Shared publicly  - 
 
"Our search for vulnerabilities was primarily conducted by manual inspection of the web application’s source code, . . . The fact that the application was open source expedited our search"
1
1
Susan Spencer's profile photo
Add a comment...