Open rokroskar opened 7 years ago
This refers specifically to the fact that the graph mutation endpoints are not secured. However, more generally, we should discuss in the documentation what sort of isolation is suggested for deployment.
Describe the following weaknesses:
Move to top of user documents.
I think this needs a proper section in the user/developer documentation.
This refers specifically to the fact that the graph mutation endpoints are not secured. However, more generally, we should discuss in the documentation what sort of isolation is suggested for deployment.
Describe the following weaknesses: