File tree Expand file tree Collapse file tree 2 files changed +2
-2
lines changed
roles/os_hardening/defaults Expand file tree Collapse file tree 2 files changed +2
-2
lines changed Original file line number Diff line number Diff line change 33# exclude_paths included in this file are parsed relative to this file's location
44# and not relative to the CWD of execution. CLI arguments passed to the --exclude
55# option will be parsed relative to the CWD of execution.
6+ # add all waivers individually, since exclude_files does not support globs
67exclude_paths :
78 - .cache/ # implicit unless exclude_paths is defined in config
8- # add all waivers individually, since exclude_files does not support globs
99 - molecule/os_hardening/waivers.yaml
1010 - molecule/ssh_hardening_bsd/waivers_freebsd13.yaml
1111 - molecule/ssh_hardening_bsd/waivers_freebsd14.yaml
Original file line number Diff line number Diff line change @@ -146,7 +146,7 @@ sysctl_config:
146146 # The PTRACE system is used for debugging. With it, a single user process
147147 # can attach to any other dumpable process owned by the same user. In the
148148 # case of malicious software, it is possible to use PTRACE to access
149- # credentials that exist in memory (re-using existing SSH connections,
149+ # credentials that exist in memory (reusing existing SSH connections,
150150 # extracting GPG agent information, etc).
151151 #
152152 # A PTRACE scope of "0" is the more permissive mode. A scope of "1" limits
You can’t perform that action at this time.
0 commit comments