-
Updated
Mar 26, 2021
Security
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Here are 13,018 public repositories matching this topic...
-
Updated
Mar 31, 2021
-
Updated
Apr 15, 2021 - C++
-
Updated
Apr 15, 2021 - Python
-
Updated
Jan 16, 2021
OS/Environment
None yet, but I'm working on OS X v10.11.6 'El Capitan' client-side. (See 'The way of deployment (cloud or local)' below for details on considered server infrastructure.)
Ansible version
None yet, as I haven't yet gotten that far into setting up Algo.
Version of components from requirements.txt
Not applicable (see above.)
Summary of the pro
-
Updated
Dec 2, 2020
-
Updated
Nov 11, 2020 - Python
-
Updated
Apr 15, 2021 - C++
-
Updated
Apr 13, 2021 - Python
-
Updated
Apr 11, 2021 - Python
-
Updated
Apr 11, 2021 - Shell
-
Updated
Apr 15, 2021 - PHP
Description
Motivation
When inserting new submaps into a RIOBank, adjusting the boundaries of existing submaps is necessary, to ensure that submaps don't intersect.
Task
Implement r_io_submap_set_from and r_io_submap_set_to in libr/io/io_submap.c on siol_eternal branch:
R_API bool r_io_submap_set_from(RIOSubmap *sm, const ut64 from);
R_API bool r_io_submap_set_to(RIOSubma
-
Updated
Apr 10, 2021 - Shell
-
Updated
Apr 14, 2021 - SCSS
-
Updated
Apr 12, 2021 - JavaScript
-
Updated
Feb 23, 2021
-
Updated
Apr 15, 2021 - C++
Is your feature request related to a problem? Please describe.
May we make the Jaeger configuration maxTagValueLength be configureable for ory/x/tracing tracer.go ?
The default length 256 isn't enough for we observe the query.
Describe the solution you'd like
Configuration in yaml like
tracing:
service_name: or
🎉 Description
The ECDSA contract has a function toEthSignedMessage(bytes32), but we should have a function that works for any length of a bytes array:
function toEthSignedMessage(bytes s) pure internal returns (bytes32) {
return keccak256(
"\x19Ethereum Signed Message:\n",
uintToBytes(s.length),
s);
}
Where uintToBytes is implemented from an ideally
-
Updated
Apr 14, 2021 - JavaScript
-
Updated
Apr 15, 2021 - Go
-
Updated
Mar 30, 2021 - PHP
-
Updated
Apr 15, 2021 - Python
-
Updated
Apr 13, 2021 - Go
-
Updated
Mar 24, 2021 - Python
- Wikipedia
- Wikipedia
Security apps
Cloudback Backup
Backups your GitHub repositories, fast and secure
Dependabot Preview
Automated dependency updates for Ruby, JavaScript, Python, Go, PHP, Elixir, Rust, Java and .NET
Renovate
Keep dependencies up-to-date with automated Pull Requests
LGTM
Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review
Snyk
Find, fix (and prevent!) known vulnerabilities in your code
Sonatype DepShield
Monitor your open source components for security vulnerabilities - goodbye muda, hello kaizen
BackHub
Reliable GitHub repository backup, set up in minutes
GuardRails
GuardRails provides continuous security feedback for modern development teams
Semgrep
Find bugs and enforce code standards
WhiteSource Bolt
Detect open source vulnerabilities in real time with suggested fixes for quick remediation


I’m trying to script setup and configuration of caddy server based on a custom download that includes additional plugins (caddy-auth-portal, caddy-auth-jwt, caddy-trace, and various caddy-dns modules ).
During setup, the caddy unit file is configured to run caddy as a non priveledged user (by design).
To get certificates configured properly we are attempting to use the caddy trust command