Skip to content

Commit

Permalink
Deploy the generated website via GitHub Actions
Browse files Browse the repository at this point in the history
  • Loading branch information
actions-user committed Mar 13, 2024
1 parent dbad387 commit 6989a7c
Show file tree
Hide file tree
Showing 6 changed files with 4 additions and 4 deletions.
2 changes: 1 addition & 1 deletion News.xml

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
@@ -1 +1 @@
Website last update: 2024-03-13 at 11:55:28.
Website last update: 2024-03-13 at 11:58:00.
Binary file modified bundle.zip
Binary file not shown.
2 changes: 1 addition & 1 deletion cheatsheets/Secrets_Management_Cheat_Sheet.html
Original file line number Diff line number Diff line change
Expand Up @@ -3488,7 +3488,7 @@ <h3 id="25-handling-secrets-in-memory">2.5 Handling Secrets in Memory<a class="h
implementation complexity, you are first encouraged to develop a threat model in order to clearly
surface your implicit assumptions about both your application's deployment environment as well
as understanding the capabilities of your adversaries.</p>
<p>Often attempting to protect protect secrets in memory will be considered overkill
<p>Often attempting to protect secrets in memory will be considered overkill
because as you evaluate a threat model, the potential threat
actors that you consider either do not have the capabilities to carry out such attacks
or the cost of defense far exceeds the likely impact of a compromise arising from
Expand Down
2 changes: 1 addition & 1 deletion search/search_index.json

Large diffs are not rendered by default.

Binary file modified sitemap.xml.gz
Binary file not shown.

0 comments on commit 6989a7c

Please sign in to comment.