
Security News
AGENTS.md Gains Traction as an Open Format for AI Coding Agents
AGENTS.md is a fast-growing open format giving AI coding agents a shared, predictable way to understand project setup, style, and workflows.
github.com/canonical/go-tpm2
This repository contains a go library for interacting with TPM 2.0 devices. Some currently supported features are:
The current support status for each command group is detailed below.
Command group | Support | Comment |
---|---|---|
Start-up | Full | |
Testing | Full | |
Session Commands | Full | |
Object Commands | Full | |
Duplication Commands | Partial | TPM2_Duplicate and TPM2_Import are supported |
Asymmetric Primitives | None | |
Symmetric Primitives | None | |
Random Number Generator | Full | |
Hash/HMAC/Event Sequences | Full | |
Attestation Commands | Full | |
Ephemeral EC Keys | None | |
Signing and Signature Verification | Full | |
Command Audit | Full | |
Integrity Collection (PCR) | Partial | TPM2_PCR_Extend, TPM2_PCR_Event, TPM2_PCR_Read and TPM2_PCR_Reset are supported |
Enhanced Authorization (EA) Commands | Partial | All commands are supported except for TPM2_PolicyLocality, TPM2_PolicyPhysicalPresence, TPM2_PolicyTemplate and TPM2_PolicyAuthorizeNV |
Hierarchy Commands | Partial | TPM2_CreatePrimary, TPM2_HierarchyControl, TPM2_Clear, TPM2_ClearControl and TPM2_HierarchyChangeAuth are supported |
Dictionary Attack Functions | Full | |
Miscellaneous Management Functions | None | |
Field Upgrade | None | |
Context Management | Full | |
Clocks and Timers | Partial | TPM2_ReadClock is supported |
Capability Commands | Full | |
Non-Volatile Storage | Partial | All commands are supported except for TPM2_NV_Certify |
Vendor Specific | None |
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
AGENTS.md is a fast-growing open format giving AI coding agents a shared, predictable way to understand project setup, style, and workflows.
Security News
/Research
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.