content
"}},Qt={element:"span",mutate:function(e){e.setAttribute("style","display: -webkit-flex; display: -ms-flexbox; display: flex;"),e.innerHTML='hello'}},Yt={element:"form",mutate:function(e){e.setAttribute("tabindex",0),e.setAttribute("disabled","disabled")}},en={element:"a",mutate:function(e){return e.href="#void",e.innerHTML='content
",e.firstElementChild}},xn=function(e){if(!e.ownerSVGElement&&"svg"!==e.nodeName.toLowerCase())return!1;var t=s();e.appendChild(t);var n=t.querySelector("input");return n.focus(),n.disabled=!0,e.removeChild(t),!0},yn={element:"div",mutate:function(e){return e.innerHTML=c('Learn how GitLab reduces source code risk using scanning, vulnerability management, and other key features.
Learn step-by-step how to process detected vulnerabilities and spawn merge request approval rules from critical vulnerabilities.
DORA Accelerate State of DevOps report shows opportunity lies within better security practices, including a focus on culture.
Get a behind-the-scenes look at how I helped discover the vulnerability that became CVE-2022-41903.
Use this tutorial to build an automated web application screenshot report.
Find out about the researchers who together earned more than $1 million USD in prizes and their bug hunting contributions.
Compliance mandates call for controls to prevent software tampering, improve integrity of builds and artifacts, and support attestation. Here's how GitLab can help.
Find out which plan works best for your team
Learn about pricingLearn about what GitLab can do for your team
Talk to an expert