Open tmillross opened 5 years ago
Priority: High; Estimated person-hours: 5 Volunteer(s)/Candidate(s): None
Needs to cover topics such as access control, access monitoring, nefarious code injection, and other relevant security issues.
Relates to #10, copied from here with minimal editing for quality.
In terms of sw quality, we could require that static analysis such as bandit https://github.com/PyCQA/bandit are done as part of the Cont. Integration.
Priority: High; Estimated person-hours: 5 Volunteer(s)/Candidate(s): None
Needs to cover topics such as access control, access monitoring, nefarious code injection, and other relevant security issues.
Relates to #10, copied from here with minimal editing for quality.