How to report a security vulnerability, 101
At ISC, we sincerely value the contributions of our users, and security researchers, who analyze and probe our software for vulnerabilities.
Read postOndřej Surý gave this talk at RIPE 91: SLIDES, RECORDING
Abstract At ISC, we have developed a system based on git-changelog and danger that streamlines the changelog and release notes creation based on the merge request description. This in turn simplifies rebasing and merging (no more conflicts in the changelogs).
We also have couple more tools that help us improve the quality of the merge requests (danger based checks, linters, SPDX checks, etc…).
What's New from ISC