Implementation of key-value pair based configuration. Includes the memory configuration provider.
No vulnerabilities detected