Skip to content

Apply markdownlint (23) #39471

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged

Conversation

content-bot
Copy link
Collaborator

Metadata and documentation improvements.

Copy link

github-actions bot commented Apr 6, 2025

Your contributed AlphaSOC_Wisdom pack has been modified on files:

Packs/AlphaSOC_Wisdom/Integrations/AlphaSOCWisdom/README.md
Please review the changes here

@content-bot
Copy link
Collaborator Author

⚠️ The PR is missing the ready-for-pipeline-running label. Please add the label when the PR is ready in order to proceed.

@content-bot
Copy link
Collaborator Author

Validate summary
The following errors were thrown as a part of this pr: ST111, DS108, DO106, BA103.
The following errors can be ignored: DS108.
The following errors cannot be ignored: ST111, DO106, BA103.
The following errors don't run as part of the nightly flow and therefore can be force merged: ST111, DS108, DO106, BA103.

Verdict: PR can be force merged from validate perspective? ✅

@mayyagoldman mayyagoldman changed the base branch from master to packwise/markdownlint-0421-21-26 April 22, 2025 10:03
@mayyagoldman mayyagoldman merged commit 47fd5c6 into packwise/markdownlint-0421-21-26 Apr 22, 2025
17 of 20 checks passed
@mayyagoldman mayyagoldman deleted the packwise/markdownlint-0406T1034-23 branch April 22, 2025 10:03
mayyagoldman added a commit that referenced this pull request Apr 22, 2025
* AWS-SecurityLake: Apply markdownlint

* CrowdStrikeIntel: Apply markdownlint

* Fortanix-DSM: Apply markdownlint

* C2sec: Apply markdownlint

* CheckpointFirewall: Apply markdownlint

* Arkime: Apply markdownlint

* DynamicSectionReports: Apply markdownlint

* jamf: Apply markdownlint

* Attlasian: Apply markdownlint

* NetscoutAED: Apply markdownlint

* AnsibleTower: Apply markdownlint

* Lansweeper: Apply markdownlint

* Sigma: Apply markdownlint

* ConcentricAI: Apply markdownlint

* Oracle: Apply markdownlint

* DelineaALM: Apply markdownlint

* ThreatExchange: Apply markdownlint

* ThinkstCanary: Apply markdownlint

* AlphaSOC_Wisdom: Apply markdownlint

* Tripwire: Apply markdownlint

* SandBlastAppliance: Apply markdownlint

* NGINXWebServer: Apply markdownlint

* OSQuery: Apply markdownlint

* KnowBe4KMSAT: Apply markdownlint

* SignalSciences: Apply markdownlint

---------

Co-authored-by: Content Bot <bot@demisto.com>
Co-authored-by: Maya Goldman <94686128+mayyagoldman@users.noreply.github.com>
dantavori pushed a commit that referenced this pull request May 13, 2025
* required yml fields to allow mapping

* added markdownlint hook to pre commit

* Revert Microsoft365Defender.yml to match master

* mdx-validation

* invalid.md test file

* valid

* invalid + run on mdx

* changed files

* invalid readme

* modified is_html_doc

* for file in $(git ls-files '*.md')

* refactor test

* refactor test

* refactor test

* refactor test

* Validate MDX for README.md files

* Validate MDX for README.md files

* Validate MDX for README.md files

* Validate MDX for README.md files

* fix

* only changed files

* changed

* the EOF delimiter should be alone on its own line without quotes

* `EOF'

* Validate README.md files

* Validate README.md files

* Validate README.md files

* check which files are returne

* Validate Root README.md with MDX

* Validate All README.md Files with MDX

* removed echo - too long

* removed echo - too long

* all of them

* removed echos

* eof

* fi

* done

* pass file

* collect errors

* collect errors

* collect errors

* collect errors

* collect errors

* check if html

* fix mdx

* dependencies

* read entire file + html placeholders

* exclude node mosules

* exclude node mosules

* validate-mdx hook init

* markdown lint version

* markdown lint version

* markdown lint version

* Test commit

* stage

* validate mdx custom hook

* validate mdx custom hook

* validate mdx custom hook added to template

* removed unnecessery logs

* html should pass validation

* modified logs

* removed the workflow

* removed top of file

* require_serial: true

* require_serial: true revert

* - "@mdx-js/mdx@^1.6.22"

* require_serial: true

* markdownlint hook for readmes

* test readme

* removed unneccesery logs

* mdx-validation versioning

* delete test

* revert README.md

* remove pre-commit-config

* revert test readme

* frop require serieal

* demo comments

* demo comments

* html rules

* excluded non fixable > 150 occurences rules

* md042

* MD052 and MD036 excluded

* updated markdownlint

* use markdownlint-cli2

* "default": false
 dont allow any rules

* Revert "md042"

This reverts commit f0ce628.

* added rules that currently aren't violated in content

* Revert "added rules that currently aren't violated in content"

This reverts commit cde0a8a.

* added rules that trigger 0 erros in our repo (#39393)

* Ciac 11349 md039 (#39363)

* fixed MD039

* added rule MD039

* Ciac 11349 md042 (#39365)

* md042

* added MD042 to rules

* added MD042 to rules

* Ciac 11349 md025 (#39366)

* added MD025 to rules

* manual fixes

* Ciac 11349 md005 (#39367)

* manual fixes

* added rule

* auto fix

* disable md005 fp

* remove dot

* Ciac 11349 md052 (#39368)

* added md052

* disabled md052 fp

* pre commit

* pr comments - use power of async with promises

* pre commit

* pre commit

* rn

* clean up

* updated rn

* validate

* rn

* rn

* Bump pack from version MicrosoftGraphSecurity to 2.2.27.

* Bump pack from version AzureSQLManagement to 1.2.7.

* Bump pack from version MicrosoftGraphAPI to 1.1.56.

* Update 1_2_8.md

* Update 1_0_4.md

* Update 1_0_14.md

* Update 1_0_17.md

* Update 1_5_45.md

* Update 1_3_8.md

* Update 1_4_9.md

* Update 1_0_14.md

* Update 1_1_46.md

* Update 1_2_7.md

* Update 1_3_8.md

* Update 1_2_39.md

* Update 1_2_33.md

* Update 1_2_9.md

* Update 1_0_4.md

* Update 1_1_31.md

* Update 1_0_17.md

* Update 1_1_56.md

* Update 1_6_26.md

* Update 2_2_27.md

* Update 1_5_45.md

* Update 1_3_54.md

* Update 1_0_19.md

* update docker image

* update docker image rn

* Apply markdownlint (20) (#39468)

* CrowdStrikeFalconX: Apply markdownlint

* SailPointIdentityNow: Apply markdownlint

* IP2LocationIO: Apply markdownlint

* CSCDomainManager: Apply markdownlint

* DelineaDSV: Apply markdownlint

* CyberChef: Apply markdownlint

* BeyondTrustPrivilegedRemoteAccess: Apply markdownlint

* ICEBRG: Apply markdownlint

* RemoteAccess: Apply markdownlint

* MalwareBazaar: Apply markdownlint

* Celonis: Apply markdownlint

* AzureSecurityCenter: Apply markdownlint

* Active_Directory_Query: Apply markdownlint

* Infocyte: Apply markdownlint

* DigitalGuardian: Apply markdownlint

* SecBI: Apply markdownlint

* XSIAMCompliance_PCI_DSS: Apply markdownlint

* FeedSpamhaus: Apply markdownlint

* Barracuda: Apply markdownlint

* McAfee-TIE: Apply markdownlint

* GitHub: Apply markdownlint

* OpenCTI: Apply markdownlint

* CarbonBlackDefense: Apply markdownlint

* FeedCyrenThreatInDepth: Apply markdownlint

* Rapid7AppSec: Apply markdownlint

---------

Co-authored-by: Content Bot <bot@demisto.com>

* Apply markdownlint (21) (#39469)

* MicrosoftGraphAPI: Apply markdownlint

* XSIAMCompliance_GDPR: Apply markdownlint

* ProofpointIsolation: Apply markdownlint

* Vectra: Apply markdownlint

* SafeNet_Trusted_Access: Apply markdownlint

* OSXCollector: Apply markdownlint

* Imperva_WAF: Apply markdownlint

* CrowdSec: Apply markdownlint

* FortiAuthenticator: Apply markdownlint

* McAfee_Advanced_Threat_Defense: Apply markdownlint

* iDefense: Apply markdownlint

* CybleEvents: Apply markdownlint

* UltraMSG: Apply markdownlint

* BloodHoundEnterprise: Apply markdownlint

* ThreatMiner: Apply markdownlint

* RTIR: Apply markdownlint

* MajorBreachesInvestigationandResponse: Apply markdownlint

* VaronisDataSecurityPlatform: Apply markdownlint

* nessus: Apply markdownlint

* FreeFeeds: Apply markdownlint

* FireEyeHX: Apply markdownlint

* Flashpoint: Apply markdownlint

* AlienVault_USM_Anywhere: Apply markdownlint

* CheckPointHarmonyEndpoint: Apply markdownlint

* Orca: Apply markdownlint

---------

Co-authored-by: Content Bot <bot@demisto.com>
Co-authored-by: mayagoldman <mgoldman@paloaltonetworks.com>

* Apply markdownlint (22) (#39470)

* MandiantAdvantageThreatIntelligence: Apply markdownlint

* GoogleChatViaWebhook: Apply markdownlint

* SplunkPy: Apply markdownlint

* Trellix_ePO: Apply markdownlint

* AWS-CloudTrail: Apply markdownlint

* GmailSingleUser: Apply markdownlint

* FeedCognyteLuminar: Apply markdownlint

* ZeroFox: Apply markdownlint

* JARM: Apply markdownlint

* GoogleKubernetesEngine: Apply markdownlint

* SkyhighSecurity: Apply markdownlint

* FeedPlainText: Apply markdownlint

* PaloAltoNetworksAIOps: Apply markdownlint

* CaseManagement-Generic: Apply markdownlint

* Code42: Apply markdownlint

* AnsibleAlibabaCloud: Apply markdownlint

* AzureSentinel: Apply markdownlint

* MicrosoftExchangeOnline: Apply markdownlint

* Kafka: Apply markdownlint

* CrisisManagement: Apply markdownlint

* VMwareWorkspaceONEUEM: Apply markdownlint

* MicrosoftGraphApplications: Apply markdownlint

* AnsibleLinux: Apply markdownlint

* DemistoLocking: Apply markdownlint

* 3CXDesktopApp_Supply_Chain_Attack: Apply markdownlint

---------

Co-authored-by: Content Bot <bot@demisto.com>
Co-authored-by: mayagoldman <mgoldman@paloaltonetworks.com>

* Apply markdownlint (23) (#39471)

* AWS-SecurityLake: Apply markdownlint

* CrowdStrikeIntel: Apply markdownlint

* Fortanix-DSM: Apply markdownlint

* C2sec: Apply markdownlint

* CheckpointFirewall: Apply markdownlint

* Arkime: Apply markdownlint

* DynamicSectionReports: Apply markdownlint

* jamf: Apply markdownlint

* Attlasian: Apply markdownlint

* NetscoutAED: Apply markdownlint

* AnsibleTower: Apply markdownlint

* Lansweeper: Apply markdownlint

* Sigma: Apply markdownlint

* ConcentricAI: Apply markdownlint

* Oracle: Apply markdownlint

* DelineaALM: Apply markdownlint

* ThreatExchange: Apply markdownlint

* ThinkstCanary: Apply markdownlint

* AlphaSOC_Wisdom: Apply markdownlint

* Tripwire: Apply markdownlint

* SandBlastAppliance: Apply markdownlint

* NGINXWebServer: Apply markdownlint

* OSQuery: Apply markdownlint

* KnowBe4KMSAT: Apply markdownlint

* SignalSciences: Apply markdownlint

---------

Co-authored-by: Content Bot <bot@demisto.com>
Co-authored-by: Maya Goldman <94686128+mayyagoldman@users.noreply.github.com>

* secrets ignore

* RM102

* REVERT CHANGES TO RN

---------

Co-authored-by: Content Bot <bot@demisto.com>
Co-authored-by: content-bot <55035720+content-bot@users.noreply.github.com>
TOUFIKIzakarya pushed a commit to TOUFIKIzakarya/content that referenced this pull request May 22, 2025
* required yml fields to allow mapping

* added markdownlint hook to pre commit

* Revert Microsoft365Defender.yml to match master

* mdx-validation

* invalid.md test file

* valid

* invalid + run on mdx

* changed files

* invalid readme

* modified is_html_doc

* for file in $(git ls-files '*.md')

* refactor test

* refactor test

* refactor test

* refactor test

* Validate MDX for README.md files

* Validate MDX for README.md files

* Validate MDX for README.md files

* Validate MDX for README.md files

* fix

* only changed files

* changed

* the EOF delimiter should be alone on its own line without quotes

* `EOF'

* Validate README.md files

* Validate README.md files

* Validate README.md files

* check which files are returne

* Validate Root README.md with MDX

* Validate All README.md Files with MDX

* removed echo - too long

* removed echo - too long

* all of them

* removed echos

* eof

* fi

* done

* pass file

* collect errors

* collect errors

* collect errors

* collect errors

* collect errors

* check if html

* fix mdx

* dependencies

* read entire file + html placeholders

* exclude node mosules

* exclude node mosules

* validate-mdx hook init

* markdown lint version

* markdown lint version

* markdown lint version

* Test commit

* stage

* validate mdx custom hook

* validate mdx custom hook

* validate mdx custom hook added to template

* removed unnecessery logs

* html should pass validation

* modified logs

* removed the workflow

* removed top of file

* require_serial: true

* require_serial: true revert

* - "@mdx-js/mdx@^1.6.22"

* require_serial: true

* markdownlint hook for readmes

* test readme

* removed unneccesery logs

* mdx-validation versioning

* delete test

* revert README.md

* remove pre-commit-config

* revert test readme

* frop require serieal

* demo comments

* demo comments

* html rules

* excluded non fixable > 150 occurences rules

* md042

* MD052 and MD036 excluded

* updated markdownlint

* use markdownlint-cli2

* "default": false
 dont allow any rules

* Revert "md042"

This reverts commit f0ce628.

* added rules that currently aren't violated in content

* Revert "added rules that currently aren't violated in content"

This reverts commit cde0a8a.

* added rules that trigger 0 erros in our repo (demisto#39393)

* Ciac 11349 md039 (demisto#39363)

* fixed MD039

* added rule MD039

* Ciac 11349 md042 (demisto#39365)

* md042

* added MD042 to rules

* added MD042 to rules

* Ciac 11349 md025 (demisto#39366)

* added MD025 to rules

* manual fixes

* Ciac 11349 md005 (demisto#39367)

* manual fixes

* added rule

* auto fix

* disable md005 fp

* remove dot

* Ciac 11349 md052 (demisto#39368)

* added md052

* disabled md052 fp

* pre commit

* pr comments - use power of async with promises

* pre commit

* pre commit

* rn

* clean up

* updated rn

* validate

* rn

* rn

* Bump pack from version MicrosoftGraphSecurity to 2.2.27.

* Bump pack from version AzureSQLManagement to 1.2.7.

* Bump pack from version MicrosoftGraphAPI to 1.1.56.

* Update 1_2_8.md

* Update 1_0_4.md

* Update 1_0_14.md

* Update 1_0_17.md

* Update 1_5_45.md

* Update 1_3_8.md

* Update 1_4_9.md

* Update 1_0_14.md

* Update 1_1_46.md

* Update 1_2_7.md

* Update 1_3_8.md

* Update 1_2_39.md

* Update 1_2_33.md

* Update 1_2_9.md

* Update 1_0_4.md

* Update 1_1_31.md

* Update 1_0_17.md

* Update 1_1_56.md

* Update 1_6_26.md

* Update 2_2_27.md

* Update 1_5_45.md

* Update 1_3_54.md

* Update 1_0_19.md

* update docker image

* update docker image rn

* Apply markdownlint (20) (demisto#39468)

* CrowdStrikeFalconX: Apply markdownlint

* SailPointIdentityNow: Apply markdownlint

* IP2LocationIO: Apply markdownlint

* CSCDomainManager: Apply markdownlint

* DelineaDSV: Apply markdownlint

* CyberChef: Apply markdownlint

* BeyondTrustPrivilegedRemoteAccess: Apply markdownlint

* ICEBRG: Apply markdownlint

* RemoteAccess: Apply markdownlint

* MalwareBazaar: Apply markdownlint

* Celonis: Apply markdownlint

* AzureSecurityCenter: Apply markdownlint

* Active_Directory_Query: Apply markdownlint

* Infocyte: Apply markdownlint

* DigitalGuardian: Apply markdownlint

* SecBI: Apply markdownlint

* XSIAMCompliance_PCI_DSS: Apply markdownlint

* FeedSpamhaus: Apply markdownlint

* Barracuda: Apply markdownlint

* McAfee-TIE: Apply markdownlint

* GitHub: Apply markdownlint

* OpenCTI: Apply markdownlint

* CarbonBlackDefense: Apply markdownlint

* FeedCyrenThreatInDepth: Apply markdownlint

* Rapid7AppSec: Apply markdownlint

---------

Co-authored-by: Content Bot <bot@demisto.com>

* Apply markdownlint (21) (demisto#39469)

* MicrosoftGraphAPI: Apply markdownlint

* XSIAMCompliance_GDPR: Apply markdownlint

* ProofpointIsolation: Apply markdownlint

* Vectra: Apply markdownlint

* SafeNet_Trusted_Access: Apply markdownlint

* OSXCollector: Apply markdownlint

* Imperva_WAF: Apply markdownlint

* CrowdSec: Apply markdownlint

* FortiAuthenticator: Apply markdownlint

* McAfee_Advanced_Threat_Defense: Apply markdownlint

* iDefense: Apply markdownlint

* CybleEvents: Apply markdownlint

* UltraMSG: Apply markdownlint

* BloodHoundEnterprise: Apply markdownlint

* ThreatMiner: Apply markdownlint

* RTIR: Apply markdownlint

* MajorBreachesInvestigationandResponse: Apply markdownlint

* VaronisDataSecurityPlatform: Apply markdownlint

* nessus: Apply markdownlint

* FreeFeeds: Apply markdownlint

* FireEyeHX: Apply markdownlint

* Flashpoint: Apply markdownlint

* AlienVault_USM_Anywhere: Apply markdownlint

* CheckPointHarmonyEndpoint: Apply markdownlint

* Orca: Apply markdownlint

---------

Co-authored-by: Content Bot <bot@demisto.com>
Co-authored-by: mayagoldman <mgoldman@paloaltonetworks.com>

* Apply markdownlint (22) (demisto#39470)

* MandiantAdvantageThreatIntelligence: Apply markdownlint

* GoogleChatViaWebhook: Apply markdownlint

* SplunkPy: Apply markdownlint

* Trellix_ePO: Apply markdownlint

* AWS-CloudTrail: Apply markdownlint

* GmailSingleUser: Apply markdownlint

* FeedCognyteLuminar: Apply markdownlint

* ZeroFox: Apply markdownlint

* JARM: Apply markdownlint

* GoogleKubernetesEngine: Apply markdownlint

* SkyhighSecurity: Apply markdownlint

* FeedPlainText: Apply markdownlint

* PaloAltoNetworksAIOps: Apply markdownlint

* CaseManagement-Generic: Apply markdownlint

* Code42: Apply markdownlint

* AnsibleAlibabaCloud: Apply markdownlint

* AzureSentinel: Apply markdownlint

* MicrosoftExchangeOnline: Apply markdownlint

* Kafka: Apply markdownlint

* CrisisManagement: Apply markdownlint

* VMwareWorkspaceONEUEM: Apply markdownlint

* MicrosoftGraphApplications: Apply markdownlint

* AnsibleLinux: Apply markdownlint

* DemistoLocking: Apply markdownlint

* 3CXDesktopApp_Supply_Chain_Attack: Apply markdownlint

---------

Co-authored-by: Content Bot <bot@demisto.com>
Co-authored-by: mayagoldman <mgoldman@paloaltonetworks.com>

* Apply markdownlint (23) (demisto#39471)

* AWS-SecurityLake: Apply markdownlint

* CrowdStrikeIntel: Apply markdownlint

* Fortanix-DSM: Apply markdownlint

* C2sec: Apply markdownlint

* CheckpointFirewall: Apply markdownlint

* Arkime: Apply markdownlint

* DynamicSectionReports: Apply markdownlint

* jamf: Apply markdownlint

* Attlasian: Apply markdownlint

* NetscoutAED: Apply markdownlint

* AnsibleTower: Apply markdownlint

* Lansweeper: Apply markdownlint

* Sigma: Apply markdownlint

* ConcentricAI: Apply markdownlint

* Oracle: Apply markdownlint

* DelineaALM: Apply markdownlint

* ThreatExchange: Apply markdownlint

* ThinkstCanary: Apply markdownlint

* AlphaSOC_Wisdom: Apply markdownlint

* Tripwire: Apply markdownlint

* SandBlastAppliance: Apply markdownlint

* NGINXWebServer: Apply markdownlint

* OSQuery: Apply markdownlint

* KnowBe4KMSAT: Apply markdownlint

* SignalSciences: Apply markdownlint

---------

Co-authored-by: Content Bot <bot@demisto.com>
Co-authored-by: Maya Goldman <94686128+mayyagoldman@users.noreply.github.com>

* secrets ignore

* RM102

* REVERT CHANGES TO RN

---------

Co-authored-by: Content Bot <bot@demisto.com>
Co-authored-by: content-bot <55035720+content-bot@users.noreply.github.com>
TOUFIKIzakarya pushed a commit to TOUFIKIzakarya/content that referenced this pull request May 30, 2025
* required yml fields to allow mapping

* added markdownlint hook to pre commit

* Revert Microsoft365Defender.yml to match master

* mdx-validation

* invalid.md test file

* valid

* invalid + run on mdx

* changed files

* invalid readme

* modified is_html_doc

* for file in $(git ls-files '*.md')

* refactor test

* refactor test

* refactor test

* refactor test

* Validate MDX for README.md files

* Validate MDX for README.md files

* Validate MDX for README.md files

* Validate MDX for README.md files

* fix

* only changed files

* changed

* the EOF delimiter should be alone on its own line without quotes

* `EOF'

* Validate README.md files

* Validate README.md files

* Validate README.md files

* check which files are returne

* Validate Root README.md with MDX

* Validate All README.md Files with MDX

* removed echo - too long

* removed echo - too long

* all of them

* removed echos

* eof

* fi

* done

* pass file

* collect errors

* collect errors

* collect errors

* collect errors

* collect errors

* check if html

* fix mdx

* dependencies

* read entire file + html placeholders

* exclude node mosules

* exclude node mosules

* validate-mdx hook init

* markdown lint version

* markdown lint version

* markdown lint version

* Test commit

* stage

* validate mdx custom hook

* validate mdx custom hook

* validate mdx custom hook added to template

* removed unnecessery logs

* html should pass validation

* modified logs

* removed the workflow

* removed top of file

* require_serial: true

* require_serial: true revert

* - "@mdx-js/mdx@^1.6.22"

* require_serial: true

* markdownlint hook for readmes

* test readme

* removed unneccesery logs

* mdx-validation versioning

* delete test

* revert README.md

* remove pre-commit-config

* revert test readme

* frop require serieal

* demo comments

* demo comments

* html rules

* excluded non fixable > 150 occurences rules

* md042

* MD052 and MD036 excluded

* updated markdownlint

* use markdownlint-cli2

* "default": false
 dont allow any rules

* Revert "md042"

This reverts commit f0ce628.

* added rules that currently aren't violated in content

* Revert "added rules that currently aren't violated in content"

This reverts commit cde0a8a.

* added rules that trigger 0 erros in our repo (demisto#39393)

* Ciac 11349 md039 (demisto#39363)

* fixed MD039

* added rule MD039

* Ciac 11349 md042 (demisto#39365)

* md042

* added MD042 to rules

* added MD042 to rules

* Ciac 11349 md025 (demisto#39366)

* added MD025 to rules

* manual fixes

* Ciac 11349 md005 (demisto#39367)

* manual fixes

* added rule

* auto fix

* disable md005 fp

* remove dot

* Ciac 11349 md052 (demisto#39368)

* added md052

* disabled md052 fp

* pre commit

* pr comments - use power of async with promises

* pre commit

* pre commit

* rn

* clean up

* updated rn

* validate

* rn

* rn

* Bump pack from version MicrosoftGraphSecurity to 2.2.27.

* Bump pack from version AzureSQLManagement to 1.2.7.

* Bump pack from version MicrosoftGraphAPI to 1.1.56.

* Update 1_2_8.md

* Update 1_0_4.md

* Update 1_0_14.md

* Update 1_0_17.md

* Update 1_5_45.md

* Update 1_3_8.md

* Update 1_4_9.md

* Update 1_0_14.md

* Update 1_1_46.md

* Update 1_2_7.md

* Update 1_3_8.md

* Update 1_2_39.md

* Update 1_2_33.md

* Update 1_2_9.md

* Update 1_0_4.md

* Update 1_1_31.md

* Update 1_0_17.md

* Update 1_1_56.md

* Update 1_6_26.md

* Update 2_2_27.md

* Update 1_5_45.md

* Update 1_3_54.md

* Update 1_0_19.md

* update docker image

* update docker image rn

* Apply markdownlint (20) (demisto#39468)

* CrowdStrikeFalconX: Apply markdownlint

* SailPointIdentityNow: Apply markdownlint

* IP2LocationIO: Apply markdownlint

* CSCDomainManager: Apply markdownlint

* DelineaDSV: Apply markdownlint

* CyberChef: Apply markdownlint

* BeyondTrustPrivilegedRemoteAccess: Apply markdownlint

* ICEBRG: Apply markdownlint

* RemoteAccess: Apply markdownlint

* MalwareBazaar: Apply markdownlint

* Celonis: Apply markdownlint

* AzureSecurityCenter: Apply markdownlint

* Active_Directory_Query: Apply markdownlint

* Infocyte: Apply markdownlint

* DigitalGuardian: Apply markdownlint

* SecBI: Apply markdownlint

* XSIAMCompliance_PCI_DSS: Apply markdownlint

* FeedSpamhaus: Apply markdownlint

* Barracuda: Apply markdownlint

* McAfee-TIE: Apply markdownlint

* GitHub: Apply markdownlint

* OpenCTI: Apply markdownlint

* CarbonBlackDefense: Apply markdownlint

* FeedCyrenThreatInDepth: Apply markdownlint

* Rapid7AppSec: Apply markdownlint

---------

Co-authored-by: Content Bot <bot@demisto.com>

* Apply markdownlint (21) (demisto#39469)

* MicrosoftGraphAPI: Apply markdownlint

* XSIAMCompliance_GDPR: Apply markdownlint

* ProofpointIsolation: Apply markdownlint

* Vectra: Apply markdownlint

* SafeNet_Trusted_Access: Apply markdownlint

* OSXCollector: Apply markdownlint

* Imperva_WAF: Apply markdownlint

* CrowdSec: Apply markdownlint

* FortiAuthenticator: Apply markdownlint

* McAfee_Advanced_Threat_Defense: Apply markdownlint

* iDefense: Apply markdownlint

* CybleEvents: Apply markdownlint

* UltraMSG: Apply markdownlint

* BloodHoundEnterprise: Apply markdownlint

* ThreatMiner: Apply markdownlint

* RTIR: Apply markdownlint

* MajorBreachesInvestigationandResponse: Apply markdownlint

* VaronisDataSecurityPlatform: Apply markdownlint

* nessus: Apply markdownlint

* FreeFeeds: Apply markdownlint

* FireEyeHX: Apply markdownlint

* Flashpoint: Apply markdownlint

* AlienVault_USM_Anywhere: Apply markdownlint

* CheckPointHarmonyEndpoint: Apply markdownlint

* Orca: Apply markdownlint

---------

Co-authored-by: Content Bot <bot@demisto.com>
Co-authored-by: mayagoldman <mgoldman@paloaltonetworks.com>

* Apply markdownlint (22) (demisto#39470)

* MandiantAdvantageThreatIntelligence: Apply markdownlint

* GoogleChatViaWebhook: Apply markdownlint

* SplunkPy: Apply markdownlint

* Trellix_ePO: Apply markdownlint

* AWS-CloudTrail: Apply markdownlint

* GmailSingleUser: Apply markdownlint

* FeedCognyteLuminar: Apply markdownlint

* ZeroFox: Apply markdownlint

* JARM: Apply markdownlint

* GoogleKubernetesEngine: Apply markdownlint

* SkyhighSecurity: Apply markdownlint

* FeedPlainText: Apply markdownlint

* PaloAltoNetworksAIOps: Apply markdownlint

* CaseManagement-Generic: Apply markdownlint

* Code42: Apply markdownlint

* AnsibleAlibabaCloud: Apply markdownlint

* AzureSentinel: Apply markdownlint

* MicrosoftExchangeOnline: Apply markdownlint

* Kafka: Apply markdownlint

* CrisisManagement: Apply markdownlint

* VMwareWorkspaceONEUEM: Apply markdownlint

* MicrosoftGraphApplications: Apply markdownlint

* AnsibleLinux: Apply markdownlint

* DemistoLocking: Apply markdownlint

* 3CXDesktopApp_Supply_Chain_Attack: Apply markdownlint

---------

Co-authored-by: Content Bot <bot@demisto.com>
Co-authored-by: mayagoldman <mgoldman@paloaltonetworks.com>

* Apply markdownlint (23) (demisto#39471)

* AWS-SecurityLake: Apply markdownlint

* CrowdStrikeIntel: Apply markdownlint

* Fortanix-DSM: Apply markdownlint

* C2sec: Apply markdownlint

* CheckpointFirewall: Apply markdownlint

* Arkime: Apply markdownlint

* DynamicSectionReports: Apply markdownlint

* jamf: Apply markdownlint

* Attlasian: Apply markdownlint

* NetscoutAED: Apply markdownlint

* AnsibleTower: Apply markdownlint

* Lansweeper: Apply markdownlint

* Sigma: Apply markdownlint

* ConcentricAI: Apply markdownlint

* Oracle: Apply markdownlint

* DelineaALM: Apply markdownlint

* ThreatExchange: Apply markdownlint

* ThinkstCanary: Apply markdownlint

* AlphaSOC_Wisdom: Apply markdownlint

* Tripwire: Apply markdownlint

* SandBlastAppliance: Apply markdownlint

* NGINXWebServer: Apply markdownlint

* OSQuery: Apply markdownlint

* KnowBe4KMSAT: Apply markdownlint

* SignalSciences: Apply markdownlint

---------

Co-authored-by: Content Bot <bot@demisto.com>
Co-authored-by: Maya Goldman <94686128+mayyagoldman@users.noreply.github.com>

* secrets ignore

* RM102

* REVERT CHANGES TO RN

---------

Co-authored-by: Content Bot <bot@demisto.com>
Co-authored-by: content-bot <55035720+content-bot@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants