Latest version: v14.0.1.1.0
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Configure api keys via server env. This can be very useful to avoid mixing your keys between your various environments when restoring databases. All you have to do is to add a new section to your configuration file according to the following convention:
No known vulnerabilities found
Has known vulnerabilities