SAMMY UI is optimized for resolutions with a width 1024px and higher.
V15.1.1
V15.1.1: Verify that application documentation defines risk based remediation time frames for 3rd party component versions with vulnerabilities and for updating libraries in general, to minimize the risk from these components.
ASVS Maturity
V15.1.2
V15.1.2: Verify that an inventory catalog, such as software bill of materials (SBOM), is maintained of all third-party libraries in use, including verifying that components come from pre-defined, trusted, and continually maintained repositories.
ASVS Maturity
V15.1.3
V15.1.3: Verify that the application documentation identifies functionality which is time-consuming or resource-demanding. This must include how to prevent a loss of availability due to overusing this functionality and how to avoid a situation where building a response takes longer than the consumer's timeout. Potential defenses may include asynchronous processing, using queues, and limiting parallel processes per user and per application.
ASVS Maturity
V15.1.4
V15.1.4: Verify that application documentation highlights third-party libraries which are considered to be "risky components".
ASVS Maturity
V15.1.5
V15.1.5: Verify that application documentation highlights parts of the application where "dangerous functionality" is being used.
ASVS Maturity