHub CTF - A Call to Hacktion!
Mar 17 - 21, 2021 • Online
GitHub Satellite India 2021
Mar 26 - 27, 2021 • Virtual
Security apps
BackHub
Reliable GitHub repository backup, set up in minutes
Renovate
Keep dependencies up-to-date with automated Pull Requests
Snyk
Find, fix (and prevent!) known vulnerabilities in your code
Sonatype DepShield
Monitor your open source components for security vulnerabilities - goodbye muda, hello kaizen
WhiteSource Bolt
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
GuardRails
GuardRails provides continuous security feedback for modern development teams
Dependabot Preview
Automated dependency updates for Ruby, JavaScript, Python, Go, PHP, Elixir, Rust, Java and .NET
LGTM
Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review
I’m trying to script setup and configuration of caddy server based on a custom download that includes additional plugins (caddy-auth-portal, caddy-auth-jwt, caddy-trace, and various caddy-dns modules ).
During setup, the caddy unit file is configured to run caddy as a non priveledged user (by design).
To get certificates configured properly we are attempting to use the caddy trust command