-
Updated
Aug 23, 2020
Security
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Here are 10,904 public repositories matching this topic...
-
Updated
Aug 30, 2020 - C++
-
Updated
Aug 25, 2020
-
Updated
Apr 17, 2020
OS/Environment
None yet, but I'm working on OS X v10.11.6 'El Capitan' client-side. (See 'The way of deployment (cloud or local)' below for details on considered server infrastructure.)
Ansible version
None yet, as I haven't yet gotten that far into setting up Algo.
Version of components from requirements.txt
Not applicable (see above.)
Summary of the pro
-
Updated
Aug 30, 2020 - Python
-
Updated
Sep 2, 2020 - C++
-
Updated
Sep 1, 2020 - Python
-
Updated
Sep 1, 2020 - Python
-
Updated
Jul 15, 2020
-
Updated
Aug 29, 2020 - Shell
-
Updated
Sep 1, 2020 - Python
Work environment
| Questions | Answers |
|---|---|
| OS/arch/bits (mandatory) | Ubuntu x86 64, Ubuntu ARM64, Ubuntu PPC |
| File format of the file you reverse (mandatory) | - |
| Architecture/bits of the file (mandatory) | PPC, x86/64, ARMv |
-
Updated
Aug 25, 2020 - Shell
-
Updated
Sep 1, 2020 - CSS
-
Updated
Aug 28, 2020 - Vue
-
Updated
Jan 21, 2020
-
Updated
Aug 26, 2020 - Java
-
Updated
Jul 28, 2020 - PHP
-
Updated
Aug 8, 2020 - JavaScript
Is your feature request related to a problem? Please describe.
When Hydra receives a request with a token that is no longer valid, it logs an error with what appears to be debug output:
{"debug":"Token is expired","description":"Token expired","error":"token_expired","hint":"The token expired.","level":"error","msg":"An error occurred","time":"2020-08-28T20:14:40Z"}
At high lo
-
Updated
Aug 16, 2020 - Python
-
Updated
Aug 27, 2020 - Go
-
Updated
Sep 1, 2020 - Go
Not exactly a bug, for for those who have been using Claimable in earlier versions of OZ (for the purpose of transferOwnership followed by claimOwnership) - what are the options in v2.0.0?
Relying solely on Ownable.transferOwnership lacks a safety mechanism for accidentally transferring the ownership to an incorrect address.
At present, the only alternative that I see is copying `Cla
-
Updated
Apr 5, 2020
-
Updated
Jun 28, 2020 - Python
- Wikipedia
- Wikipedia
Security apps
WhiteSource Bolt
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
LGTM
Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review
Renovate
Keep dependencies up-to-date with automated Pull Requests
GuardRails
GuardRails provides continuous security feedback for modern development teams
Dependabot Preview
Automated dependency updates for Ruby, JavaScript, Python, Go, PHP, Elixir, Rust, Java and .NET
BackHub
Reliable GitHub repository backup, set up in minutes
Sonatype DepShield
Monitor your open source components for security vulnerabilities - goodbye muda, hello kaizen
Snyk
Find, fix (and prevent!) known vulnerabilities in your code


I would like to be able to prevent certain headers (Authorization: X-Auth-Token:, etc ) from being included in the caddy logs.
I found caddyserver/caddy#3562, which is asking to be able to set an allowlist of headers, which makes sense for their use case.
In my case, a blocklist, makes more sense, as I only want to prevent a single header from being included in the