Security
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Here are 1,700 public repositories matching this topic...
🎉 Description
The ECDSA contract has a function toEthSignedMessage(bytes32), but we should have a function that works for any length of a bytes array:
function toEthSignedMessage(bytes s) pure internal returns (bytes32) {
return keccak256(
"\x19Ethereum Signed Message:\n",
uintToBytes(s.length),
s);
}
Where uintToBytes is implemented from an ideally
-
Updated
Jul 19, 2021 - JavaScript
-
Updated
Aug 17, 2021 - JavaScript
-
Updated
Jul 4, 2021 - JavaScript
Remove the initial shortcut sync code in viewer/db.js for v3.1. Note that to upgrade to v3.1+ you must upgrade to v3.0 first.
x-arkime-cookies
Most of the time we display FAQ links as raw URLs, like this:
But in some places (at least in Settings → Subscription → Gift cards) we just make it a link with a text.
Great tool. What if I want to search for a domain or org name in combination with all the signatures? Is this possible currently?
-
Updated
Aug 22, 2021 - JavaScript
-
Updated
Aug 18, 2021 - JavaScript
-
Updated
Aug 28, 2021 - JavaScript
If not for some particular exceptions, the status code returned from our WebAPI on error is always 500, regardless of the kind of error.
If an object already exists, for example, it should be returned as 409. If the object does not pass the schema validation, it should be a 415.
Go through the whole WebAPI and verify that the status codes are being returned correctly.
Hint: Error cl
-
Updated
Aug 18, 2021 - JavaScript
-
Updated
Aug 13, 2021 - JavaScript
-
Updated
Aug 28, 2021 - JavaScript
I've read the docs, and it seems you can pass through knex instances, but I didn't see if it supports SQLite3 - could you clarify please?
-
Updated
Aug 11, 2021 - JavaScript
-
Updated
Jul 14, 2021 - JavaScript
-
Updated
Mar 28, 2021 - JavaScript
-
Updated
Aug 29, 2021 - JavaScript
-
Updated
Aug 27, 2021 - JavaScript
-
Updated
Feb 23, 2019 - JavaScript
-
Updated
Aug 19, 2021 - JavaScript
-
Updated
Aug 15, 2021 - JavaScript
- There are still mentions of a triage worksheet. "Cloudsplaining identifies violations of least privilege in AWS IAM policies and generates a pretty HTML report with a triage worksheet. It can scan all the policies in your AWS account or it can scan a single policy file." The worksheet is mentioned several times.
- As shown in the above, there is no mention of multiple AWS accounts
- The GIF st
-
Updated
Mar 31, 2021 - JavaScript
- Wikipedia
- Wikipedia
Security apps
BackHub Backups by Rewind
Backup your GitHub repos & metadata automatically. Get daily backups that can be restored in seconds – AWS storage available
Semgrep
Code scanning at ludicrous speed. Find bugs, apply guardrails across your repos, and get feedback in PRs, Slack, or email
GuardRails
GuardRails provides continuous security feedback for modern development teams
Snyk
Find, fix (and prevent!) known vulnerabilities in your code
LGTM
Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review
WhiteSource Bolt
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
Sonatype Lift
Lift helps you find and fix your most elusive bugs so you can spend time writing great code, not debugging it
Renovate
Keep dependencies up-to-date with automated Pull Requests
Cloudback Backup
Backups your GitHub repositories, fast and secure
Sonatype DepShield
Monitor your open source components for security vulnerabilities - goodbye muda, hello kaizen
GitProtect.io
Fully manageable, most professional repository and metadata backup and recovery


Feature request
Feature description
The generated and installed config files permission are too open, any user logined on the system can read and write them. So i suggest append a
chmodcommand into Extract tar step to keep config files more safty.How the feature is useful