{"payload":{"header_redesign_enabled":false,"results":[{"id":"426561659","archived":false,"color":"#cb171e","followers":4,"has_funding_file":false,"hl_name":"ansible-lockdown/UBUNTU18-CIS-Audit","hl_trunc_description":"Audit configurations for Ubuntu 1804 CIS - utilising goss","language":"YAML","mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":426561659,"name":"UBUNTU18-CIS-Audit","owner_id":44685016,"owner_login":"ansible-lockdown","updated_at":"2023-04-13T10:22:45.471Z","has_issues":true}},"sponsorable":false,"topics":["security","benchmark","cis","security-audit","goss","ubuntu-server","security-hardening","benchmark-framework","cis-benchmark","compliance-as-code","ubuntu1804","security-auditing-tool"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":68,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Aansible-lockdown%252FUBUNTU18-CIS-Audit%2B%2Blanguage%253AYAML","metadata":null,"warn_limited_results":false,"csrf_tokens":{"/ansible-lockdown/UBUNTU18-CIS-Audit/star":{"post":"ub-1Xzz6AGV9GXJ2INurA2Dl7fsWwKBMvRX6p3CG-uAsOz9pA6b76oW2bWcJq2fH29a5YlkCbd478TXwdXM3oQ"},"/ansible-lockdown/UBUNTU18-CIS-Audit/unstar":{"post":"QqnBbccuNtrsJqffJhIzmHiO5pVndDKYGfPu8uvp2zkApwXIuS1IP_rzUNxKQrONdbV4jl45M8UKsJWd8H40OA"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"pGsUvQaYI1E937QFGrFfQLIMfofDuUPhns-kfPJNZ1Zh7gPtOlzAgVifmYOI_wnpAjDBmQA14bzu7I4ULzBWjQ"}}},"title":"Repository search results"}