-
Updated
Aug 23, 2021
Security
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Here are 14,048 public repositories matching this topic...
-
Updated
Aug 8, 2021
-
Updated
Sep 2, 2021 - C++
-
Updated
Sep 2, 2021 - Python
-
Updated
Aug 2, 2021
OS/Environment
None yet, but I'm working on OS X v10.11.6 'El Capitan' client-side. (See 'The way of deployment (cloud or local)' below for details on considered server infrastructure.)
Ansible version
None yet, as I haven't yet gotten that far into setting up Algo.
Version of components from requirements.txt
Not applicable (see above.)
Summary of the pro
-
Updated
Dec 2, 2020
-
Updated
Sep 2, 2021 - Python
-
Updated
Aug 15, 2021 - Python
-
Updated
Aug 27, 2021 - Python
-
Updated
Sep 2, 2021 - C++
-
Updated
Aug 29, 2021 - Shell
-
Updated
Sep 2, 2021 - PHP
Description
Please describe what are you missing or wanting to be improved
Recently I read a new syntax coloring technique for programing languages. Instead of highlighting grammar, highlight the things you are likely to mistake. So make sure strcpy
and strncpy
are easily distinguishable by their color. It would be cool to apply this to immediate values in assembly and the ?
command
Feature request
Feature description
The generated and installed config files permission are too open, any user logined on the system can read and write them. So i suggest append a chmod
command into Extract tar step to keep config files more safty.
How the feature is useful
-
Updated
Aug 18, 2021 - Shell
-
Updated
Aug 5, 2021 - SCSS
🎉 Description
The ECDSA
contract has a function toEthSignedMessage(bytes32)
, but we should have a function that works for any length of a bytes
array:
function toEthSignedMessage(bytes s) pure internal returns (bytes32) {
return keccak256(
"\x19Ethereum Signed Message:\n",
uintToBytes(s.length),
s);
}
Where uintToBytes
is implemented from an ideally
-
Updated
May 1, 2021
-
Updated
Sep 1, 2021 - C++
The upstream pull got closed. It is referenced in:
This issue was created by the ORY Closed Reference Notifier GitHub action.
-
Updated
Sep 2, 2021 - Go
-
Updated
Jul 19, 2021 - JavaScript
-
Updated
Aug 21, 2021 - Go
-
Updated
Jul 3, 2021 - PHP
-
Updated
Aug 28, 2021 - Python
- Wikipedia
- Wikipedia
Security apps
GitProtect.io Backup
Fully manageable, most professional repository and metadata backup and recovery
Sonatype Lift
Lift helps you find and fix your most elusive bugs so you can spend time writing great code, not debugging it
BackHub Backups by Rewind
Backup your GitHub repos & metadata automatically. Get daily backups that can be restored in seconds – AWS storage available
Sonatype DepShield
Monitor your open source components for security vulnerabilities - goodbye muda, hello kaizen
Renovate
Keep dependencies up-to-date with automated Pull Requests
Snyk
Find, fix (and prevent!) known vulnerabilities in your code
WhiteSource Bolt
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
Cloudback Backup
Backups your GitHub repositories, fast and secure
Semgrep
Code scanning at ludicrous speed. Find bugs, apply guardrails across your repos, and get feedback in PRs, Slack, or email
GuardRails
GuardRails provides continuous security feedback for modern development teams
LGTM
Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review
I’m trying to script setup and configuration of caddy server based on a custom download that includes additional plugins (caddy-auth-portal, caddy-auth-jwt, caddy-trace, and various caddy-dns modules ).
During setup, the caddy unit file is configured to run caddy as a non priveledged user (by design).
To get certificates configured properly we are attempting to use the caddy trust command