You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jun 8, 2020. It is now read-only.
It is important for us to keep our data safe. We need to make sure we are not vulnerable to any of the following attacks. Add some more for our audit.
SQL Injection (do we escape all char entrances? the API only accepts requests from connect.upframe.io and beta.upframe.io but this can be easily spoofed...)
Brute forcing (add timers)
Are hashes complex enough? (make sure we are up to date in the difficulty stage. Our hashing algo is safe, but our steps are a little low I believe)
The text was updated successfully, but these errors were encountered:
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
It is important for us to keep our data safe. We need to make sure we are not vulnerable to any of the following attacks. Add some more for our audit.
The text was updated successfully, but these errors were encountered: