- Ant Design - https://ant.design/
- Atlaskit by Atlassian - https://atlaskit.atlassian.com/
- Base Web by Uber - https://baseweb.design/
- Blueprint by Palantir - https://blueprintjs.com/
- Carbon by IBM - https://www.carbondesignsystem.com/
- Elastic UI by Elastic - https://elastic.github.io/eui/
- Evergreen by Segment - https://evergreen.segment.com/
You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228
This command searches for exploitation attempts in uncompressed files in folder /var/log
and all sub folders
sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log
Assign flags right after an import to filter out the obviously bad shots and ones you'd like to keep. Use your first instinct and leave undecided ones as unflagged.
- Pick (
P
): In focus, eyes open, good positioning - Reject (
X
): Out of focus, blurry motion, eyes closed - Unflag (
U
):
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// SPDX-License-Identifier: MIT-0 | |
export interface Env { | |
} | |
export default { | |
async fetch( | |
request: Request, | |
env: Env, |