Security Check
Perform focused security analysis on code changes:
- Authentication/authorization checks
- Data exposure risks
- Injection vulnerabilities
- Cryptographic weaknesses
- Sensitive data in logs
Last updated on
Perform focused security analysis on code changes: