Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Mapper Creation Course #155

Draft
wants to merge 96 commits into
base: main
Choose a base branch
from
Draft

Mapper Creation Course #155

wants to merge 96 commits into from

Conversation

charleshu-8
Copy link
Contributor

@charleshu-8 charleshu-8 commented Jun 10, 2024

  • OHDF mapper creation course addition.

Signed-off-by: Charles Hu <[email protected]>
@charleshu-8 charleshu-8 added the documentation Improvements or additions to documentation label Jun 10, 2024
@charleshu-8 charleshu-8 self-assigned this Jun 10, 2024
Copy link

netlify bot commented Jun 10, 2024

Deploy Preview for mitre-saf-training ready!

Name Link
🔨 Latest commit dbcf0e0
🔍 Latest deploy log https://app.netlify.com/sites/mitre-saf-training/deploys/674ddc06979fd7000842c032
😎 Deploy Preview https://deploy-preview-155--mitre-saf-training.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.
Lighthouse
Lighthouse
1 paths audited
Performance: 85 (🔴 down 10 from production)
Accessibility: 97 (no change from production)
Best Practices: 92 (no change from production)
SEO: 100 (no change from production)
PWA: -
View the detailed breakdown and full score reports

To edit notification comments on pull requests, go to your Netlify site configuration.

src/courses/mappers/03.md Outdated Show resolved Hide resolved
src/courses/mappers/04.md Outdated Show resolved Hide resolved
Signed-off-by: Charles Hu <[email protected]>
Signed-off-by: Charles Hu <[email protected]>
Signed-off-by: Charles Hu <[email protected]>
Signed-off-by: Charles Hu <[email protected]>
Signed-off-by: Charles Hu <[email protected]>
Signed-off-by: Charles Hu <[email protected]>
@charleshu-8
Copy link
Contributor Author

charleshu-8 commented Aug 23, 2024

Hand-off info listed in issue here: #174

Signed-off-by: Charles Hu <[email protected]>
Copy link
Contributor

Stale pull request message

@charleshu-8 charleshu-8 marked this pull request as draft November 18, 2024 00:34
@charleshu-8 charleshu-8 linked an issue Nov 24, 2024 that may be closed by this pull request
17 tasks
@aaronlippold aaronlippold requested a review from Copilot December 2, 2024 03:47
Copy link

@Copilot Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copilot reviewed 20 out of 31 changed files in this pull request and generated 3 suggestions.

Files not reviewed (11)
  • src/courses/mappers/02.md: Evaluated as low risk
  • src/courses/mappers/05.md: Evaluated as low risk
  • src/courses/mappers/07.md: Evaluated as low risk
  • src/courses/mappers/08.md: Evaluated as low risk
  • src/courses/mappers/09.md: Evaluated as low risk
  • src/README.md: Evaluated as low risk
  • src/.vuepress/navbar.ts: Evaluated as low risk
  • src/.vuepress/sidebar.ts: Evaluated as low risk
  • src/courses/mappers/16.md: Evaluated as low risk
  • src/courses/mappers/04.md: Evaluated as low risk
  • src/courses/mappers/15.md: Evaluated as low risk
Comments skipped due to low confidence (3)

src/courses/mappers/README.md:13

  • The number '2' should be written out as 'two' for consistency.
The class is split into 2 sections.

src/courses/mappers/README.md:22

  • The use of the backslash before the asterisk might be unnecessary and could be removed for clarity.
Create a \*-to-OHDF mapper.

src/courses/mappers/14.md:138

  • The word 'accomodate' is misspelled. It should be 'accommodate'.
accomodate

src/courses/mappers/13.md Outdated Show resolved Hide resolved
src/courses/mappers/13.md Outdated Show resolved Hide resolved
"id": "CVE-2021-43529",
"status": "affected",
"cvss": 9.8,
"description": "DOCUMENTATION: A remote code execution flaw was found in the way NSS verifies certificates. This flaw allows an attacker posing as an SSL/TLS server to trigger this issue in a client application compiled with NSS when it tries to initiate an SSL/TLS connection. Similarly, a server application compiled with NSS, which processes client certificates, can receive a malicious certificate via a client, triggering the flaw. The highest threat to this vulnerability is confidentiality, integrity, as well as system availability. STATEMENT: The issue is not limited to TLS. Any applications that use NSS certificate verification are vulnerable; S/MIME is impacted as well. Similarly, a server application compiled with NSS, which processes client certificates, can receive a malicious certificate via a client. Firefox is not vulnerable to this flaw as it uses the mozilla::pkix for certificate verification. Thunderbird is affected when parsing email with the S/MIME signature. Thunderbird on Red Hat Enterprise Linux 8.4 and later does not need to be updated since it uses the system NSS library, but earlier Red Hat Enterprise Linux 8 extended life streams will need to update Thunderbird as well as NSS. MITIGATION: Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affec",
Copy link
Preview

Copilot AI Dec 2, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The description field for the vulnerability is truncated. It ends abruptly with 'Please update the affec'.

Suggested change
"description": "DOCUMENTATION: A remote code execution flaw was found in the way NSS verifies certificates. This flaw allows an attacker posing as an SSL/TLS server to trigger this issue in a client application compiled with NSS when it tries to initiate an SSL/TLS connection. Similarly, a server application compiled with NSS, which processes client certificates, can receive a malicious certificate via a client, triggering the flaw. The highest threat to this vulnerability is confidentiality, integrity, as well as system availability. STATEMENT: The issue is not limited to TLS. Any applications that use NSS certificate verification are vulnerable; S/MIME is impacted as well. Similarly, a server application compiled with NSS, which processes client certificates, can receive a malicious certificate via a client. Firefox is not vulnerable to this flaw as it uses the mozilla::pkix for certificate verification. Thunderbird is affected when parsing email with the S/MIME signature. Thunderbird on Red Hat Enterprise Linux 8.4 and later does not need to be updated since it uses the system NSS library, but earlier Red Hat Enterprise Linux 8 extended life streams will need to update Thunderbird as well as NSS. MITIGATION: Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affec",
"affecting applications. Please update the affected packages to mitigate this vulnerability."

Copilot is powered by AI, so mistakes are possible. Review output carefully before use.

Positive Feedback
Negative Feedback

Provide additional feedback

Please help us improve GitHub Copilot by sharing more details about this comment.

Please select one or more of the options
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

OHDF Mapper Development Course Enhancements
7 participants