Introduction
Introduction Statistics Contact Development Disclaimer Help
Post AnuGEoKAS3xpEmMgpk by [email protected]
More posts by [email protected]
Post #AnuGEoKAS3xpEmMgpk by [email protected]
0 likes, 1 repeats
First talk of @Rejekts is "Malicious Compliance Automated: When You Have 4…
Post #AnuIbJKa3AFngLPm0u by [email protected]
0 likes, 0 repeats
Oh no, there's lots of vulns in your Docker image, wat do#kubecon #rejekts
Post #AnuIbJTnUtcu8vj8Nc by [email protected]
0 likes, 0 repeats
Answer: try to remove as much as you can from your Docker image. Use their min…
Post #AnuIbJcexwiQaPsDC4 by [email protected]
0 likes, 0 repeats
Interestingly, lots of vuln scanners break on minified Docker images because th…
Post #AnuIbJp4DodlCtg7X6 by [email protected]
0 likes, 0 repeats
@drmorr they did a very dope talk on that topic at kubecon Amsterdam! Did they …
Post #AnuIbJxZiBRhdHeunI by [email protected]
0 likes, 1 repeats
@jpetazzo in the amsterdam talk, they did not intentionally try to obfuscate th…
You are viewing proxied material from pleroma.anduin.net. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.