generated from ossf/project-template
Issues: ossf/wg-best-practices-os-developers
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Author
Label
Projects
Milestones
Assignee
Sort
Issues list
[New SIG] Create Python Hardening Guide
Product: Python Hardening Guide
#481
opened May 6, 2024 by
SecurityCRob
C fallthrough: Which version of the Linux kernel?
Product: Compiler Hardening Guide
#480
opened May 2, 2024 by
david-a-wheeler
Should support translations and semver versioning
Enhancement
#464
opened Apr 20, 2024 by
janderssonse
New guidance document: Correctly using Regular Expressions for Secure Input Validation
#461
opened Apr 9, 2024 by
david-a-wheeler
Work on Security Best Practices for Web Developers
helpwanted
new product idea
#367
opened Feb 27, 2024 by
torgo
Publish information about Best Practives Badge repo access needs
Product: Badges
#365
opened Feb 21, 2024 by
drusso-rh
Vtable verification during compiling C++ code
Product: Compiler Hardening Guide
#341
opened Dec 10, 2023 by
Flo4152
split-stack feature on GCC and clang compiler
Product: Compiler Hardening Guide
#340
opened Dec 9, 2023 by
Flo4152
Consider documenting additional sanitizers
Product: Compiler Hardening Guide
#336
opened Dec 6, 2023 by
AaronBallman
Compiler flags notes/comments
Product: Compiler Hardening Guide
#330
opened Dec 1, 2023 by
disconnect3d
Evaluate
-fsanitize-minimal-runtime
for possible hardening
Enhancement
Product: Compiler Hardening Guide
#326
opened Dec 1, 2023 by
david-a-wheeler
Review other documents for more C/C++ compiler option ideas
Product: Compiler Hardening Guide
#285
opened Nov 9, 2023 by
david-a-wheeler
Add -D_LIBCPP_ENABLE_HARDENED_MODE=1
Enhancement
Product: Compiler Hardening Guide
#284
opened Nov 8, 2023 by
david-a-wheeler
Options -Wtrampolines and -fstack-clash-protection not universal
Product: Compiler Hardening Guide
#277
opened Nov 4, 2023 by
david-a-wheeler
[SOSS TASK FORCE] - Create security Skills for Developers
Product: SOSS Task Force
#257
opened Oct 12, 2023 by
SecurityCRob
[SOSS TASK FORCE] - Create Secure Developer job description
Product: SOSS Task Force
#256
opened Oct 12, 2023 by
SecurityCRob
[SOSS TASK FORCE] - Create "Trained Secure Developer" Scorecard check
Product: SOSS Task Force
#255
opened Oct 12, 2023 by
SecurityCRob
Compiler Hardening Guide should include -ftrivial-auto-var-init
Enhancement
Product: Compiler Hardening Guide
#245
opened Oct 5, 2023 by
thomasnyman
Compiler Hardening Guide should recommend
-fhardened
option
Enhancement
Product: Compiler Hardening Guide
#240
opened Sep 21, 2023 by
thomasnyman
Contribution proposal: Scorecard Monitor and Scorecard API Visualizer
Enhancement
new product idea
Product: Scorecard
#238
opened Sep 19, 2023 by
justaugustus
Compiler attributes for improved security
Product: Compiler Hardening Guide
#201
opened Jul 11, 2023 by
siddhesh
Previous Next
ProTip!
Type g p on any issue or pull request to go back to the pull request listing page.