LGTMOvjeren akaunt

@LGTM

LGTM is a variant analysis platform designed to help developers ship secure code. Community-driven security analysis by - FREE for .

Vrijeme pridruživanja: srpanj 2016.

Tweetovi

Blokirali ste korisnika/cu @LGTM

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @LGTM

  1. Prikvačeni tweet
    24. tra 2019.

    We've just launched our App for LGTM, part of our migration away from the OAuth API. It's now simpler than ever to enable automated code review for your projects, with much tighter control over permissions, and many of other benefits!

    Poništi
  2. proslijedio/la je Tweet
    2. pro 2019.

    ICYMI: We're running a CTF until December 31st. Write a CodeQL query to find a specific class of DOM-based XSS vulns. The 2 best submissions will win Nintendo Switches, and 10 additional entries will receive coupons that can be used for GitHub Swag.

    Poništi
  3. proslijedio/la je Tweet

    Learn how our security researcher found wireless vulnerabilities in the Linux Kernel, and variants, thanks to CodeQL:

    Poništi
  4. proslijedio/la je Tweet

    Want to challenge your vulnerability hunting skills? Try our latest Capture The Flag and discover XSS-unsafe jQuery plugins:

    Poništi
  5. proslijedio/la je Tweet

    Check out the GitHub Security Lab bounty program! . Write a query, find bugs, get rewarded.

    Poništi
  6. 14. stu 2019.

    Welcome to the GitHub Security Lab ! Join us and contribute to secure the world's code! Visit

    Poništi
  7. 1. lis 2019.

    Now in beta! LGTM is supporting Golang and we have some projects that you can explore. Check them out and suggest others you'd like us to analyze.

    Poništi
  8. 26. ruj 2019.

    Attending Amsterdam? will be talking about how to find and prevent entire classes of security vulnerabilities tomorrow.

    Poništi
  9. proslijedio/la je Tweet
    23. ruj 2019.

    See how you can use a known vulnerability to find entire classes of that bug in your code base. Check out this blog post:

    Poništi
  10. proslijedio/la je Tweet
    19. ruj 2019.

    Ever wish you had an extra team member to review each pull request with laser focus on security? Join a live discussion and demo with Semmle's (CEO and founder) and (CSO) on community-powered secure development.

    Poništi
  11. proslijedio/la je Tweet
    18. ruj 2019.

    4/7 remains available and free for open source. Try it on your own projects, and let us know how it works for you!

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    18. ruj 2019.

    Today we welcome to the GitHub family! We’re excited to bring the world’s most powerful semantic code engine to the world’s largest developer community🔥

    Poništi
  13. proslijedio/la je Tweet
    18. ruj 2019.

    Big news! Semmle is joining the team to bring community-powered security analysis to millions of developers. Learn more from Semmle CEO here:

    Poništi
  14. proslijedio/la je Tweet
    17. ruj 2019.

    ICYMI: QL snapshots for analysis of large open source projects are now available. If you want to perform on large OSS projects, get more info here:

    Poništi
  15. 13. ruj 2019.

    Does a developer's emotional state of mind affect the code they write? Our data science team investigates the impact of angry devs

    Poništi
  16. proslijedio/la je Tweet
    10. ruj 2019.

    Are you a developer? We take a look at different categories of concerns and how to find and fix them with QL

    Poništi
  17. proslijedio/la je Tweet
    6. ruj 2019.

    The Challenge ends today! Last chance to submit your QL query for a chance to win wireless headphones. Winners will be announced next week... stay tuned!

    Poništi
  18. 4. ruj 2019.

    Are unit tests really effective in preventing bugs? We analyzed over 50k LGTM projects in Java, Python, and Javascript to find out.

    Poništi
  19. proslijedio/la je Tweet
    28. kol 2019.

    . shares what "open security" means to him and highlights OSS-Fuzz, and other projects which are leading the way.

    Poništi
  20. proslijedio/la je Tweet
    27. kol 2019.

    We just extended the Challenge from until Sept 6! Simply follow these instructions to find real vulnerabilities in Das U-Boot using QL and submit your query for a chance to win a pair of these!

    Poništi
  21. proslijedio/la je Tweet
    22. kol 2019.

    In case you missed us at , check out the recap of 's preso on finding vulns in Das U-Boot, 's challenge, and the penthouse party with our friends from

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·