Skip to content
#

Security

Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.

Here are 14,129 public repositories matching this topic...

caddy
bones-was-here
bones-was-here commented Sep 17, 2021

I have modified the default file_server browse template to integrate it with a website, by using httpInclude to load blocks of HTML containing the header, footer and theme. These files are hosted on the same Caddy instance, and it works well provided that compression is not enabled. When compression is enabled, the file_server browser becomes garbage: it appears that raw compressed data is inc

algo
RandomDSdevel
RandomDSdevel commented Sep 23, 2017

OS/Environment

None yet, but I'm working on OS X v10.11.6 'El Capitan' client-side. (See 'The way of deployment (cloud or local)' below for details on considered server infrastructure.)

Ansible version

None yet, as I haven't yet gotten that far into setting up Algo.

Version of components from requirements.txt

Not applicable (see above.)

Summary of the pro

Liberating Web Analytics. Star us on Github? +1. Matomo is the leading open alternative to Google Analytics that gives you full control over your data. Matomo lets you easily collect data from websites & apps and visualise this data and extract insights. Privacy is built-in. We love Pull Requests!

  • Updated Sep 20, 2021
  • PHP
swoops
swoops commented Aug 19, 2021

Description

Please describe what are you missing or wanting to be improved
Recently I read a new syntax coloring technique for programing languages. Instead of highlighting grammar, highlight the things you are likely to mistake. So make sure strcpy and strncpy are easily distinguishable by their color. It would be cool to apply this to immediate values in assembly and the ? command

shrugs
shrugs commented Apr 12, 2018

🎉 Description

The ECDSA contract has a function toEthSignedMessage(bytes32), but we should have a function that works for any length of a bytes array:

function toEthSignedMessage(bytes s) pure internal returns (bytes32) {
  return keccak256(
    "\x19Ethereum Signed Message:\n",
    uintToBytes(s.length),
    s);
}

Where uintToBytes is implemented from an ideally

grega
grega commented Sep 9, 2021

The docs at https://www.ory.sh/hydra/docs/cli/hydra-clients-import state as a description:

"Imports cryptographic keys of any format to the JSON Web Key Store

This appears to be incorrect. The description would be expected to be:

"Import OAuth 2.0 Clients from one or more JSON files"

(and this is confirmed by an earlier version of the docs for this CLI interface: https://www.ory.sh/hyd

Wikipedia
Wikipedia

Security apps

Sonatype Lift

Lift helps you find and fix your most elusive bugs so you can spend time writing great code, not debugging it

Sonatype DepShield

Monitor your open source components for security vulnerabilities - goodbye muda, hello kaizen

Semgrep

Code scanning at ludicrous speed. Find bugs, apply guardrails across your repos, and get feedback in PRs, Slack, or email

LGTM

Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review

Renovate

Keep dependencies up-to-date with automated Pull Requests

GuardRails

GuardRails provides continuous security feedback for modern development teams

BackHub Backups by Rewind

Backup your GitHub repos & metadata automatically. Get daily backups that can be restored in seconds – AWS storage available

WhiteSource Bolt

Detect open source vulnerabilities in real time with suggested fixes for quick remediation

Snyk

Find, fix (and prevent!) known vulnerabilities in your code

See more Security apps