diodb
awesome-safety-critical
diodb | awesome-safety-critical | |
---|---|---|
10 | 12 | |
955 | 1,520 | |
1.2% | - | |
7.6 | 4.7 | |
8 days ago | 11 days ago | |
Python | Python | |
Creative Commons Zero v1.0 Universal | Creative Commons Zero v1.0 Universal |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
diodb
-
How to find issues with bounties on github?
Perhaps: https://disclose.io/programs/
-
Are bug bounties programs safe for hackers?
Hi, I want to make some experience with web pentesting and I wanted to take some small bug bounty programs from disclose.io/programs/ . But to be honest I am scared that maybe I will do something wrong and I will face legal consequences š± . I am scared that by making the report they will see that I exploited the bug too much and put them in danger or something like that. I heard about white hat hackers reporting vulnerabilities and facing legal action but they discovered them without a bug bounty program like in this case https://www.bleepingcomputer.com/news/security/ethical-hacker-exposes-magyar-telekom-vulnerabilities-faces-8-years-in-jail/ What is your opinion about this ?
-
When to Report Vulnerability
2) https://disclose.io
-
We are cybersecurity researchers who wrote a book teaching people how to hack the Internet of Things, called Practical IoT Hacking. Ask us anything!
Helped develop coordinated vulnerability disclosure frameworks to allow security researchers to report security issues in good faith
- Hacking the Law: Are Bug Bounties a True Safe Harbor?
-
My disclosure mails doesn't get answered and sound like spam
I would also suggest contacting https://disclose.io/ and your National CSIRT team and ask for help. Good luck :)
-
GitHub repo of ALL known bug bounty platforms (45) and Halls of Fame (497)
Yeh, these are the different orgs that run programs on behalf of companies. For a list of the orgs running programs thereās about 2,300 of those here (also open-source and a contact work in progress): https://github.com/disclose/diodb
- diodb: Open-source vulnerability disclosure and bug bounty program database by disclose.io
- diodb: Open-source vulnerability disclosure and bug bounty program database.
- Open-source vulnerability disclosure and bug bounty program database
awesome-safety-critical
-
Aerugo ā RTOS for aerospace uses written in Rust
https://awesome-safety-critical.readthedocs.io/en/latest/#so...
-
Pacemaker should be running open source software
awesome-safety-critical: https://awesome-safety-critical.readthedocs.io/en/latest/
FDA > Medical Devices > Cybersecurity:
-
Misra C++:2023 Published
awesome-safety-critical > Coding Guidelines: https://awesome-safety-critical.readthedocs.io/en/latest/
Rust SAST and DAST tools would be great for all, too.
From https://news.ycombinator.com/item?id=35565960 :
> Additional lists of static analysis, dynamic analysis, SAST, DAST, and other source code analysis tools: https://news.ycombinator.com/item?id=24511280 https://analysis-tools.dev/tools?languages=c++
-
Ask HN: Which school produces the best programmers or software engineers?
https://awesome-safety-critical.readthedocs.io/en/latest/#co...
Predict; software quality, career success
By well-rounded do you mean the ACM Computer Science Curriculum; or a strong liberal arts program which emphasizes critical thinking and effective communication; or Emotional Intelligence, Servant Leadership, and Project Management?
InfoSec; Computer Security > Careers: https://en.wikipedia.org/wiki/Computer_security#Careers
The NIST NICE Framework describes Categories (7),
- Learning C as someone who already knows Rust
- NSA urges orgs to use memory-safe programming languages
-
The James Webb Space Telescope Runs JavaScript, Apparently
For a low level view, as how the code actually should look like, I found the JPL C coding guidelines very useful. It had an effect on me on how I wrote C after reading it.
Here's a github hosted version https://github.com/stanislaw/awesome-safety-critical/blob/ma...
-
Ask HN: Is it worth it to learn C to better understand Python?
https://news.ycombinator.com/item?id=28709239 :
> From "Ask HN: Is it worth it to learn C in 2020?" https://news.ycombinator.com/item?id=21878372 : (which discusses [bounded] memory management)
> There are a number of coding guidelines e.g. for safety-critical systems where bounded running time and resource consumption are essential. *These coding guidelines and standards are basically only available for C, C++, and Ada.*
> awesome-safety-critical > Software safety standards: https://awesome-safety-critical.readthedocs.io/en/latest/#so...
> awesome-safety-critical > Coding Guidelines: https://awesome-safety-critical.readthedocs.io/en/latest/#co...
-
Are Software Engineering ābest practicesā just developer preferences?
Critical systems: https://en.wikipedia.org/wiki/Critical_system
> There are four types of critical systems: safety critical, mission critical, business critical and security critical.
Safety-critical systems > "Software engineering for safety-critical systems" https://en.wikipedia.org/wiki/Safety-critical_system#Softwar...
awesome-safety-critical lists very many resources for safety critical systems: https://awesome-safety-critical.readthedocs.io/en/latest/
There are many certification programs for software and other STEM fields. One test to qualify applicants does not qualify as a sufficient set of controls for safety critical systems that must be resilient, fault-tolerant, and redundant.
-
Half of curlās vulnerabilities are C mistakes, "couldāve been prevented if curl had been written in Rust"
There are heuristics for memory-unsecure C: https://awesome-safety-critical.readthedocs.io/en/latest/
What are some alternatives?
IoTGoat - IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly found vulnerabilities in IoT devices.
safety-gymnasium - NeurIPS 2023: Safety-Gymnasium: A Unified Safe Reinforcement Learning Benchmark
Resources-for-Beginner-Bug-Bounty-Hunters - A list of resources for those interested in getting started in bug bounties
awesome-python - š Awesome Python Resources (mostly PyCon).
ncrack - Ncrack network authentication tool
projects - Contains a list of security related Rust projects.
resources - Tools, data, and contact lists relevant to The disclose.io Project.
analyze - NaiveSystems Analyze is a static analysis tool for code security and compliance.
Shocker
legal-bug-bounty - #legalbugbounty project ā creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.
lazyblorg - Blogging with Org-mode for very lazy people