FOLLOW FLUID ATTACKS
The system uses temporary files to store sensitive information. Alternatively, the system deploys sensitive temporary files to the production environment.
R036. Do not deploy temporary files
R177. Avoid caching and temporary files
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.