brave / security-actionLinks
Composite GitHub CI Action containing the minimal viable security lint for brave repositories
☆19Updated this week
Alternatives and similar repositories for security-action
Users that are interested in security-action are comparing it to the libraries listed below
Sorting:
- Go wrapper for awslabs/certlint☆25Updated 5 years ago
- building blocks for tor project websites☆13Updated 2 weeks ago
- Special purpose PowHSM firmware for the RSK PowPeg.☆16Updated this week
- ☆12Updated 2 years ago
- ☆15Updated 2 months ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆90Updated 3 years ago
- ☆24Updated last week
- ☆17Updated 9 months ago
- Certificate Revocation List monitor☆44Updated last year
- Static website for security.txt.☆68Updated last month
- 💉 Surrogates are small scripts that our apps and extensions serve in place of trackers that cause site breakage when blocked.☆23Updated 6 months ago
- ☆21Updated this week
- CA Issuers Monitor (Authority Info Access)☆13Updated 2 years ago
- This is both a terrible and wonderful idea.☆12Updated 6 years ago
- ☆44Updated last month
- Fetch Metadata☆75Updated 7 months ago
- Internet-Draft on IP address privacy☆17Updated 7 months ago
- Simplified NAT Slipstream server and client☆22Updated 4 years ago
- tracking privacy reviews of W3C specifications☆15Updated 7 months ago
- Signature-based Resource Loading Restrictions☆41Updated 2 months ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆32Updated 4 months ago
- Tips to protect your personal and company data☆27Updated 5 years ago
- Open-source vulnerability disclosure policy templates.☆68Updated 3 years ago
- OCSP Responder monitor☆36Updated last year
- Syntax highlighting for Packet Description Language, as used for various Android networking components.☆25Updated last week
- Root Program parsers and SQL import script generators☆24Updated 3 weeks ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆72Updated 5 years ago
- Specifications for Privacy Proxy Implementations☆31Updated 2 weeks ago
- ☆45Updated 3 years ago
- Metrics generation for wpt.fyi☆27Updated this week