awesome lint fix (#35)

* awesome-lint action fix
* fix linting errors
  * toc youtube channels entry, ignore awesome-license rule during linting
This commit is contained in:
René Helmke 2023-10-17 14:21:12 +02:00 committed by GitHub
parent 1638cd3b97
commit 3bc3511e79
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 11 additions and 10 deletions

View File

@ -13,7 +13,4 @@ jobs:
- uses: actions/checkout@v2 - uses: actions/checkout@v2
with: with:
fetch-depth: 0 # fix remark-lint:awesome-git-repo-age fetch-depth: 0 # fix remark-lint:awesome-git-repo-age
- name: Test awesome-lint with custom file path - run: 'npx awesome-lint "readme.md"'
uses: jthegedus/github-action-awesome-lint@68fc989d5a01aa127ce502a59f72ebe4166386f1 # commit_sha of tag v0.1.0
with:
args: 'readme.md'

View File

@ -1,3 +1,4 @@
<!--lint ignore awesome-license-->
<div align="center"> <div align="center">
<img width="500" height="350" src="iot_awesome_logo.svg" alt="Awesome"> <img width="500" height="350" src="iot_awesome_logo.svg" alt="Awesome">
<br /> <br />
@ -8,8 +9,8 @@
> A curated list of awesome resources about embedded and IoT security. The list contains software and hardware tools, books, research papers and more. > A curated list of awesome resources about embedded and IoT security. The list contains software and hardware tools, books, research papers and more.
Botnets like [Mirai](<https://en.wikipedia.org/wiki/Mirai_(malware)>) have proven that there is a need for more security in embedded and IoT devices. This list shall help beginners and experts to find helpful resources on the topic. Botnets like [Mirai](<https://en.wikipedia.org/wiki/Mirai_(malware)>) have proven that there is a need for more security in embedded and IoT devices. This list shall help beginners and experts to find helpful resources on the topic.
If you are a beginner, you should have a look at the <ins>*Books*</ins> and <ins>*Case Studies*</ins> sections. If you are a beginner, you should have a look at the <ins>_Books_</ins> and <ins>_Case Studies_</ins> sections.
If you want to start right away with your own analysis, you should give the <ins>*Analysis Frameworks*</ins> a try. If you want to start right away with your own analysis, you should give the <ins>_Analysis Frameworks_</ins> a try.
They are easy to use and you do not need to be an expert to get first meaningful results. They are easy to use and you do not need to be an expert to get first meaningful results.
> Items marked with :euro: are comercial products. > Items marked with :euro: are comercial products.
@ -34,6 +35,7 @@ They are easy to use and you do not need to be an expert to get first meaningful
- [Websites](#websites) - [Websites](#websites)
- [Blogs](#blogs) - [Blogs](#blogs)
- [Tutorials and Technical Background](#tutorials-and-technical-background) - [Tutorials and Technical Background](#tutorials-and-technical-background)
- [YouTube Channels](#youtube-channels)
- [Conferences](#conferences) - [Conferences](#conferences)
- [Contribute](#contribute) - [Contribute](#contribute)
- [License](#license) - [License](#license)
@ -145,6 +147,7 @@ Software tools for analyzing embedded/IoT devices and firmware.
## Research Papers ## Research Papers
<!--lint ignore match-punctuation--> <!--lint ignore match-punctuation-->
- 2020, Oser et al: [SAFER: Development and Evaluation of an IoT Device Risk Assessment Framework in a Multinational Organization](https://dl.acm.org/doi/abs/10.1145/3414173) - 2020, Oser et al: [SAFER: Development and Evaluation of an IoT Device Risk Assessment Framework in a Multinational Organization](https://dl.acm.org/doi/abs/10.1145/3414173)
- 2019, Agarwal et al: [Detecting IoT Devices and How They Put Large Heterogeneous Networks at Security Risk](https://www.mdpi.com/1424-8220/19/19/4107) - 2019, Agarwal et al: [Detecting IoT Devices and How They Put Large Heterogeneous Networks at Security Risk](https://www.mdpi.com/1424-8220/19/19/4107)
- 2019, Almakhdhub et al: [BenchIoT: A Security Benchmark for the Internet of Things](https://nebelwelt.net/publications/files/19DSN.pdf) - 2019, Almakhdhub et al: [BenchIoT: A Security Benchmark for the Internet of Things](https://nebelwelt.net/publications/files/19DSN.pdf)
@ -226,6 +229,7 @@ Software tools for analyzing embedded/IoT devices and firmware.
- [UART explained](https://www.mikroe.com/blog/uart-serial-communication) - An in depth explanation of the UART protocol. - [UART explained](https://www.mikroe.com/blog/uart-serial-communication) - An in depth explanation of the UART protocol.
### YouTube Channels ### YouTube Channels
- [Flashback Team](https://www.youtube.com/c/FlashbackTeam) - A duo of hackers explaining their step by step approach to finding and exploiting vulnerabilities in embedded devices. - [Flashback Team](https://www.youtube.com/c/FlashbackTeam) - A duo of hackers explaining their step by step approach to finding and exploiting vulnerabilities in embedded devices.
- [StackSmashing](https://www.youtube.com/c/stacksmashing) - Reverse engineering and hardware hacking of embedded devices. - [StackSmashing](https://www.youtube.com/c/stacksmashing) - Reverse engineering and hardware hacking of embedded devices.