- Sort Score
- Result 10 results
- Languages All
Results 1 - 3 of 3 for compromised (0.07 sec)
-
mvnw.cmd
"$hash = (Get-FileHash \"%WRAPPER_JAR%\" -Algorithm SHA256).Hash.ToLower();"^ "If('%WRAPPER_SHA_256_SUM%' -ne $hash){"^ " Write-Error 'Error: Failed to validate Maven wrapper SHA-256, your Maven wrapper might be compromised.';"^ " Write-Error 'Investigate or delete %WRAPPER_JAR% to attempt a clean download.';"^ " Write-Error 'If you updated your Maven version, you need to update the specified wrapperSha256Sum property.';"^
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Mon Oct 14 22:24:15 UTC 2024 - 7.5K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt
* Most TLS clients that connect to hosts on the public Internet should call this method. * Otherwise it is necessary to manually prepare a comprehensive set of trusted roots. * * If the host platform is compromised or misconfigured this may contain untrustworthy root * certificates. Applications that connect to a known set of servers may be able to mitigate * this problem with [certificate pinning][CertificatePinner]. */
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 8.5K bytes - Viewed (0) -
docs/en/docs/features.md
* UUID. * ...and others. All the validation is handled by the well-established and robust **Pydantic**. ### Security and authentication Security and authentication integrated. Without any compromise with databases or data models. All the security schemes defined in OpenAPI, including: * HTTP Basic.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Thu Aug 15 23:30:12 UTC 2024 - 9.2K bytes - Viewed (0)