-
Updated
May 10, 2021
Security
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Here are 13,343 public repositories matching this topic...
-
Updated
May 18, 2021
-
Updated
May 11, 2021 - C++
-
Updated
Jun 2, 2021 - Python
-
Updated
May 30, 2021
OS/Environment
None yet, but I'm working on OS X v10.11.6 'El Capitan' client-side. (See 'The way of deployment (cloud or local)' below for details on considered server infrastructure.)
Ansible version
None yet, as I haven't yet gotten that far into setting up Algo.
Version of components from requirements.txt
Not applicable (see above.)
Summary of the pro
-
Updated
Dec 2, 2020
-
Updated
Nov 11, 2020 - Python
-
Updated
Jun 3, 2021 - Python
-
Updated
Jun 7, 2021 - C++
-
Updated
Jun 7, 2021 - Python
-
Updated
Jun 6, 2021 - Shell
-
Updated
Jun 5, 2021 - PHP
ARM32 build warnings
On my rpi4 (Linux liumeo-rpi4 5.4.79-v7l+ #1373 SMP Mon Nov 23 13:27:40 GMT 2020 armv7l GNU/Linux), all test errors fixed now.
pi@liumeo-rpi4:~/github/radare2/test $ r2 -v
radare2 4.6.0-git 25454 @ linux-arm-32 git.
commit: 8c742b28f089385cd76fd6b7a35cb658eb911237 build: 2020-12-20__14:25:02
pi@liumeo-rpi4:~/github/radare2/test $ r2r -L
Skipping db/archos/linux-x64 because it does not ma
-
Updated
Jun 4, 2021 - JavaScript
-
Updated
Apr 10, 2021 - Shell
-
Updated
May 29, 2021 - SCSS
-
Updated
May 1, 2021
-
Updated
Jun 7, 2021 - C++
The upstream pull got closed. It is referenced in:
This issue was created by the ORY Closed Reference Notifier GitHub action.
🎉 Description
The ECDSA contract has a function toEthSignedMessage(bytes32), but we should have a function that works for any length of a bytes array:
function toEthSignedMessage(bytes s) pure internal returns (bytes32) {
return keccak256(
"\x19Ethereum Signed Message:\n",
uintToBytes(s.length),
s);
}
Where uintToBytes is implemented from an ideally
-
Updated
Jun 6, 2021 - JavaScript
-
Updated
Jun 7, 2021 - Go
-
Updated
May 28, 2021 - PHP
-
Updated
Jun 3, 2021 - Go
-
Updated
Apr 27, 2021 - Python
-
Updated
Jun 7, 2021 - Go
- Wikipedia
- Wikipedia
Security apps
WhiteSource Bolt
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
Muse-Dev
Muse helps you find and fix your most elusive bugs so you can spend time writing great code, not debugging it
Renovate
Keep dependencies up-to-date with automated Pull Requests
Snyk
Find, fix (and prevent!) known vulnerabilities in your code
BackHub
Reliable GitHub repository backup, set up in minutes
Semgrep
Code scanning at ludicrous speed. Find bugs, apply guardrails across your repos, and get feedback in PRs, Slack, or email
LGTM
Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review
Sonatype DepShield
Monitor your open source components for security vulnerabilities - goodbye muda, hello kaizen
Cloudback Backup
Backups your GitHub repositories, fast and secure
GuardRails
GuardRails provides continuous security feedback for modern development teams


As mentioned in #3854, Let's Encrypt now provides two different chains when acquiring a certificate: one with a cross-signed root certificate (default) and one with a self-signed root certificate.
I'd like to use the alternative chain, which seems to be possible using the
preferred_chainsoption in Caddy. From what I'v