Skip to content

Security Issues

Samuel Menkus edited this page Nov 3, 2019 · 4 revisions

Security Issues


  1. Identify sensitive information kept by your software. Explain how you plan to protect it.

  1. Identify possible attack vectors, that is, ways malicious users could try to use your software to escalate their privileges. This includes root access to your server, access to other user’s sensitive information (say via XSS attacks), root access to your database, etc. Explain the protection plan.