Fluid Attacks logo
Login
Contact Us
Young hacker smiling
Zero false positives

Expert intelligence + effective automation

Contact logo Contact Us
GET A DEMO

R155. Application free of malicious code

This document details the security requirements related to the proper management of the source code that makes up a given application. This is because an application can import, or be composed of, sections of malicious code developed by third parties.

Requirement

The application code must be free of malicious code.


Service status - Terms of Use