Skip to content

Latest commit

 

History

History
21 lines (17 loc) · 452 Bytes

File metadata and controls

21 lines (17 loc) · 452 Bytes
description
Uncover flaws in the application (bugs, security weaknesses, extensibility, maintainability...) Evaluate the readiness of the source code for being enhanced by a third party

Source Code Security

  1. Introduction & Objectives
  2. Scope of Work
  3. Methodology
    1. Planning
    2. Risk Classification
  4. Tools and Scanners
  5. Identified Vulnerabilities / Findings
  6. Miscellaneous Issues / Non-Findings
  7. Conclusion