Latest version: v0.10
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Loads configuration files, converts their values to appropriate data types, and obtains the processed data in different representations
No known vulnerabilities found