Mitigation Strategy
Last updated
Last updated
In addition to the probe results, each probe includes a tab showing a mitigation strategy to address vulnerabilities identified by the probe, which can be applied to your target application.
These steps are created based on content provided by our red team, who propose best practices they have identified through research and hands-on experience.
Each step includes a Mark as Completed button, allowing you to track whether the mitigation has been applied to a specific target.
For reference, you can view examples of mitigation strategy steps for Context Leakage probe.