- Sort Score
- Num 10 results
- Language All
Results 1 - 3 of 3 for delicious (0.05 seconds)
-
docs/en/docs/advanced/strict-content-type.md
Then one of your users could install it and run it locally. Then they could open a malicious website, e.g. something like ``` https://evilhackers.example.com ``` And that malicious website sends requests using `fetch()` with a `Blob` body to the local API at ``` http://localhost:8000/v1/agents/multivac ```
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Mon Feb 23 17:45:20 GMT 2026 - 3.2K bytes - Click Count (0) -
SECURITY.md
BMP, GIF, WAV, RAW, RAW\_PADDED, CSV and PROTO formats. All other input formats, including tensorflow-io should be sandboxed if used to process untrusted data. For example, if an attacker were to upload a malicious video file, they could potentially exploit a vulnerability in the TensorFlow code that handles videos, which could allow them to execute arbitrary code on the system running TensorFlow.
Created: Tue Apr 07 12:39:13 GMT 2026 - Last Modified: Wed Oct 16 16:10:43 GMT 2024 - 9.6K bytes - Click Count (0) -
README.md
otherwise. Do not persist these and assume they can be read by a future version of the library. 5. Our classes are not designed to protect against a malicious caller. You should not use them for communication between trusted and untrusted code. 6. For the mainline flavor, we test the libraries using OpenJDK 8, 11, and 17Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Tue Sep 16 22:01:32 GMT 2025 - 6.2K bytes - Click Count (0)