Debugger script embedded in debuggable program source code

    公开(公告)号:US12111749B2

    公开(公告)日:2024-10-08

    申请号:US18177666

    申请日:2023-03-02

    CPC分类号: G06F11/3624 G06F11/3632

    摘要: An enhanced compiler recognizes debug script which is embedded with program statements in a source code, and emits compiled code containing various debugger command instructions among program instructions. Embedded commands are not limited to break or assert statements. Different portions of a program's compiled code are either tailored for debugging or else performance optimized, depending on the location and kind of embedded debug script statements. Debugger commands for debugging race conditions, intermittent bugs, mutation testing code versions, and other complex development challenges are documented and versioned as part of the source code. Program process execution paths are chosen based on call stack search results, touch counts, breakpoint status, and other data accessed via a debugger. Debug script statements are categorized and utilized to balance debugging support against performance optimization in code from a source generator, or just-in-time code.

    Dangling domain detection and access mitigation

    公开(公告)号:US11973796B2

    公开(公告)日:2024-04-30

    申请号:US17223174

    申请日:2021-04-06

    IPC分类号: H04L9/40 H04L61/4511

    摘要: Embodiments detect risky situations in which a domain name record remains viable after the target it identified is not. Such dangling records create various risks because substitute targets, such as fraudulent websites, may be installed without the knowledge of the original target's owner. By obtaining and correlating data from multiple tenants, a cloud service provider detects dangling structures and any attempts to exploit them. Dangling records may specify a custom domain name, for example, or a static IP address that can be misused. In response, the provider's security infrastructure can alert the original target's owner, block the attempted exploit, or otherwise mitigate the risks. Traffic monitoring, control plane API invocations, and domain name server queries may be employed by the security infrastructure to detect resource deletion, resource creation, and resource access attempts that correspond with vulnerable records or suspect activity involving them.

    Software development autocreated suggestion provenance

    公开(公告)号:US11900080B2

    公开(公告)日:2024-02-13

    申请号:US16924316

    申请日:2020-07-09

    IPC分类号: G06F8/33 G06F8/70

    CPC分类号: G06F8/33 G06F8/70

    摘要: Some embodiments determine automatically which synthesized or otherwise autocreated suggestions for source code editing are presented to developers. Some filter out autocreated coding suggestions that have not been sufficiently endorsed by a developer's team, based on a suggestion trust score. The trust score may reflect the suggestion's adoption in a particular repository or codebase, or affiliation of the suggestion with a library release, or an actual or implied review of the suggestion by team members. Some suggestion filters enhance existing development team code review practices, by offering endorsed suggestions in autocompletion or analysis interfaces of tools and by withholding non-endorsed suggestions from display. Context illustrating the autocreated suggestion's provenance may be displayed to help developers decide whether to adopt the suggestion themselves while editing code. Some tools that are enhanced with suggestion filtering functionality avoid developer configuration burdens while increasing consistent adoption of endorsed suggestions inside a codebase.

    Transparently remote execution of development tool extensions

    公开(公告)号:US11455175B2

    公开(公告)日:2022-09-27

    申请号:US16036815

    申请日:2018-07-16

    摘要: Enhancements described support transparent remote execution of development tool extensions. Compute-intensive extensions may be executed on an extension machine external to a developer machine which runs a user interface renderer of the development tool. User interface extensions may run locally. Instead of sharing a filesystem, the renderer on the developer machine and an extension host and extension(s) on the extension machine may access distinct respective machine filesystems. Instead of spawning debug extension and other extension-support processes locally, the renderer may instruct the extension host or an extension host agent to spawn the processes remotely on the extension machine. Existing extensions and newly created extensions are binary-compatible with single-machine or multi-machine development tool deployments. Project files remain inside a firewalled and data-loss-prevention environment while being fully accessible to authorized developers working remotely and to operations performed by language servers, debug adapters, and tool extensions.

    Resource popularity assessment and utilization

    公开(公告)号:US11271865B1

    公开(公告)日:2022-03-08

    申请号:US17109416

    申请日:2020-12-02

    摘要: Computing environment resource popularity is assessed, using a computed ratio of accumulations of resource usage values and a relationship condition, thereby providing inputs as guidance for automatic system enhancement utilizations such as anomaly detection, resource management, and access or maintenance prioritization. Unlike V1 approaches that base resource popularity on at most two resource usage values, the V2 assessment approaches taught herein consider a distribution of usage values across an entire group of resources, thereby providing finer grained actionable results. Usage value accumulations may be scaled. Popularity or rareness of one or more resources of various types may be determined. A cache or other decay model may be employed to optimize assessment efficiency by reducing usage value retrieval I/O transactions. Specific utilizations of resource popularity assessments for enhancing system usability, security, functionality, and effectiveness are discussed.

    Secure communication between web frames

    公开(公告)号:US11171926B2

    公开(公告)日:2021-11-09

    申请号:US16559741

    申请日:2019-09-04

    IPC分类号: H04L29/06

    摘要: Communication between web frames increases consistent application of security policies, without reducing security. A proxy receives a first request implicating a first web frame and its URL, potentially issues a sub-request and gets a sub-response, and creates a first response to the first request, including a control frame child creation in frame creation or frame navigation code. The control frame child code only permits setting and retrieving data of a browser store, using postMessage( ) without reference to external resources or external scripts. Safely sharing message data this way between frames allows the proxy to ascertain a policy based on the shared data, so the proxy and browser can apply the policy in reactions to subsequent requests, allows window frames to be associated together in the proxy, allows initialization control, supports reporting, and otherwise enhances browsing without reducing security.