NetworkSafety

Detailed graphics and text CORS

Explain in detail what CORS is actually doing, and master the front-end and back-end configuration of CORS parameters, so that you don't need to search for CORS in the future, but you can configure it according to your own needs

Vulnerability scanning of Docker images

Even if you have strong host-level security, infected containers can give attackers a foothold in your system. You can reduce this risk by using Docker Bench and active container vulnerability scanners such as Docker scan (snyk), Grype, Trivy, and Clair. These will help you identify issues in the container, such as outdated dependencies that may be exploited.