-
-
**Describe the issue**
Currently we aren't made aware of any regressions in our security.
**Describe the improvement you'd like**
Have an automated script to run a penetration test suite. This co…
-
Description from Penetration Testing:
Application browser may store a local cached copy of content received from web servers including sensitive content accessed via HTTPS. Sensitive information in th…
-
Description from Penetration Testing:
Application browser may store a local cached copy of content received from web servers including sensitive content accessed via HTTPS. Sensitive information in th…
-
See Penetration Testing results for complete details.
-
### Context
We want to learn more what is the effort for the given epic https://warthogs.atlassian.net/browse/KF-5505
### What needs to get done
1. Explore details of this epic https://warthogs.atl…
-
Generally penetration (PEN) testing is required before launching a new app. Consultation is required to confirm if penetration should take place for BTR and to schedule that.
- Schedule through Gary…
-
If you are able to host that website local. Try damaging it.
Overloading
Sql injections
Ddos
Etc.
-
[WebCookies.org](https://webcookies.org/doc/penetration-testing) provides penetration testing, vulnerability assessment, security architecture design as well as a broad range of other information secu…
-
## I confirm:
- [x] I've read the [contributing guidelines](https://github.com/aletheia-foundation/aletheia-admin/blob/master/CONTRIBUTING.md) and the [code of conduct](https://github.com/aletheia-…