From caffddee9f557aec2f209b375f39acb33fdb3c75 Mon Sep 17 00:00:00 2001 From: iraspec <167219709+iraspec@users.noreply.github.com> Date: Tue, 16 Apr 2024 23:43:00 -0300 Subject: [PATCH 1/2] Test1 --- .vscode/extensions.json | 5 +++++ .vscode/settings.json | 3 +++ 2 files changed, 8 insertions(+) create mode 100644 .vscode/extensions.json create mode 100644 .vscode/settings.json diff --git a/.vscode/extensions.json b/.vscode/extensions.json new file mode 100644 index 0000000..da64bdd --- /dev/null +++ b/.vscode/extensions.json @@ -0,0 +1,5 @@ +{ + "recommendations": [ + "checkpoint.spectral-checkpoint-vscode-extension" + ] +} \ No newline at end of file diff --git a/.vscode/settings.json b/.vscode/settings.json new file mode 100644 index 0000000..e7135d2 --- /dev/null +++ b/.vscode/settings.json @@ -0,0 +1,3 @@ +{ + "spectral.scan.engines.useOssEngine": true +} \ No newline at end of file From efedb0391e4be07b2f7701126f821500fdafaada Mon Sep 17 00:00:00 2001 From: iraspec <167219709+iraspec@users.noreply.github.com> Date: Tue, 16 Apr 2024 23:50:49 -0300 Subject: [PATCH 2/2] test2 --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 8164f7b..06a18a0 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,7 @@ # Codesec Goat - + A security testbed, vulnerable by design for testing codesec pipeline solutions. @@ -9,7 +9,7 @@ _Why "goat"?_ > A common saying is that if your fence won't hold water, it won't hold a goat. Animals are very creative, and will find a way around your barriers. In the same funny analogy, a _goat repo_ demonstrates creativity and deliberate security issues that you might not expect. ## Repo Breakdown -Includes a combination of: +Includes a combination of : * Secrets, access control, hardcoding across many providers and systems * 3rd party services