![Slack経由でRAGにコードレビューを依頼するBotを作成 〜 AWS SAM編 - Qiita](https://cdn-ak-scissors.b.st-hatena.com/image/square/3e9ce9394f9a62a599109ef8b6f5438e4fbc800f/height=288;version=1;width=512/https%3A%2F%2Fqiita-user-contents.imgix.net%2Fhttps%253A%252F%252Fcdn.qiita.com%252Fassets%252Fpublic%252Farticle-ogp-background-412672c5f0600ab9a64263b751f1bc81.png%3Fixlib%3Drb-4.0.0%26w%3D1200%26mark64%3DaHR0cHM6Ly9xaWl0YS11c2VyLWNvbnRlbnRzLmltZ2l4Lm5ldC9-dGV4dD9peGxpYj1yYi00LjAuMCZ3PTk3MiZoPTM3OCZ0eHQ9U2xhY2slRTclQjUlOEMlRTclOTQlQjElRTMlODElQTdSQUclRTMlODElQUIlRTMlODIlQjMlRTMlODMlQkMlRTMlODMlODklRTMlODMlQUMlRTMlODMlOTMlRTMlODMlQTUlRTMlODMlQkMlRTMlODIlOTIlRTQlQkUlOUQlRTklQTAlQkMlRTMlODElOTklRTMlODIlOEJCb3QlRTMlODIlOTIlRTQlQkQlOUMlRTYlODglOTAlMjAlRTMlODAlOUMlMjBBV1MlMjBTQU0lRTclQjclQTgmdHh0LWFsaWduPWxlZnQlMkN0b3AmdHh0LWNvbG9yPSUyMzIxMjEyMSZ0eHQtZm9udD1IaXJhZ2lubyUyMFNhbnMlMjBXNiZ0eHQtc2l6ZT01NiZzPWU5OGUxYjE3NDgzZWJhYzg1N2NkNTk3ZTdlYWM0ZmNj%26mark-x%3D142%26mark-y%3D57%26blend64%3DaHR0cHM6Ly9xaWl0YS11c2VyLWNvbnRlbnRzLmltZ2l4Lm5ldC9-dGV4dD9peGxpYj1yYi00LjAuMCZoPTc2Jnc9NzcwJnR4dD0lNDBzYWtlczkmdHh0LWNvbG9yPSUyMzIxMjEyMSZ0eHQtZm9udD1IaXJhZ2lubyUyMFNhbnMlMjBXNiZ0eHQtc2l6ZT0zNiZ0eHQtYWxpZ249bGVmdCUyQ3RvcCZzPThkZDg3NTM3N2M2NGQxM2FlYjhhMWZlMzMwOTcwOTNm%26blend-x%3D142%26blend-y%3D486%26blend-mode%3Dnormal%26s%3D5fd75ffe297aa997122ef7bc3b757421)
This is a story about 5 Low-Severity bugs I pulled together to create a simple but high severity exploit, giving me access to private repositories on Github. These vulnerabilities were reported privately and fixed in timely fashion. Here is the "timeline" of my emails. More detailed/alternative explanation. A few days ago Github launched a Bounty program which was a good motivator for me to play w
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
処理を実行中です
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く