generated from ossf/project-template
-
Notifications
You must be signed in to change notification settings - Fork 162
Issues: ossf/wg-best-practices-os-developers
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Author
Label
Projects
Milestones
Assignee
Sort
Issues list
Consider Good for newcomers
Product: Compiler Hardening Guide
-fzero-init-padding-bits=all
for C and C++ Compiler Hardening Guide
Enhancement
good first issue
#857
opened Apr 17, 2025 by
thomasnyman
Add links from Compiler Options Hardening guide to Concise guides
Product: Compiler Hardening Guide
#851
opened Apr 8, 2025 by
david-a-wheeler
Loading…
The Good for newcomers
Product: Compiler Hardening Guide
-Wconversion
warning in the Compiler Options Hardening Guide should come with a caveat for brown-field projects
good first issue
#819
opened Mar 20, 2025 by
thomasnyman
Optimization option recommendations should have caveats
Product: Compiler Hardening Guide
#660
opened Oct 14, 2024 by
thesamesam
_FORTIFY_SOURCE recommendation is a timebomb
Product: Compiler Hardening Guide
#659
opened Oct 14, 2024 by
thesamesam
Consider
-Wl,-z,separate-code
for C and C++ Compiler Hardening Guide
Enhancement
Product: Compiler Hardening Guide
#588
opened Aug 22, 2024 by
thomasnyman
Create guidance on using buffer overflow attributes in C
backlog
Enhancement
Product: Compiler Hardening Guide
#551
opened Jun 27, 2024 by
david-a-wheeler
Review "C style" ideas from mcinglis
Product: Compiler Hardening Guide
#498
opened May 20, 2024 by
david-a-wheeler
Consider documenting additional sanitizers
Product: Compiler Hardening Guide
#336
opened Dec 6, 2023 by
AaronBallman
Evaluate
-fsanitize-minimal-runtime
for possible hardening
Enhancement
Product: Compiler Hardening Guide
#326
opened Dec 1, 2023 by
david-a-wheeler
Review other documents for more C/C++ compiler option ideas
Product: Compiler Hardening Guide
#285
opened Nov 9, 2023 by
david-a-wheeler
Add -D_LIBCPP_ENABLE_HARDENED_MODE=1
Enhancement
Product: Compiler Hardening Guide
#284
opened Nov 8, 2023 by
david-a-wheeler
Compiler attributes for improved security
Product: Compiler Hardening Guide
#201
opened Jul 11, 2023 by
siddhesh
Compiler Options: GCC 13.1 analyzer options
ok to close?
Product: Compiler Hardening Guide
#147
opened Apr 26, 2023 by
david-a-wheeler
ProTip!
Adding no:label will show everything without a label.