TEag1e
TEag1e
 This pull request adds a [GitHub Action] workflow file that executes Qwiet preZero's Static Application Security Testing (SAST) on this PR. Once merged, it will also execute...
``` zombie -I targets.txt ``` 当targets.txt里面的条目如下所示: ``` ldap://user:miam#[email protected]:389 ``` 预期的ldap服务器是127.0.0.1,账户是user,密码是mima#123; 但是错误的将`mima`解析为Ldap服务器的地址 