Skip to content

Commit 66aaf0c

Browse files
authored
Merge pull request #234 from Tamronimus/master
fixed indentation of implementations
2 parents a6ebcb3 + 3c799c9 commit 66aaf0c

File tree

1 file changed

+18
-18
lines changed

1 file changed

+18
-18
lines changed

src/assets/YAML/default/implementations.yaml

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -716,21 +716,21 @@ implementations:
716716
url: https://sammancoaching.org/
717717
description: |
718718
Security coaches work with software development teams to help them adopt better security practices.
719-
terraform:
720-
name: terraform
721-
tags: [IaC]
722-
url: https://www.terraform.io/
723-
description: |
724-
Terraform enables infrastructure automation for provisioning, compliance, and management of any cloud, datacenter, and service.
725-
packj:
726-
name: packj
727-
tags: [OpenSource, "Supply Chain", vulnerability]
728-
url: https://github.com/ossillate-inc/packj
729-
description: |
730-
Packj is a tool to detect software supply chain attacks. It can detect malicious, vulnerable, abandoned, typo-squatting, and other "risky" packages from popular open-source package registries, such as NPM, RubyGems, and PyPI.
731-
apiMyth:
732-
name: Top 5 API Security Myths That Are Crushing Your Business
733-
tags: [documentation, waf]
734-
url: https://thehackernews.com/2022/11/top-5-api-security-myths-that-are.html
735-
description: |
736-
There are several myths and misconceptions about API security. These myths about securing APIs are crushing your business
719+
terraform:
720+
name: terraform
721+
tags: [IaC]
722+
url: https://www.terraform.io/
723+
description: |
724+
Terraform enables infrastructure automation for provisioning, compliance, and management of any cloud, datacenter, and service.
725+
packj:
726+
name: packj
727+
tags: [OpenSource, "Supply Chain", vulnerability]
728+
url: https://github.com/ossillate-inc/packj
729+
description: |
730+
Packj is a tool to detect software supply chain attacks. It can detect malicious, vulnerable, abandoned, typo-squatting, and other "risky" packages from popular open-source package registries, such as NPM, RubyGems, and PyPI.
731+
apiMyth:
732+
name: Top 5 API Security Myths That Are Crushing Your Business
733+
tags: [documentation, waf]
734+
url: https://thehackernews.com/2022/11/top-5-api-security-myths-that-are.html
735+
description: |
736+
There are several myths and misconceptions about API security. These myths about securing APIs are crushing your business

0 commit comments

Comments
 (0)