-
Draft: Prevent errors in security policy rule schedule 1 of 1 checklist item completed
-
Create worker to sync scan result policies for multiple projects 1 of 1 checklist item completed
-
Draft: Add rule index to scan_result_policies 1 of 1 checklist item completed
-
Update approvers fetching to include role approvers 0 of 1 checklist item completed
-
Add graphql query to get project members count by role 1 of 1 checklist item completed
-
Draft: PoC: Use database to synchronize approval rules for Scan Result Policies 0 of 1 checklist item completed
-
Draft: Hide tags input for select scanners 1 of 1 checklist item completed
-
Draft: Add security_policy_bot user for scan execution policies 0 of 1 checklist item completed
-
Draft: Migrate vulnerability_identifiers with incorrect project_id 0 of 1 checklist item completed
-
Draft: Bring Container scanning to free 0 of 1 checklist item completed
-
Draft: Remove orchestration policies feature flag 0 of 1 checklist item completed
-
Draft: Add spec to check if finding location is nil 0 of 1 checklist item completed
-
Add policy name to ScanExecutionPolicyCommit mutation 11 of 14 checklist items completed
-
Draft: PoC: Improve container scan matching 0 of 14 checklist items completed
-
Fix race condition while creating protected branch rules 11 of 14 checklist items completed
-
Remove ModSecurity references from linter configuration 6 of 6 checklist items completed
-
Add graphql mutation to create scan execution policy 5 of 14 checklist items completed
-
WIP: Add schedule rule type to Scan Policies 0 of 14 checklist items completed
-
Draft: Experiment for adding internal API to openAPI 0 of 1 checklist item completed
-
Draft: Make scan finding more readable 0 of 1 checklist item completed