"Our search for vulnerabilities was primarily conducted by manual inspection of the web application’s source code, . . . The fact that the application was open source expedited our search"
Shared publiclyView activity