The following areas of code tend to have a high-risk of containing security vulnerabilities: - Crypto implementations / usage - Parser, unparser - System configuration - Authentication, authorization - Session management - Request throttling - :unicorn: (self-developed code, only used in that one software)
Description
New vulnerabilities may be found before reaching production. - Old vulnerabilities are found and fixed.