
Security News
gem.coop Tests Dependency Cooldowns as Package Ecosystems Move to Slow Down Attacks
gem.coop is testing registry-level dependency cooldowns to limit exposure during the brief window when malicious gems are most likely to spread.
proxy.laosky.tk/gluster/glusterd2
Advanced tools
GlusterD-2.0 (GD2) is a re-implementation of GlusterD. It attempts to have better consistency, scalability and performance when compared with the current GlusterD, while also becoming more modular and easing extensibility.
Please refer to the wiki for more information.
To build GD2, just run make. If you don't have the required tools installed, run scripts/install-reqs.sh.
We use the Github pull-request model for accepting contributions. If you are not familiar with the pull request model please read "Using pull requests". For specific information on GlusterD-2.0, refer the Development Guide.
Copyright (c) 2015 Red Hat, Inc. http://www.redhat.com
This program is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License, version 3 or any later version (LGPLv3 or later), or the GNU General Public License, version 2 (GPLv2), in all cases as published by the Free Software Foundation.
FAQs
Unknown package
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
gem.coop is testing registry-level dependency cooldowns to limit exposure during the brief window when malicious gems are most likely to spread.

Security News
Following multiple malicious extension incidents, Open VSX outlines new safeguards designed to catch risky uploads earlier.

Research
/Security News
Threat actors compromised four oorzc Open VSX extensions with more than 22,000 downloads, pushing malicious versions that install a staged loader, evade Russian-locale systems, pull C2 from Solana memos, and steal macOS credentials and wallets.