description |
---|
Uncover flaws in the application (bugs, security weaknesses, extensibility, maintainability...) Evaluate the readiness of the source code for being enhanced by a third party |
- Introduction & Objectives
- Scope of Work
- Methodology
-
- Planning
- Risk Classification
- Tools and Scanners
- Identified Vulnerabilities / Findings
- Miscellaneous Issues / Non-Findings
- Conclusion