Examine a repositorys code vulnerabilities

Assignment Help Computer Engineering
Reference no: EM133621346

Assignment Scan a GitHub Repository using Snyk

You have completed all the modules of this course. Now it is time to test your skills using GitHub and Snyk. In this final module, you will complete a project and submit your work for your peers to evaluate.

Scenario

You are an aspiring video game developer looking to create cross-platform games using a free, user-friendly game engine. And like many developers, you manage your projects using GitHub repositories. While using the GitHub Explore feature to find public repositories matching your interests, you discover the Godot Engine repository. Godot is a popular multi-platform 2D and 3D game engine that fits your needs. You want to fork the repository for personal use, but you also want to scan it for potential vulnerabilities before using its code. Releasing games with significant security issues won't help your career in the video game industry.

Instructions

This project involves two tasks.

Task I: Fork a public repository

A. Fork the godot repository to your personal GitHub account.

Task II: Examine a repository's code vulnerabilities

A. Import and scan the code of your godot fork.

B. Examine the Snyk security report for your godot fork.

Task III

A. Provide a screenshot showing that you have forked the godot repository to your GitHub account.

Task IV

A. Provide a screenshot from your Snyk Projects page showing that you have imported and scanned your godot fork.

B. Provide a screenshot showing the Snyk Overview page that displays the results from scanning your godot fork.

Reference no: EM133621346

Questions Cloud

Explain ontological assumptions of this orientation : Next, state the philosophical orientation that reflects your worldview and explain the epistemological and ontological assumptions of this orientation.
Liquid heating unit located in mechatronics lab : There is a problem with the Liquid Heating unit located in the Mechatronics Lab. The unit is powered by an electrical 120V AC source and pressurized air.
Summarize article immanuel kants moral theory : Article "Aune, Bruce, 1979, Kant's Theory of Morals. Princeton, NJ: Princeton U. P. And this article "Sullivan, Roger J., 1989, Immanuel Kant's Moral Theory.
Develop risk management plan for the project : You have been asked by the office move project manager to develop a Risk Management Plan for the project. What information should you include in this plan?
Examine a repositorys code vulnerabilities : Examine a repository's code vulnerabilities. Provide a screenshot showing that you have forked the godot repository to your GitHub account.
Workers compensation coverage to meet minimum standards : Federal and state laws require employers to maintain workers' compensation coverage to meet minimum standards, covering a majority of employees
Discussed how to observe trend : We discussed how to observe a trend. What are the major elements in determining the trend? How do we select the right time period to get a balanced view?
Define philosophy : Define philosophy and then distinguish and define each of the three main branches of philosophy of the three branches summary of 600 words.
What is a system perspective in systems analysis and design : What is a System Perspective in systems analysis and design? Describe how a data-driven system is different from other business systems.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd