From e4ff07bdab0ae8995569b76865f8743168089087 Mon Sep 17 00:00:00 2001 From: ulises-jeremias Date: Wed, 10 Jul 2024 10:19:21 -0300 Subject: [PATCH] Updated code --- .../CODE_SCANNING.md | 0 ...CONTINUOUS_INTEGRATION_WITH_AWS_CODE_PIPELINE.md | 0 .../CONTINUOUS_INTEGRATION_WITH_GITHUB.md | 0 .../CONTINUOUS_INTEGRATION_WITH_GITLAB.md | 0 .../DEVELOPMENT.md | 0 .../README.md | 0 .../SHIFT_LEFT_SECURITY.md | 0 .../assets/aws-codepipeline-1.png | Bin .../assets/aws-codepipeline-2.png | Bin .../assets/aws-codepipeline-3.png | Bin .../assets/aws-codepipeline-4.png | Bin .../assets/aws-codepipeline-5.png | Bin .../assets/gitlab-integration-1.png | Bin .../assets/gitlab-integration-2.png | Bin .../assets/scan-snyk.png | Bin .../assets/severity-snyk.png | Bin .../assets/snyk-cicd-check-vulnerabilites.png | Bin .../assets/snyk-cicd-example.png | Bin .../assets/snyk-github.jpeg | Bin .../assets/snyk-iac-1.png | Bin .../assets/snyk-iac-2.png | Bin .../assets/snyk-snapshots.png | Bin .../assets/snyk-vscode.png | Bin .../assets/super-linter-1.png | Bin .../assets/super-linter-2.png | Bin .../assets/trivy-github.png | Bin .../assets/trivy.png | Bin 27 files changed, 0 insertions(+), 0 deletions(-) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/CODE_SCANNING.md (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/CONTINUOUS_INTEGRATION_WITH_AWS_CODE_PIPELINE.md (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/CONTINUOUS_INTEGRATION_WITH_GITHUB.md (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/CONTINUOUS_INTEGRATION_WITH_GITLAB.md (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/DEVELOPMENT.md (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/README.md (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/SHIFT_LEFT_SECURITY.md (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/assets/aws-codepipeline-1.png (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/assets/aws-codepipeline-2.png (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/assets/aws-codepipeline-3.png (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/assets/aws-codepipeline-4.png (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/assets/aws-codepipeline-5.png (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/assets/gitlab-integration-1.png (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/assets/gitlab-integration-2.png (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/assets/scan-snyk.png (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/assets/severity-snyk.png (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/assets/snyk-cicd-check-vulnerabilites.png (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/assets/snyk-cicd-example.png (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/assets/snyk-github.jpeg (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/assets/snyk-iac-1.png (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/assets/snyk-iac-2.png (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/assets/snyk-snapshots.png (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/assets/snyk-vscode.png (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/assets/super-linter-1.png (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/assets/super-linter-2.png (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/assets/trivy-github.png (100%) rename examples/{the-ultimate-to-security-assessment-tools => the-ultimate-guide-to-security-assessment-tools}/assets/trivy.png (100%) diff --git a/examples/the-ultimate-to-security-assessment-tools/CODE_SCANNING.md b/examples/the-ultimate-guide-to-security-assessment-tools/CODE_SCANNING.md similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/CODE_SCANNING.md rename to examples/the-ultimate-guide-to-security-assessment-tools/CODE_SCANNING.md diff --git a/examples/the-ultimate-to-security-assessment-tools/CONTINUOUS_INTEGRATION_WITH_AWS_CODE_PIPELINE.md b/examples/the-ultimate-guide-to-security-assessment-tools/CONTINUOUS_INTEGRATION_WITH_AWS_CODE_PIPELINE.md similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/CONTINUOUS_INTEGRATION_WITH_AWS_CODE_PIPELINE.md rename to examples/the-ultimate-guide-to-security-assessment-tools/CONTINUOUS_INTEGRATION_WITH_AWS_CODE_PIPELINE.md diff --git a/examples/the-ultimate-to-security-assessment-tools/CONTINUOUS_INTEGRATION_WITH_GITHUB.md b/examples/the-ultimate-guide-to-security-assessment-tools/CONTINUOUS_INTEGRATION_WITH_GITHUB.md similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/CONTINUOUS_INTEGRATION_WITH_GITHUB.md rename to examples/the-ultimate-guide-to-security-assessment-tools/CONTINUOUS_INTEGRATION_WITH_GITHUB.md diff --git a/examples/the-ultimate-to-security-assessment-tools/CONTINUOUS_INTEGRATION_WITH_GITLAB.md b/examples/the-ultimate-guide-to-security-assessment-tools/CONTINUOUS_INTEGRATION_WITH_GITLAB.md similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/CONTINUOUS_INTEGRATION_WITH_GITLAB.md rename to examples/the-ultimate-guide-to-security-assessment-tools/CONTINUOUS_INTEGRATION_WITH_GITLAB.md diff --git a/examples/the-ultimate-to-security-assessment-tools/DEVELOPMENT.md b/examples/the-ultimate-guide-to-security-assessment-tools/DEVELOPMENT.md similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/DEVELOPMENT.md rename to examples/the-ultimate-guide-to-security-assessment-tools/DEVELOPMENT.md diff --git a/examples/the-ultimate-to-security-assessment-tools/README.md b/examples/the-ultimate-guide-to-security-assessment-tools/README.md similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/README.md rename to examples/the-ultimate-guide-to-security-assessment-tools/README.md diff --git a/examples/the-ultimate-to-security-assessment-tools/SHIFT_LEFT_SECURITY.md b/examples/the-ultimate-guide-to-security-assessment-tools/SHIFT_LEFT_SECURITY.md similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/SHIFT_LEFT_SECURITY.md rename to examples/the-ultimate-guide-to-security-assessment-tools/SHIFT_LEFT_SECURITY.md diff --git a/examples/the-ultimate-to-security-assessment-tools/assets/aws-codepipeline-1.png b/examples/the-ultimate-guide-to-security-assessment-tools/assets/aws-codepipeline-1.png similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/assets/aws-codepipeline-1.png rename to examples/the-ultimate-guide-to-security-assessment-tools/assets/aws-codepipeline-1.png diff --git a/examples/the-ultimate-to-security-assessment-tools/assets/aws-codepipeline-2.png b/examples/the-ultimate-guide-to-security-assessment-tools/assets/aws-codepipeline-2.png similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/assets/aws-codepipeline-2.png rename to examples/the-ultimate-guide-to-security-assessment-tools/assets/aws-codepipeline-2.png diff --git a/examples/the-ultimate-to-security-assessment-tools/assets/aws-codepipeline-3.png b/examples/the-ultimate-guide-to-security-assessment-tools/assets/aws-codepipeline-3.png similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/assets/aws-codepipeline-3.png rename to examples/the-ultimate-guide-to-security-assessment-tools/assets/aws-codepipeline-3.png diff --git a/examples/the-ultimate-to-security-assessment-tools/assets/aws-codepipeline-4.png b/examples/the-ultimate-guide-to-security-assessment-tools/assets/aws-codepipeline-4.png similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/assets/aws-codepipeline-4.png rename to examples/the-ultimate-guide-to-security-assessment-tools/assets/aws-codepipeline-4.png diff --git a/examples/the-ultimate-to-security-assessment-tools/assets/aws-codepipeline-5.png b/examples/the-ultimate-guide-to-security-assessment-tools/assets/aws-codepipeline-5.png similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/assets/aws-codepipeline-5.png rename to examples/the-ultimate-guide-to-security-assessment-tools/assets/aws-codepipeline-5.png diff --git a/examples/the-ultimate-to-security-assessment-tools/assets/gitlab-integration-1.png b/examples/the-ultimate-guide-to-security-assessment-tools/assets/gitlab-integration-1.png similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/assets/gitlab-integration-1.png rename to examples/the-ultimate-guide-to-security-assessment-tools/assets/gitlab-integration-1.png diff --git a/examples/the-ultimate-to-security-assessment-tools/assets/gitlab-integration-2.png b/examples/the-ultimate-guide-to-security-assessment-tools/assets/gitlab-integration-2.png similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/assets/gitlab-integration-2.png rename to examples/the-ultimate-guide-to-security-assessment-tools/assets/gitlab-integration-2.png diff --git a/examples/the-ultimate-to-security-assessment-tools/assets/scan-snyk.png b/examples/the-ultimate-guide-to-security-assessment-tools/assets/scan-snyk.png similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/assets/scan-snyk.png rename to examples/the-ultimate-guide-to-security-assessment-tools/assets/scan-snyk.png diff --git a/examples/the-ultimate-to-security-assessment-tools/assets/severity-snyk.png b/examples/the-ultimate-guide-to-security-assessment-tools/assets/severity-snyk.png similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/assets/severity-snyk.png rename to examples/the-ultimate-guide-to-security-assessment-tools/assets/severity-snyk.png diff --git a/examples/the-ultimate-to-security-assessment-tools/assets/snyk-cicd-check-vulnerabilites.png b/examples/the-ultimate-guide-to-security-assessment-tools/assets/snyk-cicd-check-vulnerabilites.png similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/assets/snyk-cicd-check-vulnerabilites.png rename to examples/the-ultimate-guide-to-security-assessment-tools/assets/snyk-cicd-check-vulnerabilites.png diff --git a/examples/the-ultimate-to-security-assessment-tools/assets/snyk-cicd-example.png b/examples/the-ultimate-guide-to-security-assessment-tools/assets/snyk-cicd-example.png similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/assets/snyk-cicd-example.png rename to examples/the-ultimate-guide-to-security-assessment-tools/assets/snyk-cicd-example.png diff --git a/examples/the-ultimate-to-security-assessment-tools/assets/snyk-github.jpeg b/examples/the-ultimate-guide-to-security-assessment-tools/assets/snyk-github.jpeg similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/assets/snyk-github.jpeg rename to examples/the-ultimate-guide-to-security-assessment-tools/assets/snyk-github.jpeg diff --git a/examples/the-ultimate-to-security-assessment-tools/assets/snyk-iac-1.png b/examples/the-ultimate-guide-to-security-assessment-tools/assets/snyk-iac-1.png similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/assets/snyk-iac-1.png rename to examples/the-ultimate-guide-to-security-assessment-tools/assets/snyk-iac-1.png diff --git a/examples/the-ultimate-to-security-assessment-tools/assets/snyk-iac-2.png b/examples/the-ultimate-guide-to-security-assessment-tools/assets/snyk-iac-2.png similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/assets/snyk-iac-2.png rename to examples/the-ultimate-guide-to-security-assessment-tools/assets/snyk-iac-2.png diff --git a/examples/the-ultimate-to-security-assessment-tools/assets/snyk-snapshots.png b/examples/the-ultimate-guide-to-security-assessment-tools/assets/snyk-snapshots.png similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/assets/snyk-snapshots.png rename to examples/the-ultimate-guide-to-security-assessment-tools/assets/snyk-snapshots.png diff --git a/examples/the-ultimate-to-security-assessment-tools/assets/snyk-vscode.png b/examples/the-ultimate-guide-to-security-assessment-tools/assets/snyk-vscode.png similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/assets/snyk-vscode.png rename to examples/the-ultimate-guide-to-security-assessment-tools/assets/snyk-vscode.png diff --git a/examples/the-ultimate-to-security-assessment-tools/assets/super-linter-1.png b/examples/the-ultimate-guide-to-security-assessment-tools/assets/super-linter-1.png similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/assets/super-linter-1.png rename to examples/the-ultimate-guide-to-security-assessment-tools/assets/super-linter-1.png diff --git a/examples/the-ultimate-to-security-assessment-tools/assets/super-linter-2.png b/examples/the-ultimate-guide-to-security-assessment-tools/assets/super-linter-2.png similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/assets/super-linter-2.png rename to examples/the-ultimate-guide-to-security-assessment-tools/assets/super-linter-2.png diff --git a/examples/the-ultimate-to-security-assessment-tools/assets/trivy-github.png b/examples/the-ultimate-guide-to-security-assessment-tools/assets/trivy-github.png similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/assets/trivy-github.png rename to examples/the-ultimate-guide-to-security-assessment-tools/assets/trivy-github.png diff --git a/examples/the-ultimate-to-security-assessment-tools/assets/trivy.png b/examples/the-ultimate-guide-to-security-assessment-tools/assets/trivy.png similarity index 100% rename from examples/the-ultimate-to-security-assessment-tools/assets/trivy.png rename to examples/the-ultimate-guide-to-security-assessment-tools/assets/trivy.png