pullrequests Search Results · code of conduct is:locked is:issue archived:false language:Shell language:HTML language:Shell language:MATLAB language:Python language:R is:public language:C language:MDX is:unmerged language:Go
Filter by
1.1k results (1 s)
1.1k results
... reject comments, commits, code, wiki edits,
issues, and other contributions that are not aligned to this Code of Conduct, and will communicate reasons for
moderation decisions when appropriate.
Scope ...
documentation
duplicate
enhancement
good first issue
help wanted
invalid
... follow the PSF Code of Conduct (link
below).
Finally, thanks once again for your time and effort. If you have any
feedback regarding your experience contributing here, please let us know!
Helpful ...
Thank you for contributing to Spellbook 🪄
Please open the PR in draft and mark as ready when you want to request a review.
Description:
[...]
quick links for more information:
- README.md
- spellbook ...
WIP
... smuggler—manually hacking ZIP files to convince Anytype that my existing data actually exists.
I’ve been warning you about this mention-blindness and the destructive nature of the current ...
This post has been flagged for review by Ultralytics Actions due to possible spam, abuse, or off-topic content. For more
information please see our:
- Code of Conduct
- Security Policy
For ...
Alert
... active, 883 packets over 17.7 seconds, zero crashes, clean audio
output verified via WavSink.
AI was used to assist with development of this PR. I understand fully what the code does.
Information
- [x ...
invalid
... {
return c.SendString( test )
})
log.Fatal(app.Listen( :3000 ))
}
Checklist:
- [x] I agree to follow Fiber s Code of Conduct.
- [x] I have checked for existing issues that describe my problem ...
☢️ Bug
v3
... layer in decrypt_rtp() using davey.DaveSession.decrypt()
- Fixed _decrypt_rtp_aead_xchacha20_poly1305_rtpsize() to use the dynamic offset returned by
update_extended_header() instead of ...
invalid
What kind of changes does this PR include?
- Code review feedback
Description
Conducted comprehensive code review of the feedback feature implementation. Identified critical security ...