ccoVeille

Results 195 issues of ccoVeille

Right now, there are no tests at all. It's a bit difficult for someone who wants to contribute to make sure nothing would be break when adding a new feature

Also known as one time password, or 2FA

More information about the project https://haveibeenpwned.com/About Here is an implementation for calling an external API to check for password leak. https://github.com/supabase/hibp You can look at the API information, it's secure....

https://github.com/hrishiksh/hash/blob/6fe88aa56cf34416ba10e9132f5c1ed0a7ecc24e/README.md?plain=1#L32 I think you are hex encoding password before *encrypting them*, you only mention "before storing them" It could let people things password are only protected by an hex encoding....

https://github.com/hrishiksh/hash/blob/6fe88aa56cf34416ba10e9132f5c1ed0a7ecc24e/README.md?plain=1#L11 Following our discussion on reddit you could/should rephrase this https://www.reddit.com/r/golang/comments/1cgmfws/comment/l1woir1

- **chore: fix brands name** - **chore: fix Markdown docblock identifier** - **documentation: fix a typo** - **chore: format Markdown table**

It will be incharge of opening PR if a Go dependency or a GHA should be updated

Having a license in your project would allow open-source project to use the data available in your README file as a source of data. I would like to suggest the...

I keep investigating about how to use the tool (which I love BTW :tada:) So after #165, now I would like to know how I could detect and identifier matching...

enhancement