Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Select an option

  • Save AlexChesser/4d2ddff7c46028c912ec6c714c9545da to your computer and use it in GitHub Desktop.

Select an option

Save AlexChesser/4d2ddff7c46028c912ec6c714c9545da to your computer and use it in GitHub Desktop.
tables for use in an article
A B
Summarize the security requirements and potential threats and mitigations for this repository. Step 1: Identify potential security threats. Step 2: Summarize the requirements to mitigate them.
open-ended, which might lead to a response that's less comprehensive or less well-organized structure should result in a more thorough and well-reasoned summary of security requirements.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment