Security
Configure key policies, rules, and parameters for sensitive data to increase the overall level of security.
📄️ Vulnerability scanner
The tool checks if there are any vulnerabilities in external libraries that need to be removed.
Configure key policies, rules, and parameters for sensitive data to increase the overall level of security.
The tool checks if there are any vulnerabilities in external libraries that need to be removed.