FOLLOW FLUID ATTACKS
A functionality that is part of the system can be leveraged by an attacker
in order to negatively impact it.
R266. Disable insecure functionalities
Start with Fluid Attacks
We are a proud corporate member of the OWASP Foundation
Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.