Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 3 of 3 for delicious (0.05 seconds)

  1. docs/en/docs/advanced/strict-content-type.md

    Then one of your users could install it and run it locally.
    
    Then they could open a malicious website, e.g. something like
    
    ```
    https://evilhackers.example.com
    ```
    
    And that malicious website sends requests using `fetch()` with a `Blob` body to the local API at
    
    ```
    http://localhost:8000/v1/agents/multivac
    ```
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Mon Feb 23 17:45:20 GMT 2026
    - 3.2K bytes
    - Click Count (0)
  2. SECURITY.md

    BMP, GIF, WAV, RAW, RAW\_PADDED, CSV and PROTO formats. All other input formats,
    including tensorflow-io should be sandboxed if used to process untrusted data.
    
    For example, if an attacker were to upload a malicious video file, they could
    potentially exploit a vulnerability in the TensorFlow code that handles videos,
    which could allow them to execute arbitrary code on the system running
    TensorFlow.
    
    Created: Tue Apr 07 12:39:13 GMT 2026
    - Last Modified: Wed Oct 16 16:10:43 GMT 2024
    - 9.6K bytes
    - Click Count (0)
  3. README.md

        otherwise. Do not persist these and assume they can be read by a future
        version of the library.
    
    5.  Our classes are not designed to protect against a malicious caller. You
        should not use them for communication between trusted and untrusted code.
    
    6.  For the mainline flavor, we test the libraries using OpenJDK 8, 11, and 17
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Tue Sep 16 22:01:32 GMT 2025
    - 6.2K bytes
    - Click Count (0)
Back to Top