Sops is participating 2021 OSC China Open Source Project Selection , please vote for it!
Sops in 2021 OSC China Open Source Project Selection {{projectVoteCount} has been obtained in, please vote for it!
2021 OSC China Open Source Project Selection It is in hot progress. Come and vote for your favorite open source project!
2021 OSC China Open Source Project Selection>>> Midfield Review
Sops won the 2021 OSC China Open Source Project Selection "The Best Popularity Project" !
Authorization Agreement MPL-2.0
development language Google Go Rust
operating system Cross platform
Software type Open source software
Open source organizations Mozilla
region Unknown
intended for unknown
Recording time 2021-11-02

Software Introduction

Sops is an editor for encrypting files. It supports YAML, JSON, ENV, INI and BINARY formats and uses AWS KMS, GCP KMS, Azure Key Vault, age and PGP for encryption. ( demo )

Expand to read the full text

code

Gitee index of is
exceed Items for

comment

Click to lead the topic 📣 Post and join the discussion 🔥
No content temporarily
{{o.pubDate | formatDate}}

{{formatAllHtml(o.title)}}

{{parseInt(o.replyCount) | bigNumberTransform}}
{{parseInt(o.viewCount) | bigNumberTransform}}
No more
No content temporarily
Issued a question and answer
{{o.pubDate | formatDate}}

{{formatAllHtml(o.title)}}

{{parseInt(o.replyCount) | bigNumberTransform}}
{{parseInt(o.viewCount) | bigNumberTransform}}
No more
No content temporarily
Jwt go security vulnerability
Lack of authorization mechanism
Jwt go is a JWT implementation of Go language for individual developers. There are security vulnerabilities in jwt go versions before 4.0.0-preview1. An attacker can use this vulnerability to bypass the expected access restrictions when using [] string {} for m [ "aud "] (allowed by the specification).
CVE-2020-26160 MPS-2020-13786
2022-08-08 18:22
Gorilla Websocket Input Verification Error Vulnerability
Gorilla Websocket is a code base for Gorilla personal developers based on Go language. Gorilla WebSocket before 1.4.0 has an input validation error vulnerability, which is due to an integer overflow vulnerability in the length of websocket frames received through websocket connections. An attacker can use this vulnerability to launch a denial of service attack against the HTTP server that allows websocket connections.
CVE-2020-27813 MPS-2020-16819
2022-08-08 18:22
No more
Loading failed, please refresh the page
Click to load more
Loading
next page
zero comment
two Collection
 OSCHINA
Log in to view more high-quality content
 Back to top
Top