Open Spencer-Mosley opened 6 months ago
look at complex security rules to reverse engineer this
user creation for example
making comments and post push notification logic
look at complex security rules to reverse engineer this