FOLLOW FLUID ATTACKS
The system uses temporary files to store sensitive information.
Alternatively, the system deploys sensitive temporary files to the production
R036. Do not deploy temporary files
R177. Avoid caching and temporary files
Corporate member of The OWASP Foundation
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.