Our red team has created a new tool to find sensitive data in the vast, wide-open.
Open source software presents unique security challenges. Here’s what you need to know.
A Red Team exercise on exploiting design decisions on GCP.
Using components with known vulnerabilities is the most common security problem in GitLab.com-hosted projects.
How to exploit a path traversal issue to gain an admin account
How does product security work differ from pen testing and hacking all the things?
Our security researcher takes a look at Gitpod and finds some access tokens under the carpet.
All fields required
Find out which plan works best for your team
Learn about pricingLearn about what GitLab can do for your team
Talk to an expert