Latest version: v0.1.5
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Given the output directory of a QC pipeline and a threshold config file, parse out the desired metrics and evalute them against the thresholds.
No known vulnerabilities found