Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 7 of 7 for malicious (0.27 sec)

  1. platforms/documentation/docs/src/docs/userguide/dep-man/01-core-dependency-management/dependency_verification.adoc

    Dependency verification is about **trust** in what you get and what you ship.
    
    Without dependency verification it's easy for an attacker to compromise your supply chain.
    There are many real world examples of tools compromised by adding a malicious dependency.
    Dependency verification is meant to protect yourself from those attacks, by forcing you to ensure that the artifacts you include in your build are the ones that you expect.
    Registered: Wed Jun 12 18:38:38 UTC 2024
    - Last Modified: Wed Feb 07 20:36:31 UTC 2024
    - 56.7K bytes
    - Viewed (0)
  2. cmd/iam.go

    	if ok {
    		parentInClaim, ok := p.(string)
    		if !ok {
    			// Reject malformed/malicious requests.
    			return false
    		}
    		// The parent claim in the session token should be equal
    		// to the parent detected in the backend
    		if parentInClaim != parentUser {
    			return false
    		}
    	} else {
    		// This is needed so a malicious user cannot
    		// use a leaked session key of another user
    		// to widen its privileges.
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Thu Jun 13 22:26:38 UTC 2024
    - 71.9K bytes
    - Viewed (0)
  3. tensorflow/c/experimental/filesystem/filesystem_interface.h

    /// `Env::LoadLibrary` or during TensorFlow's startup if they are on certain
    /// paths (although this has a security risk if two plugins register for the
    /// same filesystem and the malicious one loads before the legimitate one -
    /// but we consider this to be something that users should care about and
    /// manage themselves). In both of these cases, core TensorFlow looks for
    Registered: Sun Jun 16 05:45:23 UTC 2024
    - Last Modified: Fri May 27 17:36:54 UTC 2022
    - 53.1K bytes
    - Viewed (0)
  4. docs/changelogs/changelog_3x.md

        The fallback was necessary for servers that implemented version negotiation incorrectly. Now
        that 99.99% of servers do it right this fallback is obsolete.
     *  Fix: Do not honor cookies set on a public domain. Previously a malicious site could inject
        cookies on top-level domains like `co.uk` because our cookie parser didn't honor the [public
        suffix][public_suffix] list. Alongside this fix is a new API, `HttpUrl.topPrivateDomain()`,
    Registered: Sun Jun 16 04:42:17 UTC 2024
    - Last Modified: Sun Feb 06 14:55:54 UTC 2022
    - 50.8K bytes
    - Viewed (0)
  5. src/cmd/go/internal/modget/get.go

    to download imported code. This functionality is critical to the decentralized
    Go package ecosystem, in which code can be imported from any server,
    but it is also a potential security problem, if a malicious server finds a
    way to cause the invoked version control command to run unintended code.
    
    To balance the functionality and security concerns, the 'go get' command
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Jun 07 18:26:32 UTC 2024
    - 66.5K bytes
    - Viewed (0)
  6. pkg/controller/nodelifecycle/node_lifecycle_controller.go

    	}
    
    	_, currentReadyCondition := controllerutil.GetNodeCondition(nodeHealth.status, v1.NodeReady)
    	if currentReadyCondition == nil {
    		// Lack of NodeReady condition may only happen after node addition (or if it will be maliciously deleted).
    		// In both cases, the pod will be handled correctly (evicted if needed) during processing
    		// of the next node update event.
    		return
    	}
    
    	pods := []*v1.Pod{pod}
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat May 04 18:33:12 UTC 2024
    - 51.6K bytes
    - Viewed (0)
  7. src/net/http/request.go

    // non-nil error of type [*MaxBytesError] for a Read beyond the limit,
    // and closes the underlying reader when its Close method is called.
    //
    // MaxBytesReader prevents clients from accidentally or maliciously
    // sending a large request and wasting server resources. If possible,
    // it tells the [ResponseWriter] to close the connection after the limit
    // has been reached.
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 29 17:58:53 UTC 2024
    - 49.4K bytes
    - Viewed (0)
Back to top